Mathur, Aditya P.
2329  results:
Search for persons X
?
1

DRACE: A Framework for Evaluating Anomaly Detectors for Ind..:

, In: Proceedings of the 10th ACM Cyber-Physical System Security Workshop,
 
?
 
?
3

Next Generation Cyber-Physical Architecture and Training:

, In: International Series in Operations Research & Management Science; Cyberdefense,
 
?
4

A Hybrid Physics-Based Data-Driven Framework for Anomaly De..:

Raman, M. R. Gauthama ; Mathur, Aditya P.
IEEE Transactions on Systems, Man, and Cybernetics: Systems.  52 (2022)  9 - p. 6003-6014 , 2022
 
?
5

Machine learning for intrusion detection in industrial cont..:

Umer, Muhammad Azmi ; Junejo, Khurum Nazir ; Jilani, Muhammad Taha.
International Journal of Critical Infrastructure Protection.  38 (2022)  - p. 100516 , 2022
 
?
 
?
7

Attack Rules : An Adversarial Approach to Generate Attac..:

, In: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy,
 
?
8

Challenges in Machine Learning based approaches for Real-Ti..:

, In: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop,
 
?
9

NoiSense Print : Detecting Data Integrity Attacks on Sen..:

Ahmed, Chuadhry Mujeeb ; Mathur, Aditya P. ; Ochoa, Martín
ACM Transactions on Privacy and Security (TOPS).  24 (2020)  1 - p. 1-35 , 2020
 
?
 
?
11

Challenges in Secure Engineering of Critical Infrastructure..:

, In: 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW),
 
?
12

State Estimation-Based Attack Detection in Cyber-Physical S..:

, In: Cybersecurity and Privacy in Cyber-Physical Systems,
 
?
13

Anomaly Detection in Critical Infrastructure Using Probabil..:

, In: Applications and Techniques in Information Security; Communications in Computer and Information Science,
 
?
14

NoisePrint : Attack Detection Using Sensor and Process N..:

, In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security,
 
?
15

Noise Matters : Using Sensor and Process Noise Fingerpri..:

, In: Proceedings of the 34th Annual Computer Security Applications Conference,
 
1-15
Related subjects