Sridhar Adepu

Orcid: 0000-0002-0045-2811

According to our database1, Sridhar Adepu authored at least 53 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
WaXAI: Explainable Anomaly Detection in Industrial Control Systems and Water Systems.
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024

2023
ADAM: An Adaptive DDoS Attack Mitigation Scheme in Software-Defined Cyber-Physical System.
IEEE Trans. Ind. Informatics, June, 2023

HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023

ICCPS: Impact discovery using causal inference for cyber attacks in CPSs.
CoRR, 2023

A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Water Risk-Proofed: Risk Assessment in Water Desalination.
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 2023

2022
Modeling and Analysis of Explanation for Secure Industrial Control Systems.
ACM Trans. Auton. Adapt. Syst., December, 2022

Security Threats in Electric Vehicle Charging.
Proceedings of the IEEE International Conference on Communications, 2022

Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems.
IEEE Trans. Sustain. Comput., 2021

Distributed Attack Detection in a Water Treatment Plant: Method and Case Study.
IEEE Trans. Dependable Secur. Comput., 2021

Enabling isolation and recovery in PLC redundancy framework of metro train systems.
Int. J. Inf. Sec., 2021

SafeCI: Avoiding process anomalies in critical infrastructure.
Int. J. Crit. Infrastructure Prot., 2021

Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography.
IEEE Secur. Priv., 2021

Cascading effects of cyber-attacks on interconnected critical infrastructure.
Cybersecur., 2021

A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems.
CoRR, 2021

Super Detector: An Ensemble Approach for Anomaly Detection in Industrial Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2021

2020
Attacks on smart grid: power supply interruption and malicious power generation.
Int. J. Inf. Sec., 2020

Generating invariants using design and data-centric approaches for distributed attack detection.
Int. J. Crit. Infrastructure Prot., 2020

Anomaly detection in Industrial Control Systems using Logical Analysis of Data.
Comput. Secur., 2020

Explanations for human-on-the-loop: a probabilistic model checking approach.
Proceedings of the SEAMS '20: IEEE/ACM 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Seoul, Republic of Korea, 29 June, 2020

Control Behavior Integrity for Distributed Cyber-Physical Systems.
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020

Investigation of Cyber Attacks on a Water Distribution System.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
ICS-BlockOpS: Blockchain for operational data security in industrial control system.
Pervasive Mob. Comput., 2019

Towards Semantic Sensitive Feature Profiling of IoT Devices.
IEEE Internet Things J., 2019

HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data.
IACR Cryptol. ePrint Arch., 2019

Challenges in Secure Engineering of Critical Infrastructure Systems.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019

Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Vulnerability Analysis of an Automotive Infotainment System's WIFI Capability.
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019

2018
Design and assessment of an Orthogonal Defense Mechanism for a water treatment facility.
Robotics Auton. Syst., 2018

An Approach for Formal Analysis of the Security of a Water Treatment Testbed.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3.
CoRR, 2017

WaterJam: An Experimental Case Study of Jamming Attacks on a Water Treatment System.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Access Control in Water Distribution Networks: A Case Study.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

From Design to Invariants: Detecting Attacks on Cyber Physical Systems.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Integrating Six-Step Model with Information Flow Diagrams for Comprehensive Analysis of Cyber-Physical System Safety and Security.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Effectiveness of Association Rules Mining for Invariants Generation in Cyber-Physical Systems.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Integrating Design and Data Centric Approaches to Generate Invariants for Distributed Attack Detection.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
Argus: An Orthogonal Defense Framework to Protect Public Infrastructure against Cyber-Physical Attacks.
IEEE Internet Comput., 2016

Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Using Process Invariants to Detect Cyber Attacks on a Water Treatment System.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Model-based security analysis of a water treatment system.
Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2016

An Investigation into the Response of a Water Treatment System to Cyber Attacks.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study.
Proceedings of the Complex Systems Design & Management Asia - Smart Nations, 2016

A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems.
Proceedings of the Critical Information Infrastructures Security, 2016

A Dataset to Support Research in the Design of Secure Water Treatment Systems.
Proceedings of the Critical Information Infrastructures Security, 2016

Generalized Attacker and Attack Models for Cyber Physical Systems.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015


  Loading...