Aditya P. Mathur
Orcid: 0000-0002-9356-6286Affiliations:
- Purdue University, West Lafayette, USA
- Singapore University of Technology and Design
According to our database1,
Aditya P. Mathur
authored at least 166 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Adv. Robotics, October, 2024
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024
2023
Introduction to the special issue on automation of software test and test code quality.
J. Softw. Evol. Process., April, 2023
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure.
IEEE Secur. Priv., 2023
Proceedings of the 32nd IEEE International Conference on Robot and Human Interactive Communication, 2023
2022
A Hybrid Physics-Based Data-Driven Framework for Anomaly Detection in Industrial Control Systems.
IEEE Trans. Syst. Man Cybern. Syst., 2022
AICrit: A unified framework for real-time anomaly detection in water treatment plants.
J. Inf. Secur. Appl., 2022
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations.
Int. J. Crit. Infrastructure Prot., 2022
Design-knowledge in learning plant dynamics for detecting process anomalies in water treatment plants.
Comput. Secur., 2022
Effect of time patterns in mining process invariants for industrial control systems: an experimental study.
Proceedings of the 2nd International Workshop on Software Engineering and AI for Data Quality in Cyber-Physical Systems/Internet of Things, 2022
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022
2021
Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems.
IEEE Trans. Sustain. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Can Replay Attacks Designed to Steal Water from Water Distribution Systems Remain Undetected?
ACM Trans. Cyber Phys. Syst., 2021
Int. J. Crit. Infrastructure Prot., 2021
Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation.
Cybersecur., 2021
Cybersecur., 2021
Super Detector: An Ensemble Approach for Anomaly Detection in Industrial Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2021
Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021
PCAT: PLC Command Analysis Tool for automatic incidence response in Water Treatment Plants.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
<i>NoiSense Print</i>: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints.
ACM Trans. Priv. Secur., 2020
A Mechanism to Assess the Effectiveness Anomaly Detectors in Industrial Control Systems.
J. Integr. Des. Process. Sci., 2020
Int. J. Inf. Sec., 2020
Generating invariants using design and data-centric approaches for distributed attack detection.
Int. J. Crit. Infrastructure Prot., 2020
Int. J. Crit. Infrastructure Prot., 2020
Deep autoencoders as anomaly detectors: Method and case study in a distributed water treatment plant.
Comput. Secur., 2020
Domain-Based Fuzzing for Supervised Learning of Anomaly Detection in Cyber-Physical Systems.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020
Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
IEEE Trans. Reliab., 2019
Pervasive Mob. Comput., 2019
Int. J. Crit. Infrastructure Prot., 2019
A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system.
Int. J. Crit. Infrastructure Prot., 2019
A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019
Proceedings of the 15th European Dependable Computing Conference, 2019
Using Datasets from Industrial Control Systems for Cyber Security Research and Education.
Proceedings of the Critical Information Infrastructures Security, 2019
Proceedings of the Applications and Techniques in Information Security, 2019
2018
Design and assessment of an Orthogonal Defense Mechanism for a water treatment facility.
Robotics Auton. Syst., 2018
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018
EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018
TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
<i>NoisePrint</i>: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
A comprehensive approach, and a case study, for conducting attack detection experiments in Cyber-Physical Systems.
Robotics Auton. Syst., 2017
NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints.
CoRR, 2017
Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017
WADI: a water distribution testbed for research in the design of secure cyber physical systems.
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017
Integrating Design and Data Centric Approaches to Generate Invariants for Distributed Attack Detection.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017
2016
Argus: An Orthogonal Defense Framework to Protect Public Infrastructure against Cyber-Physical Attacks.
IEEE Internet Comput., 2016
Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2016
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study.
Proceedings of the Complex Systems Design & Management Asia - Smart Nations, 2016
Proceedings of the Critical Information Infrastructures Security, 2016
Proceedings of the Critical Information Infrastructures Security, 2016
Proceedings of the 2016 International Workshop on Cyber-physical Systems for Smart Water Networks, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Fault domain-based testing in imperfect situations: a heuristic approach and case studies.
Softw. Qual. J., 2015
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
Proceedings of the Complex Systems Design & Management Asia, Designing Smart Cities: Proceedings of the First Asia, 2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
Design of Intelligent Checkers to Enhance the Security and Safety of Cyber Physical Systems.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
2013
Inf. Softw. Technol., 2013
Effective Crowdsourcing for Software Feature Ideation in Online Co-Creation Forums.
Proceedings of the 25th International Conference on Software Engineering and Knowledge Engineering, 2013
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013
2012
A Security Assurance Framework Combining Formal Verification and Security Functional Testing.
Proceedings of the 2012 12th International Conference on Quality Software, 2012
2011
Discriminative probabilistic models for expert search in heterogeneous information sources.
Inf. Retr., 2011
Proceedings of the Proceeding of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2011
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
2010
IEEE Trans. Dependable Secur. Comput., 2010
Fault coverage of Constrained Random Test Selection for access control: A formal analysis.
J. Syst. Softw., 2010
Discriminative models of integrating document evidence and document-candidate associations for expert search.
Proceedings of the Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2010
Current State of the Software Testing Education in North American Academia and Some Recommendations for the New Educators.
Proceedings of the Proceedings 23rd IEEE Conference on Software Engineering Education and Training, 2010
2009
IEEE Trans. Software Eng., 2009
2008
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
2007
Academic/Industry Collaboration in Undergraduate Software Engineering - A Fifteen Year Perspective.
Proceedings of the 2007 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2007
2006
J. Syst. Softw., 2006
2005
Proceedings of the 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
2004
Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
2003
Using Sensitivity Analysis to Validate a State Variable Model of the Software Test Process.
IEEE Trans. Software Eng., 2003
Proceedings of the 11th International Workshop on Software Technology and Engineering Practice (STEP 2003), 2003
Monitoring the software test process using statistical process control: a logarithmic approach.
Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, 2003
Proceedings of the 3rd International Conference on Quality Software (QSIC 2003), 2003
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003
2002
IEEE Commun. Mag., 2002
Proceedings of the 13th International Symposium on Software Reliability Engineering (ISSRE 2002), 2002
2001
IEEE Trans. Software Eng., 2001
Interface Mutation Test Adequacy Criterion: An Empirical Evaluation.
Empir. Softw. Eng., 2001
Proceedings of the IEEE International Conference on Systems, 2001
Proceedings of the IEEE International Conference on Systems, 2001
Many architecture-based software reliability modelsComparison of Architecture-Based Software Reliability Models.
Proceedings of the 12th International Symposium on Software Reliability Engineering (ISSRE 2001), 2001
Feedback Control of the Software Test Process Through Measurements of Software Reliability.
Proceedings of the 12th International Symposium on Software Reliability Engineering (ISSRE 2001), 2001
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001
2000
Proceedings of the TOOLS 2000: 33rd International Conference on Technology of Object-Oriented Languages and Systems, 2000
Proceedings of the TOOLS 2000: 34th International Conference on Technology of Object-Oriented Languages and Systems, 30 July, 2000
Proceedings of the Fifteenth IEEE International Conference on Automated Software Engineering, 2000
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000
1999
Test set size minimization and fault detection effectiveness: A case study in a space application.
J. Syst. Softw., 1999
Proceedings of the 14th IEEE International Conference on Automated Software Engineering, 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
Softw. Pract. Exp., 1998
Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 1998
1997
On the estimation of reliability of a software system using reliabilities of its components.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997
1996
Proceedings of the Seventh International Symposium on Software Reliability Engineering, 1996
Proceedings of the 1996 conference of the Centre for Advanced Studies on Collaborative Research, 1996
1995
IEEE Trans. Software Eng., 1995
Softw. Qual. J., 1995
Proceedings of the Sixth International Symposium on Software Reliability Engineering, 1995
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995
1994
Softw. Test. Verification Reliab., 1994
Concurr. Pract. Exp., 1994
Proceedings of the 8th Brazilian Symposium on Software Engineering, 1994
Proceedings of the 5th International Symposium on Software Reliability Engineering, 1994
A case study to investigate sensitivity of reliability estimates to errors in operational profile.
Proceedings of the 5th International Symposium on Software Reliability Engineering, 1994
Mutation Versus All-uses: An Empirical Evaluation of Cost, Strength and Effectiveness.
Proceedings of the Software Quality and Productivity: Theory, 1994
A Two-Semester Undergraduate Sequence in Software Engineering: Architecutre & Experience.
Proceedings of the Software Engineering Education, 1994
A Theoretical Comparison Between Mutation and Data Flow Based Test Adequacy Criteria.
Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, 1994
1993
Proceedings of the 7th Brazilian Symposium on Software Engineering, 1993
Proceedings of the Fourth International Symposium on Software Reliability Engineering, 1993
1992
Int. J. Parallel Program., 1992
1991
Proceedings of the Fifteenth Annual International Computer Software and Applications Conference, 1991
Proceedings of the Fifteenth Annual International Computer Software and Applications Conference, 1991
1990
Exploiting Parallelism Across Program Execution: A Unification Technique and Its Analysis.
IEEE Trans. Parallel Distributed Syst., 1990
J. Parallel Distributed Comput., 1990
1989
Proceedings of the ACM SIGSOFT '89 Third Symposium on Testing, Analysis, and Verification, 1989
1988