Neetesh Saxena

Orcid: 0000-0002-6437-0807

According to our database1, Neetesh Saxena authored at least 49 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards Developing an Asset-Criticality Identification Framework in Smart Grids.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification.
IET Cyper-Phys. Syst.: Theory & Appl., September, 2023

Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective.
ACM Trans. Cyber Phys. Syst., April, 2023

Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges.
IEEE Trans. Ind. Informatics, 2023

CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2023

Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: A Review.
ACM Comput. Surv., 2023

Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication.
Comput. Secur., 2023

Extended Dependency Modeling Technique for Cyber Risk Identification in ICS.
IEEE Access, 2023

ARCSG: Advancing Resilience of Cyber-Physical Smart Grid: An Integrated Co-Simulation Approach Incorporating Indicators of Compromise.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Clarity: Analysing Security in Web Applications.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Wheels on the Modbus - Attacking ModbusTCP Communications.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

On The Efficacy of Physics-Informed Context-Based Anomaly Detection for Power Systems.
Proceedings of the IEEE International Conference on Communications, 2022

ATVSA: Vehicle Driver Profiling for Situational Awareness.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Poster: Physics-Informed Augmentation for Contextual Anomaly Detection in Smart Grid.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Impact Evaluation of Malicious Control Commands in Cyber-Physical Smart Grids.
IEEE Trans. Sustain. Comput., 2021

Cyber Risks Prediction and Analysis in Medical Emergency Equipment for Situational Awareness.
Sensors, 2021

Security and Privacy in IoT Smart Healthcare.
IEEE Internet Comput., 2021

A provably secure authentication scheme for RFID-enabled UAV applications.
Comput. Commun., 2021

Machine Learning Algorithm for Detection of False Data Injection Attack in Power System.
Proceedings of the International Conference on Information Networking, 2021

Optimized Predictive Control for AGC Cyber Resiliency.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2020

BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users.
IEEE Trans. Dependable Secur. Comput., 2020

Introduction to the Special Issue on User-Centric Security and Safety for CPS.
ACM Trans. Cyber Phys. Syst., 2020

PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs.
Computer, 2020

On the Feasibility of DoS Attack on Smart Door Lock IoT Network.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020

Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in Industrial Context.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2018
Efficient Signature Scheme for Delivering Authentic Control Commands in the Smart Grid.
IEEE Trans. Smart Grid, 2018

Integrated Distributed Authentication Protocol for Smart Grid Communications.
IEEE Syst. J., 2018

LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment.
IEEE Commun. Mag., 2018

Systematic Analysis: Resistance to Traffic Analysis Attacks in Tor System for Critical Infrastructures.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

LaCSys: Lattice-Based Cryptosystem for Secure Communication in Smart Grid Environment.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Securing restricted publisher-subscriber communications in smart grid substations.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

2017
Network Security and Privacy Challenges in Smart Vehicle-to-Grid.
IEEE Wirel. Commun., 2017

Dynamic Secrets and Secret Keys Based Scheme for Securing Last Mile Smart Grid Wireless Communication.
IEEE Trans. Ind. Informatics, 2017

Secure algorithms for SAKA protocol in the GSM network.
Proceedings of the 10th IFIP Wireless and Mobile Networking Conference, 2017

Secure and privacy-preserving concentration of metering data in AMI networks.
Proceedings of the IEEE International Conference on Communications, 2017

CPSA: A Cyber-Physical Security Assessment Tool for Situational Awareness in Smart Grid.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
Authentication Protocol for an IoT-Enabled LTE Network.
ACM Trans. Internet Techn., 2016

Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2016

Authentication Scheme for Flexible Charging and Discharging of Mobile Vehicles in the V2G Networks.
IEEE Trans. Inf. Forensics Secur., 2016

2015
ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks.
Wirel. Pers. Commun., 2015

Lightweight Privacy-Preserving Authentication Scheme for V2G Networks in the Smart Grid.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Secure-AKA: An Efficient AKA Protocol for UMTS Networks.
Wirel. Pers. Commun., 2014

EasySMS: A Protocol for End-to-End Secure Transmission of SMS.
IEEE Trans. Inf. Forensics Secur., 2014

SecureSMS: A secure SMS protocol for VAS and other applications.
J. Syst. Softw., 2014

2013
An enhanced NPA protocol for secure communications in GSM network.
Int. J. Secur. Networks, 2013

An Efficient Batch Verification Protocol for Value Added Services.
Proceedings of the IEEE International Conference on Systems, 2013

2012
A secure approach for SMS in GSM network.
Proceedings of the CUBE International IT Conference & Exhibition, 2012


  Loading...