Publications

189 result(s)

Journal papers

From Design to Invariants: Detecting Attacks on Cyber Physical Systems
Adepu S, and Mathur A, 2017, “From Design to Invariants: Detecting Attacks on Cyber Physical Systems”, IEEE International Conference on Software Quality, Reliability & Security

Conference papers/presentations

Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3
Antonioli D, Ghaeini H. R, Adepu S, Ochoa M, and Tippenhauer N. O, 2017, “Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3”, 3rd ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC)

Conference papers/presentations

Hardware Identification via Sensor Fingerprinting in a Cyber Physical System
Ahmed C. M. and Mathur A, 2017, “Hardware Identification via Sensor Fingerprinting in a Cyber Physical System”, IEEE International Conference on Software Quality, Reliability & Security

Conference papers/presentations

How to Align the Safety and Security for Autonomous Vehicles?
Cui J, Sabaliauskaite G, 2017, “How to Align the Safety and Security for Autonomous Vehicles?,” The Second International Conference on Cyber-Technologies and Cyber-Systems (CYBER)

Conference papers/presentations

Integrating Autonomous Vehicle Safety and Security Using the Six-Step Model, ISO 26262, SAE J3061, and SAE J3016
Cui J, Sabaliauskaite G, 2017, “Integrating Autonomous Vehicle Safety and Security Using the Six-Step Model, ISO 26262, SAE J3061, and SAE J3016,” CYPHY: Security Issues and Solutions for Cyber-Physical Systems, The Second International Conference on Cyber-Technologies and Cyber-Systems (CYBER)

Conference papers/presentations

Integrating design and data centric approaches to generate invariants for distributed attack detection
Umer A.M, Junejo K.N, Mathur A, and Adepu S, 2017, “Integrating design and data centric approaches to generate invariants for distributed attack detection,” 3rd ACM Workshop on CPS Security and Privacy

Conference papers/presentations

Integrating Six-Step Model with Information Flow Diagrams for Comprehensive Analysis of Cyber-Physical System Safety and Security
Sabaliauskaite G, Adepu S, 2017, “Integrating Six-Step Model with Information Flow Diagrams for Comprehensive Analysis of Cyber-Physical System Safety and Security”, The 18th IEEE International Symposium on High Assurance Systems Engineering (HASE)

Journal papers

Interference assisted secret key generation in discrete memoryless wiretap channel with public feedback
P.Mohapatra, J. Lee, and T. Q. S. Quek, 2017, “Interference assisted secret key generation in discrete memoryless wiretap channel with public feedback,” IEEE Transactions on Information Forensics and Security

Conference papers/presentations

Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study
Adepu S. and Mathur A, 2017, “Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study,” 2nd Asia Pacific Conference on Complex Systems Design and Management

Journal papers

IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods
Siby, S, Maiti, R, Tippenhauer, N, 2017, “IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods”, http://arxiv.org/abs/1701.05007