default search action
Sridhar Adepu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Nianyu Li, Mingyue Zhang, Jialong Li, Sridhar Adepu, Eunsuk Kang, Zhi Jin:
A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems. ACM Trans. Auton. Adapt. Syst. 19(2): 12 (2024) - [c36]Kornkamon Mathuros, Sarad Venugopalan, Sridhar Adepu:
WaXAI: Explainable Anomaly Detection in Industrial Control Systems and Water Systems. CPSS@AsiaCCS 2024: 3-15 - [c35]Ruizhe Wang, Sarad Venugopalan, Sridhar Adepu:
Safety Analysis for Cyber-Physical Systems Under Cyber Attacks Using Digital Twin. CSR 2024: 1-8 - 2023
- [j16]Chenglu Jin, Zheng Yang, Tao Xiang, Sridhar Adepu, Jianying Zhou:
HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 18: 1080-1094 (2023) - [j15]Tianyang Cai, Tao Jia, Sridhar Adepu, Yuqi Li, Zheng Yang:
ADAM: An Adaptive DDoS Attack Mitigation Scheme in Software-Defined Cyber-Physical System. IEEE Trans. Ind. Informatics 19(6): 7802-7813 (2023) - [c34]Alyah Alfageh, Sridhar Adepu, Charalambos Konstantinou:
Water Risk-Proofed: Risk Assessment in Water Desalination. CPSIOTSEC@CCS 2023: 11-23 - [c33]Feras Shahbi, Joseph Gardiner, Sridhar Adepu, Awais Rashid:
A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts. EuroS&P Workshops 2023: 320-328 - [i8]Rajib Ranjan Maiti, Sridhar Adepu, Emil Lupu:
ICCPS: Impact discovery using causal inference for cyber attacks in CPSs. CoRR abs/2307.14161 (2023) - 2022
- [j14]Sridhar Adepu, Nianyu Li, Eunsuk Kang, David Garlan:
Modeling and Analysis of Explanation for Secure Industrial Control Systems. ACM Trans. Auton. Adapt. Syst. 17(3-4): 1-26 (2022) - [c32]Yuqing Zhu, Sridhar Adepu, Kushagra Dixit, Ying Yang, Xin Lou:
Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 46-66 - [c31]Anchal Ahalawat, Sridhar Adepu, Joseph Gardiner:
Security Threats in Electric Vehicle Charging. SmartGridComm 2022: 399-404 - [e1]Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - 2021
- [j13]Venkata Reddy Palleti, Sridhar Adepu, Vishrut Kumar Mishra, Aditya Mathur:
Cascading effects of cyber-attacks on interconnected critical infrastructure. Cybersecur. 4(1): 8 (2021) - [j12]Zheng Yang, Sridhar Adepu, Jianying Zhou:
Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography. IEEE Secur. Priv. 19(5): 57-65 (2021) - [j11]Sridhar Adepu, Aditya Mathur:
SafeCI: Avoiding process anomalies in critical infrastructure. Int. J. Crit. Infrastructure Prot. 34: 100435 (2021) - [j10]Edwin Franco Myloth Josephlal, Sridhar Adepu, Zheng Yang, Jianying Zhou:
Enabling isolation and recovery in PLC redundancy framework of metro train systems. Int. J. Inf. Sec. 20(6): 783-795 (2021) - [j9]Sridhar Adepu, Aditya Mathur:
Distributed Attack Detection in a Water Treatment Plant: Method and Case Study. IEEE Trans. Dependable Secur. Comput. 18(1): 86-99 (2021) - [j8]Sridhar Adepu, Aditya Mathur:
Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems. IEEE Trans. Sustain. Comput. 6(2): 231-244 (2021) - [c30]Madhumitha Balaji, Siddhant Shrivastava, Sridhar Adepu, Aditya Mathur:
Super Detector: An Ensemble Approach for Anomaly Detection in Industrial Control Systems. CRITIS 2021: 24-43 - [i7]Mingyue Zhang, Nianyu Li, Sridhar Adepu, Eunsuk Kang, Zhi Jin:
A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems. CoRR abs/2112.07588 (2021) - 2020
- [j7]Tanmoy Kanti Das, Sridhar Adepu, Jianying Zhou:
Anomaly detection in Industrial Control Systems using Logical Analysis of Data. Comput. Secur. 96: 101935 (2020) - [j6]Muhammad Azmi Umer, Aditya Mathur, Khurum Nazir Junejo, Sridhar Adepu:
Generating invariants using design and data-centric approaches for distributed attack detection. Int. J. Crit. Infrastructure Prot. 28: 100341 (2020) - [j5]Sridhar Adepu, Nandha Kumar Kandasamy, Jianying Zhou, Aditya Mathur:
Attacks on smart grid: power supply interruption and malicious power generation. Int. J. Inf. Sec. 19(2): 189-211 (2020) - [c29]Sridhar Adepu, Venkata Reddy Palleti, Gyanendra Mishra, Aditya Mathur:
Investigation of Cyber Attacks on a Water Distribution System. ACNS Workshops 2020: 274-291 - [c28]Sridhar Adepu, Ferdinand Brasser, Luis Garcia, Michael Rodler, Lucas Davi, Ahmad-Reza Sadeghi, Saman A. Zonouz:
Control Behavior Integrity for Distributed Cyber-Physical Systems. ICCPS 2020: 30-40 - [c27]Nianyu Li, Sridhar Adepu, Eunsuk Kang, David Garlan:
Explanations for human-on-the-loop: a probabilistic model checking approach. SEAMS@ICSE 2020: 181-187
2010 – 2019
- 2019
- [j4]Andrei Bytes, Sridhar Adepu, Jianying Zhou:
Towards Semantic Sensitive Feature Profiling of IoT Devices. IEEE Internet Things J. 6(5): 8056-8064 (2019) - [j3]Aung Maw, Sridhar Adepu, Aditya Mathur:
ICS-BlockOpS: Blockchain for operational data security in industrial control system. Pervasive Mob. Comput. 59 (2019) - [c26]Edwin Franco Myloth Josephlal, Sridhar Adepu:
Vulnerability Analysis of an Automotive Infotainment System's WIFI Capability. HASE 2019: 241-246 - [c25]Sridhar Adepu, Eunsuk Kang, Aditya P. Mathur:
Challenges in Secure Engineering of Critical Infrastructure Systems. ASE Workshops 2019: 61-64 - [c24]Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang:
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences. ASE 2019: 962-973 - [i6]Sridhar Adepu, Venkata Reddy Palleti, Gyanendra Mishra, Aditya Mathur:
Investigation of Cyber Attacks on a Water Distribution System. CoRR abs/1906.02279 (2019) - [i5]Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang:
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences. CoRR abs/1909.05410 (2019) - [i4]Chenglu Jin, Zheng Yang, Sridhar Adepu, Jianying Zhou:
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data. IACR Cryptol. ePrint Arch. 2019: 450 (2019) - 2018
- [j2]Siddhant Shrivastava, Sridhar Adepu, Aditya Mathur:
Design and assessment of an Orthogonal Defense Mechanism for a water treatment facility. Robotics Auton. Syst. 101: 114-125 (2018) - [c23]Qin Lin, Sridhar Adepu, Sicco Verwer, Aditya Mathur:
TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems. AsiaCCS 2018: 525-536 - [c22]Sridhar Adepu, Nandha Kumar Kandasamy, Aditya Mathur:
EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security. CyberICPS/SECPRE@ESORICS 2018: 37-52 - [c21]Sai Sidharth Patlolla, Bruce M. McMillin, Sridhar Adepu, Aditya Mathur:
An Approach for Formal Analysis of the Security of a Water Treatment Testbed. PRDC 2018: 115-124 - [i3]Sridhar Adepu, Aditya Mathur:
Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems. CoRR abs/1809.04786 (2018) - [i2]Sridhar Adepu, Ferdinand Brasser, Luis Garcia, Michael Rodler, Lucas Davi, Ahmad-Reza Sadeghi, Saman A. Zonouz:
Control Behavior Integrity for Distributed Cyber-Physical Systems. CoRR abs/1812.08310 (2018) - 2017
- [c20]Daniele Antonioli, Hamid Reza Ghaeini, Sridhar Adepu, Martín Ochoa, Nils Ole Tippenhauer:
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3. CPS-SPC@CCS 2017: 93-102 - [c19]Muhammad Azmi Umer, Aditya Mathur, Khurum Nazir Junejo, Sridhar Adepu:
Integrating Design and Data Centric Approaches to Generate Invariants for Distributed Attack Detection. CPS-SPC@CCS 2017: 131-136 - [c18]Giedre Sabaliauskaite, Sridhar Adepu:
Integrating Six-Step Model with Information Flow Diagrams for Comprehensive Analysis of Cyber-Physical System Safety and Security. HASE 2017: 41-48 - [c17]Koyena Pal, Sridhar Adepu, Jonathan Goh:
Effectiveness of Association Rules Mining for Invariants Generation in Cyber-Physical Systems. HASE 2017: 124-127 - [c16]Jonathan Goh, Sridhar Adepu, Marcus Tan, Zi Shan Lee:
Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks. HASE 2017: 140-145 - [c15]Sridhar Adepu, Gyanendra Mishra, Aditya Mathur:
Access Control in Water Distribution Networks: A Case Study. QRS 2017: 184-191 - [c14]Sridhar Adepu, Jay Prakash, Aditya Mathur:
WaterJam: An Experimental Case Study of Jamming Attacks on a Water Treatment System. QRS Companion 2017: 341-347 - [c13]Sridhar Adepu, Aditya Mathur:
From Design to Invariants: Detecting Attacks on Cyber Physical Systems. QRS Companion 2017: 533-540 - [i1]Daniele Antonioli, Hamid Reza Ghaeini, Sridhar Adepu, Martín Ochoa, Nils Ole Tippenhauer:
Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3. CoRR abs/1702.03067 (2017) - 2016
- [j1]Sridhar Adepu, Siddhant Shrivastava, Aditya Mathur:
Argus: An Orthogonal Defense Framework to Protect Public Infrastructure against Cyber-Physical Attacks. IEEE Internet Comput. 20(5): 38-45 (2016) - [c12]Sridhar Adepu, Aditya Mathur:
Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant. AsiaCCS 2016: 449-460 - [c11]Sridhar Adepu, Aditya Mathur:
Generalized Attacker and Attack Models for Cyber Physical Systems. COMPSAC 2016: 283-292 - [c10]Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, Aditya Mathur:
A Dataset to Support Research in the Design of Secure Water Treatment Systems. CRITIS 2016: 88-99 - [c9]Giedre Sabaliauskaite, Sridhar Adepu, Aditya Mathur:
A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems. CRITIS 2016: 189-200 - [c8]Sridhar Adepu, Aditya P. Mathur:
Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study. CSDM Asia 2016: 75-94 - [c7]Sridhar Adepu, Aditya Mathur:
An Investigation into the Response of a Water Treatment System to Cyber Attacks. HASE 2016: 141-148 - [c6]Eunsuk Kang, Sridhar Adepu, Daniel Jackson, Aditya P. Mathur:
Model-based security analysis of a water treatment system. SEsCPS@ICSE 2016: 22-28 - [c5]Sridhar Adepu, Aditya Mathur:
Using Process Invariants to Detect Cyber Attacks on a Water Treatment System. SEC 2016: 91-104 - [c4]Sridhar Adepu, Aditya P. Mathur:
Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions. SG-CRC 2016: 59-74 - 2015
- [c3]Sridhar Adepu, Aditya Mathur, Jagadeesh Gunda, Sasa Z. Djokic:
An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical Systems. ICA3PP (3) 2015: 785-798 - 2013
- [c2]Sridhar Adepu, D. Srinivasulu:
Slicing MATLAB Simulink/Stateflow Models. ICACNI 2013: 737-743 - [c1]D. Srinivasulu, Sridhar Adepu, Durga Prasad Mohapatra:
Evaluation of Software Understandability Using Rough Sets. ICACNI 2013: 939-946
Coauthor Index
aka: Aditya Mathur
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint