Aditya P. Mathur

According to our database1, Aditya P. Mathur authored at least 130 papers between 1988 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Dynamic Random Testing: Technique and Experimental Evaluation.
IEEE Trans. Reliability, 2019

A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system.
IJCIP, 2019

Investigation of Cyber Attacks on a Water Distribution System.
CoRR, 2019

A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Design and assessment of an Orthogonal Defense Mechanism for a water treatment facility.
Robotics and Autonomous Systems, 2018

Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems.
CoRR, 2018

An Approach for Formal Analysis of the Security of a Water Treatment Testbed.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

On The Limits of Detecting Process Anomalies in Critical Infrastructure.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
A comprehensive approach, and a case study, for conducting attack detection experiments in Cyber-Physical Systems.
Robotics and Autonomous Systems, 2017

NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints.
CoRR, 2017

Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Hardware Identification via Sensor Fingerprinting in a Cyber Physical System.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

WaterJam: An Experimental Case Study of Jamming Attacks on a Water Treatment System.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Access Control in Water Distribution Networks: A Case Study.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

From Design to Invariants: Detecting Attacks on Cyber Physical Systems.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

SecWater: a multi-layer security framework for water treatment plants.
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017

WADI: a water distribution testbed for research in the design of secure cyber physical systems.
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017

Integrating Design and Data Centric Approaches to Generate Invariants for Distributed Attack Detection.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
Argus: An Orthogonal Defense Framework to Protect Public Infrastructure against Cyber-Physical Attacks.
IEEE Internet Computing, 2016

Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Using Process Invariants to Detect Cyber Attacks on a Water Treatment System.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Model-based security analysis of a water treatment system.
Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2016

Empirical Assessment of Methods to Detect Cyber Attacks on a Robot.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

An Investigation into the Response of a Water Treatment System to Cyber Attacks.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study.
Proceedings of the Complex Systems Design & Management Asia - Smart Nations, 2016

A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems.
Proceedings of the Critical Information Infrastructures Security, 2016

A Dataset to Support Research in the Design of Secure Water Treatment Systems.
Proceedings of the Critical Information Infrastructures Security, 2016

SWaT: a water treatment testbed for research and training on ICS security.
Proceedings of the 2016 International Workshop on Cyber-physical Systems for Smart Water Networks, 2016

Empirical Assessment of Corrupt Sensor Data Detection Methods in a Robot.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Challenges in Testing the Design of Secure Complex Critical Public Infrastructure.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Designing [Secure] Complex Critical Public Infrastructure.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Generalized Attacker and Attack Models for Cyber Physical Systems.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Fault domain-based testing in imperfect situations: a heuristic approach and case studies.
Software Quality Journal, 2015

Experimental Evaluation of Stealthy Attack Detection in a Robot.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Aligning Cyber-Physical System Safety and Security.
Proceedings of the Complex Systems Design & Management Asia, Designing Smart Cities: Proceedings of the First Asia, 2014

Countermeasures to Enhance Cyber-physical System Security and Safety.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Design of Intelligent Checkers to Enhance the Security and Safety of Cyber Physical Systems.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Enhancing software reliability estimates using modified adaptive testing.
Information & Software Technology, 2013

Effective Crowdsourcing for Software Feature Ideation in Online Co-Creation Forums.
Proceedings of the 25th International Conference on Software Engineering and Knowledge Engineering, 2013

Intelligent Checkers to Improve Attack Detection in Cyber Physical Systems.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2012
Modeling, Analysis, and Testing of System Vulnerabilities.
Advances in Computers, 2012

A Security Assurance Framework Combining Formal Verification and Security Functional Testing.
Proceedings of the 2012 12th International Conference on Quality Software, 2012

2011
ICST 2008 Special Issue.
Softw. Test., Verif. Reliab., 2011

Discriminative probabilistic models for expert search in heterogeneous information sources.
Inf. Retr., 2011

Analysis of an expert search query log.
Proceedings of the Proceeding of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2011

Teaching software testing: Experiences, lessons learned and the path forward.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011

Using Markov-Chains to Model Reliability and QoS for Deployed Service-Based Systems.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
Conformance Testing of Temporal Role-Based Access Control Systems.
IEEE Trans. Dependable Sec. Comput., 2010

Fault coverage of Constrained Random Test Selection for access control: A formal analysis.
Journal of Systems and Software, 2010

Discriminative graphical models for faculty homepage discovery.
Inf. Retr., 2010

Discriminative models of integrating document evidence and document-candidate associations for expert search.
Proceedings of the Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2010

Current State of the Software Testing Education in North American Academia and Some Recommendations for the New Educators.
Proceedings of the Proceedings 23rd IEEE Conference on Software Engineering Education and Training, 2010

2009
Scalable and Effective Test Generation for Role-Based Access Control Systems.
IEEE Trans. Software Eng., 2009

Editorial.
Journal of Systems and Software, 2009

Guest Editors' Introduction.
International Journal of Software Engineering and Knowledge Engineering, 2009

2008
Software Cybernetics.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Message from the guest editors.
Journal of Systems and Software, 2008

IWSC 2008 Workshop Organization.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Message from the IWSC 2008 Workshop Organizers.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Quantitative Modeling for Incremental Software Process Control.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

On the Adequacy of Statecharts as a Source of Tests for Cryptographic Protocols.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Academic/Industry Collaboration in Undergraduate Software Engineering - A Fifteen Year Perspective.
Proceedings of the 2007 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2007

2006
A control-theoretic approach to the management of the software system test phase.
Journal of Systems and Software, 2006

Introduction to the special section on software cybernetics.
Journal of Systems and Software, 2006

2005
Interceptor Based Constraint Violation Detection.
Proceedings of the 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 2005

DIG: A Tool for Software Process Data Extraction and Grooming.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

A Software Cybernetic Approach to Control of the Software System Test Phase.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

Model-Based Software Testing and Verification.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
Software Release Control using Defect Based Quality Estimation.
Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2004

Modeling and Control of the Incremental Software Test Process.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

Computer Supported Cooperative Work in Software Engineering.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2003
Using Sensitivity Analysis to Validate a State Variable Model of the Software Test Process.
IEEE Trans. Software Eng., 2003

An Overview of Software Cybernetics.
Proceedings of the 11th International Workshop on Software Technology and Engineering Practice (STEP 2003), 2003

Monitoring the software test process using statistical process control: a logarithmic approach.
Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, 2003

Using Supervisory Control to Synthesize Safety Controllers for Connected Spaces.
Proceedings of the 3rd International Conference on Quality Software (QSIC 2003), 2003

Synthesizing Distributed Controllers for the Safe Operation of ConnectedSpaces.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

2002
A Formal Model of the Software Test Process.
IEEE Trans. Software Eng., 2002

Effect of Disturbances on the Convergence of Failure Intensity.
Proceedings of the 13th International Symposium on Software Reliability Engineering (ISSRE 2002), 2002

2001
Interface Mutation: An Approach for Integration Testing.
IEEE Trans. Software Eng., 2001

Interface mutation.
Softw. Test., Verif. Reliab., 2001

Interface Mutation Test Adequacy Criterion: An Empirical Evaluation.
Empirical Software Engineering, 2001

Sensitivity analysis of a state variable model of the Software Test Process.
Proceedings of the IEEE International Conference on Systems, 2001

A state model for the Software Test Process with automated parameter identification.
Proceedings of the IEEE International Conference on Systems, 2001

Many architecture-based software reliability modelsComparison of Architecture-Based Software Reliability Models.
Proceedings of the 12th International Symposium on Software Reliability Engineering (ISSRE 2001), 2001

Feedback Control of the Software Test Process Through Measurements of Software Reliability.
Proceedings of the 12th International Symposium on Software Reliability Engineering (ISSRE 2001), 2001

A XML based Policy-Driven Management Information Service.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

2000
Non-Intrusive Testing, Monitoring and Control of Distributed CORBA Objects.
Proceedings of the TOOLS 2000: 33rd International Conference on Technology of Object-Oriented Languages and Systems, 2000

Interface Mutation to Assess the Adequacy of Tests for Components and Systems.
Proceedings of the TOOLS 2000: 34th International Conference on Technology of Object-Oriented Languages and Systems, 30 July, 2000

Generating Test Data for Branch Coverage.
Proceedings of the Fifteenth IEEE International Conference on Automated Software Engineering, 2000

Testing for Software Vulnerability Using Environment Perturbation.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

1999
Test set size minimization and fault detection effectiveness: A case study in a space application.
Journal of Systems and Software, 1999

UNA Based Iterative Test Data Generation and Its Evaluation.
Proceedings of the 14th IEEE International Conference on Automated Software Engineering, 1999

Security Relevancy Analysis on the Registry of Windows NT 4.0.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Effect of Test Set Minimization on Fault Detection Effectiveness.
Softw., Pract. Exper., 1998

Automated Test Data Generation Using an Iterative Relaxation Method.
Proceedings of the SIGSOFT '98, 1998

1997
On the estimation of reliability of a software system using reliabilities of its components.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997

Test Set Size Minimization and Fault Detection Effectiveness: A Case Study in a Space Application.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997

1996
Integration testing using interface mutation.
Proceedings of the Seventh International Symposium on Software Reliability Engineering, 1996

On predicting reliability of modules using code coverage.
Proceedings of the 1996 conference of the Centre for Advanced Studies on Collaborative Research, 1996

1995
Some Critical Remarks on a Hierarchy of Fault-Detecting Abilities of Test Methods.
IEEE Trans. Software Eng., 1995

Fault detection effectiveness of mutation and data flow testing.
Software Quality Journal, 1995

Reducing the cost of mutation testing: An empirical study.
Journal of Systems and Software, 1995

On the correlation between code coverage and software reliability.
Proceedings of the Sixth International Symposium on Software Reliability Engineering, 1995

Effect of Test Set Minimization on Fault Detection Effectiveness.
Proceedings of the 17th International Conference on Software Engineering, 1995

LISTEN: A Tool to Investigate the Use of Sound for the Analysis of Program Behavior.
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995

1994
An Empirical Comparison of Data Flow and Mutation-Based Test Adequacy Criteria.
Softw. Test., Verif. Reliab., 1994

Experiments with Program unification on the Cray Y-MP.
Concurrency - Practice and Experience, 1994

Effect of test set size and block coverage on the fault detection effectiveness.
Proceedings of the 5th International Symposium on Software Reliability Engineering, 1994

A case study to investigate sensitivity of reliability estimates to errors in operational profile.
Proceedings of the 5th International Symposium on Software Reliability Engineering, 1994

Mutation Versus All-uses: An Empirical Evaluation of Cost, Strength and Effectiveness.
Proceedings of the Software Quality and Productivity: Theory, 1994

A Two-Semester Undergraduate Sequence in Software Engineering: Architecutre & Experience.
Proceedings of the Software Engineering Education, 1994

A Theoretical Comparison Between Mutation and Data Flow Based Test Adequacy Criteria.
Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, 1994

1993
High-performance mutation testing.
Journal of Systems and Software, 1993

TERSE: A tool for evaluating software reliability models.
Proceedings of the Fourth International Symposium on Software Reliability Engineering, 1993

1992
Assessing Testing Tools in Research and Education.
IEEE Software, 1992

An application of program unification to priority queue vectorization.
International Journal of Parallel Programming, 1992

1991
High Performance Software Testing on SIMD Machines.
IEEE Trans. Software Eng., 1991

Performance, effectiveness, and reliability issues in software testing.
Proceedings of the Fifteenth Annual International Computer Software and Applications Conference, 1991

Compiler-integrated program mutation.
Proceedings of the Fifteenth Annual International Computer Software and Applications Conference, 1991

1990
Exploiting Parallelism Across Program Execution: A Unification Technique and Its Analysis.
IEEE Trans. Parallel Distrib. Syst., 1990

Concurrency Enhancement through Program Unification: A Performance Analysis.
J. Parallel Distrib. Comput., 1990

1989
PMothra: Scheduling Mutants for Execution on a Hypercube.
Proceedings of the ACM SIGSOFT '89 Third Symposium on Testing, Analysis, and Verification, 1989

1988
Modeling Mutation on a Vector Processor.
Proceedings of the Proceedings, 1988


  Loading...