Aditya P. Mathur

Orcid: 0000-0002-9356-6286

Affiliations:
  • Purdue University, West Lafayette, USA
  • Singapore University of Technology and Design


According to our database1, Aditya P. Mathur authored at least 164 papers between 1988 and 2023.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Introduction to the special issue on automation of software test and test code quality.
J. Softw. Evol. Process., April, 2023

Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure.
IEEE Secur. Priv., 2023

Instance-Level Semantic Maps for Vision Language Navigation.
Proceedings of the 32nd IEEE International Conference on Robot and Human Interactive Communication, 2023

2022
A Hybrid Physics-Based Data-Driven Framework for Anomaly Detection in Industrial Control Systems.
IEEE Trans. Syst. Man Cybern. Syst., 2022

AICrit: A unified framework for real-time anomaly detection in water treatment plants.
J. Inf. Secur. Appl., 2022

Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations.
Int. J. Crit. Infrastructure Prot., 2022

Design-knowledge in learning plant dynamics for detecting process anomalies in water treatment plants.
Comput. Secur., 2022

Effect of time patterns in mining process invariants for industrial control systems: an experimental study.
Proceedings of the 2nd International Workshop on Software Engineering and AI for Data Quality in Cyber-Physical Systems/Internet of Things, 2022

The Design of Cyber-Physical Exercises (CPXS).
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022

2021
Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems.
IEEE Trans. Sustain. Comput., 2021

Distributed Attack Detection in a Water Treatment Plant: Method and Case Study.
IEEE Trans. Dependable Secur. Comput., 2021

Can Replay Attacks Designed to Steal Water from Water Distribution Systems Remain Undetected?
ACM Trans. Cyber Phys. Syst., 2021

SafeCI: Avoiding process anomalies in critical infrastructure.
Int. J. Crit. Infrastructure Prot., 2021

Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation.
Cybersecur., 2021

Cascading effects of cyber-attacks on interconnected critical infrastructure.
Cybersecur., 2021

Super Detector: An Ensemble Approach for Anomaly Detection in Industrial Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2021

Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021

PCAT: PLC Command Analysis Tool for automatic incidence response in Water Treatment Plants.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Scanning the Cycle: Timing-based Authentication on PLCs.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Attacklets to Test Anomaly Detectors for Critical Infrastructure.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
<i>NoiSense Print</i>: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints.
ACM Trans. Priv. Secur., 2020

A Mechanism to Assess the Effectiveness Anomaly Detectors in Industrial Control Systems.
J. Integr. Des. Process. Sci., 2020

Attacks on smart grid: power supply interruption and malicious power generation.
Int. J. Inf. Sec., 2020

Generating invariants using design and data-centric approaches for distributed attack detection.
Int. J. Crit. Infrastructure Prot., 2020

A multilayer perceptron model for anomaly detection in water treatment plants.
Int. J. Crit. Infrastructure Prot., 2020

Deep autoencoders as anomaly detectors: Method and case study in a distributed water treatment plant.
Comput. Secur., 2020

Domain-Based Fuzzing for Supervised Learning of Anomaly Detection in Cyber-Physical Systems.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020

Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020

Investigation of Cyber Attacks on a Water Distribution System.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Dynamic Random Testing: Technique and Experimental Evaluation.
IEEE Trans. Reliab., 2019

ICS-BlockOpS: Blockchain for operational data security in industrial control system.
Pervasive Mob. Comput., 2019

A method for testing distributed anomaly detectors.
Int. J. Crit. Infrastructure Prot., 2019

A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system.
Int. J. Crit. Infrastructure Prot., 2019

A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Challenges in Secure Engineering of Critical Infrastructure Systems.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019

Assessment of a Method for Detecting Process Anomalies Using Digital-Twinning.
Proceedings of the 15th European Dependable Computing Conference, 2019

Using Datasets from Industrial Control Systems for Cyber Security Research and Education.
Proceedings of the Critical Information Infrastructures Security, 2019

Anomaly Detection in Critical Infrastructure Using Probabilistic Neural Network.
Proceedings of the Applications and Techniques in Information Security, 2019

2018
Design and assessment of an Orthogonal Defense Mechanism for a water treatment facility.
Robotics Auton. Syst., 2018

An Approach for Formal Analysis of the Security of a Water Treatment Testbed.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

On The Limits of Detecting Process Anomalies in Critical Infrastructure.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

<i>NoisePrint</i>: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
A comprehensive approach, and a case study, for conducting attack detection experiments in Cyber-Physical Systems.
Robotics Auton. Syst., 2017

NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints.
CoRR, 2017

Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Hardware Identification via Sensor Fingerprinting in a Cyber Physical System.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

WaterJam: An Experimental Case Study of Jamming Attacks on a Water Treatment System.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Access Control in Water Distribution Networks: A Case Study.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

From Design to Invariants: Detecting Attacks on Cyber Physical Systems.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

SecWater: a multi-layer security framework for water treatment plants.
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017

WADI: a water distribution testbed for research in the design of secure cyber physical systems.
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017

Integrating Design and Data Centric Approaches to Generate Invariants for Distributed Attack Detection.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
Argus: An Orthogonal Defense Framework to Protect Public Infrastructure against Cyber-Physical Attacks.
IEEE Internet Comput., 2016

Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Using Process Invariants to Detect Cyber Attacks on a Water Treatment System.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Model-based security analysis of a water treatment system.
Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2016

Empirical Assessment of Methods to Detect Cyber Attacks on a Robot.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

An Investigation into the Response of a Water Treatment System to Cyber Attacks.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study.
Proceedings of the Complex Systems Design & Management Asia - Smart Nations, 2016

A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems.
Proceedings of the Critical Information Infrastructures Security, 2016

A Dataset to Support Research in the Design of Secure Water Treatment Systems.
Proceedings of the Critical Information Infrastructures Security, 2016

SWaT: a water treatment testbed for research and training on ICS security.
Proceedings of the 2016 International Workshop on Cyber-physical Systems for Smart Water Networks, 2016

Empirical Assessment of Corrupt Sensor Data Detection Methods in a Robot.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Challenges in Testing the Design of Secure Complex Critical Public Infrastructure.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Designing [Secure] Complex Critical Public Infrastructure.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Generalized Attacker and Attack Models for Cyber Physical Systems.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Fault domain-based testing in imperfect situations: a heuristic approach and case studies.
Softw. Qual. J., 2015

Experimental Evaluation of Stealthy Attack Detection in a Robot.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Aligning Cyber-Physical System Safety and Security.
Proceedings of the Complex Systems Design & Management Asia, Designing Smart Cities: Proceedings of the First Asia, 2014

Countermeasures to Enhance Cyber-physical System Security and Safety.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Design of Intelligent Checkers to Enhance the Security and Safety of Cyber Physical Systems.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Enhancing software reliability estimates using modified adaptive testing.
Inf. Softw. Technol., 2013

Effective Crowdsourcing for Software Feature Ideation in Online Co-Creation Forums.
Proceedings of the 25th International Conference on Software Engineering and Knowledge Engineering, 2013

Intelligent Checkers to Improve Attack Detection in Cyber Physical Systems.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2012
Modeling, Analysis, and Testing of System Vulnerabilities.
Adv. Comput., 2012

A Security Assurance Framework Combining Formal Verification and Security Functional Testing.
Proceedings of the 2012 12th International Conference on Quality Software, 2012

2011
ICST 2008 Special Issue.
Softw. Test. Verification Reliab., 2011

Discriminative probabilistic models for expert search in heterogeneous information sources.
Inf. Retr., 2011

Analysis of an expert search query log.
Proceedings of the Proceeding of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2011

Teaching software testing: Experiences, lessons learned and the path forward.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011

Using Markov-Chains to Model Reliability and QoS for Deployed Service-Based Systems.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
Conformance Testing of Temporal Role-Based Access Control Systems.
IEEE Trans. Dependable Secur. Comput., 2010

Fault coverage of Constrained Random Test Selection for access control: A formal analysis.
J. Syst. Softw., 2010

Discriminative graphical models for faculty homepage discovery.
Inf. Retr., 2010

Discriminative models of integrating document evidence and document-candidate associations for expert search.
Proceedings of the Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2010

Current State of the Software Testing Education in North American Academia and Some Recommendations for the New Educators.
Proceedings of the Proceedings 23rd IEEE Conference on Software Engineering Education and Training, 2010

2009
Scalable and Effective Test Generation for Role-Based Access Control Systems.
IEEE Trans. Software Eng., 2009

Editorial.
J. Syst. Softw., 2009

Guest Editors' Introduction.
Int. J. Softw. Eng. Knowl. Eng., 2009

2008
Software Cybernetics.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Message from the guest editors.
J. Syst. Softw., 2008

IWSC 2008 Workshop Organization.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Message from the IWSC 2008 Workshop Organizers.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Quantitative Modeling for Incremental Software Process Control.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

On the Adequacy of Statecharts as a Source of Tests for Cryptographic Protocols.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Academic/Industry Collaboration in Undergraduate Software Engineering - A Fifteen Year Perspective.
Proceedings of the 2007 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2007

2006
A control-theoretic approach to the management of the software system test phase.
J. Syst. Softw., 2006

Introduction to the special section on software cybernetics.
J. Syst. Softw., 2006

2005
Interceptor Based Constraint Violation Detection.
Proceedings of the 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 2005

DIG: A Tool for Software Process Data Extraction and Grooming.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

A Software Cybernetic Approach to Control of the Software System Test Phase.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

Model-Based Software Testing and Verification.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
Software Release Control using Defect Based Quality Estimation.
Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2004

Modeling and Control of the Incremental Software Test Process.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

Computer Supported Cooperative Work in Software Engineering.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2003
Using Sensitivity Analysis to Validate a State Variable Model of the Software Test Process.
IEEE Trans. Software Eng., 2003

An Overview of Software Cybernetics.
Proceedings of the 11th International Workshop on Software Technology and Engineering Practice (STEP 2003), 2003

Monitoring the software test process using statistical process control: a logarithmic approach.
Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, 2003

Using Supervisory Control to Synthesize Safety Controllers for Connected Spaces.
Proceedings of the 3rd International Conference on Quality Software (QSIC 2003), 2003

Synthesizing Distributed Controllers for the Safe Operation of ConnectedSpaces.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

2002
A Formal Model of the Software Test Process.
IEEE Trans. Software Eng., 2002

Digital device manuals for the management of ConnectedSpaces.
IEEE Commun. Mag., 2002

Effect of Disturbances on the Convergence of Failure Intensity.
Proceedings of the 13th International Symposium on Software Reliability Engineering (ISSRE 2002), 2002

2001
Interface Mutation: An Approach for Integration Testing.
IEEE Trans. Software Eng., 2001

Interface mutation.
Softw. Test. Verification Reliab., 2001

Interface Mutation Test Adequacy Criterion: An Empirical Evaluation.
Empir. Softw. Eng., 2001

Sensitivity analysis of a state variable model of the Software Test Process.
Proceedings of the IEEE International Conference on Systems, 2001

A state model for the Software Test Process with automated parameter identification.
Proceedings of the IEEE International Conference on Systems, 2001

Many architecture-based software reliability modelsComparison of Architecture-Based Software Reliability Models.
Proceedings of the 12th International Symposium on Software Reliability Engineering (ISSRE 2001), 2001

Feedback Control of the Software Test Process Through Measurements of Software Reliability.
Proceedings of the 12th International Symposium on Software Reliability Engineering (ISSRE 2001), 2001

A XML based Policy-Driven Management Information Service.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

2000
Non-Intrusive Testing, Monitoring and Control of Distributed CORBA Objects.
Proceedings of the TOOLS 2000: 33rd International Conference on Technology of Object-Oriented Languages and Systems, 2000

Interface Mutation to Assess the Adequacy of Tests for Components and Systems.
Proceedings of the TOOLS 2000: 34th International Conference on Technology of Object-Oriented Languages and Systems, 30 July, 2000

Generating Test Data for Branch Coverage.
Proceedings of the Fifteenth IEEE International Conference on Automated Software Engineering, 2000

Testing for Software Vulnerability Using Environment Perturbation.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

1999
Test set size minimization and fault detection effectiveness: A case study in a space application.
J. Syst. Softw., 1999

UNA Based Iterative Test Data Generation and Its Evaluation.
Proceedings of the 14th IEEE International Conference on Automated Software Engineering, 1999

Security Relevancy Analysis on the Registry of Windows NT 4.0.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Effect of Test Set Minimization on Fault Detection Effectiveness.
Softw. Pract. Exp., 1998

Automated Test Data Generation Using an Iterative Relaxation Method.
Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 1998

1997
On the estimation of reliability of a software system using reliabilities of its components.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997

1996
Integration testing using interface mutation.
Proceedings of the Seventh International Symposium on Software Reliability Engineering, 1996

On predicting reliability of modules using code coverage.
Proceedings of the 1996 conference of the Centre for Advanced Studies on Collaborative Research, 1996

1995
Some Critical Remarks on a Hierarchy of Fault-Detecting Abilities of Test Methods.
IEEE Trans. Software Eng., 1995

Fault detection effectiveness of mutation and data flow testing.
Softw. Qual. J., 1995

Reducing the cost of mutation testing: An empirical study.
J. Syst. Softw., 1995

On the correlation between code coverage and software reliability.
Proceedings of the Sixth International Symposium on Software Reliability Engineering, 1995

LISTEN: A Tool to Investigate the Use of Sound for the Analysis of Program Behavior.
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995

1994
An Empirical Comparison of Data Flow and Mutation-Based Test Adequacy Criteria.
Softw. Test. Verification Reliab., 1994

Experiments with <i>Program unification</i> on the Cray Y-MP.
Concurr. Pract. Exp., 1994

Constrained Mutation in C programs.
Proceedings of the 8th Brazilian Symposium on Software Engineering, 1994

Effect of test set size and block coverage on the fault detection effectiveness.
Proceedings of the 5th International Symposium on Software Reliability Engineering, 1994

A case study to investigate sensitivity of reliability estimates to errors in operational profile.
Proceedings of the 5th International Symposium on Software Reliability Engineering, 1994

Mutation Versus All-uses: An Empirical Evaluation of Cost, Strength and Effectiveness.
Proceedings of the Software Quality and Productivity: Theory, 1994

A Two-Semester Undergraduate Sequence in Software Engineering: Architecutre & Experience.
Proceedings of the Software Engineering Education, 1994

A Theoretical Comparison Between Mutation and Data Flow Based Test Adequacy Criteria.
Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, 1994

1993
High-performance mutation testing.
J. Syst. Softw., 1993

Evaluation of The Cost of Alternate Mutation Strategies.
Proceedings of the 7th Brazilian Symposium on Software Engineering, 1993

TERSE: A tool for evaluating software reliability models.
Proceedings of the Fourth International Symposium on Software Reliability Engineering, 1993

1992
Assessing Testing Tools in Research and Education.
IEEE Softw., 1992

An application of program unification to priority queue vectorization.
Int. J. Parallel Program., 1992

1991
High Performance Software Testing on SIMD Machines.
IEEE Trans. Software Eng., 1991

Performance, effectiveness, and reliability issues in software testing.
Proceedings of the Fifteenth Annual International Computer Software and Applications Conference, 1991

Compiler-integrated program mutation.
Proceedings of the Fifteenth Annual International Computer Software and Applications Conference, 1991

1990
Exploiting Parallelism Across Program Execution: A Unification Technique and Its Analysis.
IEEE Trans. Parallel Distributed Syst., 1990

Concurrency Enhancement through Program Unification: A Performance Analysis.
J. Parallel Distributed Comput., 1990

1989
PMothra: Scheduling Mutants for Execution on a Hypercube.
Proceedings of the ACM SIGSOFT '89 Third Symposium on Testing, Analysis, and Verification, 1989

1988
Modeling Mutation on a Vector Processor.
Proceedings of the Proceedings, 1988


  Loading...