What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sridhar Adepu
Google Scholar
12
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/csr2
Safety Analysis for Cyber-Physical Systems Under Cyber Attacks Using Digital Twin.
Ruizhe Wang
Sarad Venugopalan
Sridhar Adepu
2023
journals/tifs
HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things.
Chenglu Jin
Zheng Yang
Tao Xiang
Sridhar Adepu
Jianying Zhou
2023
conf/eurosp
A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts.
Feras Shahbi
Joseph Gardiner
Sridhar Adepu
Awais Rashid
2022
conf/esorics
Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles.
Yuqing Zhu
Sridhar Adepu
Kushagra Dixit
Ying Yang
Xin Lou
2020
journals/compsec
Anomaly detection in Industrial Control Systems using Logical Analysis of Data.
Tanmoy Kanti Das
Sridhar Adepu
Jianying Zhou
2020
conf/acns
Investigation of Cyber Attacks on a Water Distribution System.
Sridhar Adepu
Venkata Reddy Palleti
Gyanendra Mishra
Aditya Mathur
2018
conf/ccs
TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems.
Qin Lin
Sridhar Adepu
Sicco Verwer
Aditya Mathur
2018
conf/esorics
EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security.
Sridhar Adepu
Nandha Kumar Kandasamy
Aditya Mathur
2017
conf/ccs
Integrating Design and Data Centric Approaches to Generate Invariants for Distributed Attack Detection.
Muhammad Azmi Umer
Aditya Mathur
Khurum Nazir Junejo
Sridhar Adepu
2017
conf/ccs
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
Daniele Antonioli
Hamid Reza Ghaeini
Sridhar Adepu
Martín Ochoa
Nils Ole Tippenhauer
2016
conf/ccs
Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant.
Sridhar Adepu
Aditya Mathur
2016
conf/sec
Using Process Invariants to Detect Cyber Attacks on a Water Treatment System.
Sridhar Adepu
Aditya Mathur
Coauthors
Aditya Mathur
(6)
Awais Rashid
(1)
Chenglu Jin
(1)
Daniele Antonioli
(1)
Feras Shahbi
(1)
Gyanendra Mishra
(1)
Hamid Reza Ghaeini
(1)
Jianying Zhou
(2)
Joseph Gardiner
(1)
Khurum Nazir Junejo
(1)
Kushagra Dixit
(1)
Martín Ochoa
(1)
Muhammad Azmi Umer
(1)
Nandha Kumar Kandasamy
(1)
Nils Ole Tippenhauer
(1)
Qin Lin
(1)
Ruizhe Wang
(1)
Sarad Venugopalan
(1)
Sicco Verwer
(1)
Sridhar Adepu
(12)
Tanmoy Kanti Das
(1)
Tao Xiang
(1)
Venkata Reddy Palleti
(1)
Xin Lou
(1)
Ying Yang
(1)
Yuqing Zhu
(1)
Zheng Yang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to