Aditya Mathur
Purdue University
H-index: 55
North America-United States
Top articles of Aditya Mathur
Anomaly detection system and method for an industrial control system
2024/2/8
Anomaly detection system for a cyber-physical system
2023/6/15
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure
IEEE Security & Privacy
2023/6/15
Introduction to the special issue on automation of software test and test code quality
2023/4
AICrit: A Design-Enhanced Anomaly Detector and Its Performance Assessment in a Water Treatment Plant
Applied Sciences
2023/12/9
Aditya Mathur
H-Index: 28
Effect of time patterns in mining process invariants for industrial control systems: an experimental study
2022/11/7
Aditya Mathur
H-Index: 28
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations
Cybersecurity
2021/12
Defense system and method against cyber-physical attacks
2022/8/30
The design of cyber-physical exercises (CPXS)
2022/5/31
AICrit: A unified framework for real-time anomaly detection in water treatment plants
Journal of Information Security and Applications
2022/2/1
Design-knowledge in learning plant dynamics for detecting process anomalies in water treatment plants
2022/2
Pcat: Plc command analysis tool for automatic incidence response in water treatment plants
2021/12/15
A hybrid physics-based data-driven framework for anomaly detection in industrial control systems
IEEE Transactions on Systems, Man, and Cybernetics: Systems
2021/12/13
Cascading effects of cyber-attacks on interconnected critical infrastructure
Cybersecurity
2021/12
Sridhar Adepu
H-Index: 17
Aditya Mathur
H-Index: 28
Attack rules: an adversarial approach to generate attacks for Industrial Control Systems using machine learning
arXiv e-prints
2021/7
SafeCI: Avoiding process anomalies in critical infrastructure
International Journal of Critical Infrastructure Protection
2021/4/17
Aditya Mathur
H-Index: 28
A review of pick and place operation using computer vision and ros
2021/8/31
Aditya Mathur
H-Index: 28
Scanning the cycle: timing-based authentication on PLCs
2021/5/24
Method of detecting cyber attacks on a cyber physical system which includes at least one computing device coupled to at least one sensor and/or actuator for controlling a …
2021/2/2