Aditya P. Mathur
YOU?
Author Swipe
View article: Open-set 3D semantic instance maps for vision language navigation – O3D-SIM
Open-set 3D semantic instance maps for vision language navigation – O3D-SIM Open
Humans excel at forming mental maps of their surroundings, equipping them to understand object relationships and navigate based on language queries. Our previous work, SI Maps (Nanwani L, Agarwal A, Jain K, et al. Instance-level semantic m…
View article: Varicose Veins: A Comprehensive Review of Pathophysiology, Anatomy and Management Strategies
Varicose Veins: A Comprehensive Review of Pathophysiology, Anatomy and Management Strategies Open
View article: An Overview of Pathophysiology and Management of Cervical Cancer
An Overview of Pathophysiology and Management of Cervical Cancer Open
View article: A Review on Acute Pancreatitis: Pathogenesis and Pathophysiology
A Review on Acute Pancreatitis: Pathogenesis and Pathophysiology Open
View article: Fusing Design and Machine Learning for Anomaly Detection in Water Treatment Plants
Fusing Design and Machine Learning for Anomaly Detection in Water Treatment Plants Open
Accurate detection of process anomalies is crucial for maintaining reliable operations in critical infrastructures such as water treatment plants. Traditional methods for creating anomaly detection systems in these facilities typically foc…
View article: AICrit: A Design-Enhanced Anomaly Detector and Its Performance Assessment in a Water Treatment Plant
AICrit: A Design-Enhanced Anomaly Detector and Its Performance Assessment in a Water Treatment Plant Open
Critical Infrastructure Security Showdown 2021—Online (CISS2021-OL) represented the fifth run of iTrust’s international technology assessment exercise. During this event, researchers and experts from the industry evaluated the performance …
View article: Instance-Level Semantic Maps for Vision Language Navigation
Instance-Level Semantic Maps for Vision Language Navigation Open
Humans have a natural ability to perform semantic associations with the surrounding objects in the environment. This allows them to create a mental map of the environment, allowing them to navigate on-demand when given linguistic instructi…
View article: Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations Open
View article: Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation
Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation Open
View article: Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning
Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning Open
Adversarial learning is used to test the robustness of machine learning algorithms under attack and create attacks that deceive the anomaly detection methods in Industrial Control System (ICS). Given that security assessment of an ICS dema…
View article: Scanning the Cycle: Timing-based Authentication on PLCs
Scanning the Cycle: Timing-based Authentication on PLCs Open
Programmable Logic Controllers (PLCs) are a core component of an Industrial Control System (ICS). However, if a PLC is compromised or the commands sent across a network from the PLCs are spoofed, consequences could be catastrophic. In this…
View article: Cascading effects of cyber-attacks on interconnected critical infrastructure
Cascading effects of cyber-attacks on interconnected critical infrastructure Open
View article: Domain-Based Fuzzing for Supervised Learning of Anomaly Detection in Cyber-Physical Systems
Domain-Based Fuzzing for Supervised Learning of Anomaly Detection in Cyber-Physical Systems Open
A novel approach is proposed for constructing models of anomaly detectors using supervised learning from the traces of normal and abnormal operations of an Industrial Control System (ICS). Such detectors are of value in detecting process a…
View article: Investigation of Cyber Attacks on a Water Distribution System
Investigation of Cyber Attacks on a Water Distribution System Open
View article: A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems
A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems Open
Industrial Control Systems (ICS) consisting of integrated hardware and software components designed to monitor and control a variety of industrial processes, are typically deployed in critical infrastructures such as water treatment plants…
View article: Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems
Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems Open
A hackfest named SWaT Security Showdown (S3) has been organized consecutively for two years. S3 has enabled researchers and practitioners to assess the effectiveness of methods and products aimed at detecting cyber attacks launched in real…
View article: Assessing the Effectiveness of Attack Detection at a Hackfest on\n Industrial Control Systems
Assessing the Effectiveness of Attack Detection at a Hackfest on\n Industrial Control Systems Open
A hackfest named SWaT Security Showdown (S3) has been organized consecutively\nfor two years. S3 has enabled researchers and practitioners to assess the\neffectiveness of methods and products aimed at detecting cyber attacks launched\nin r…
View article: <i>NoisePrint</i>
<i>NoisePrint</i> Open
An attack detection scheme is proposed to detect data integrity attacks on sensors in Cyber-Physical Systems (CPSs). A combined fingerprint for sensor and process noise is created during the normal operation of the system. Under sensor spo…
View article: NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints
NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints Open
In recent years fingerprinting of various physical and logical devices has been proposed with the goal of uniquely identifying users or devices of mainstream IT systems such as PCs, Laptops and smart phones. On the other hand, the applicat…
View article: Using Process Invariants to Detect Cyber Attacks on a Water Treatment System
Using Process Invariants to Detect Cyber Attacks on a Water Treatment System Open