Chuadhry Mujeeb Ahmed
Chuadhry Mujeeb Ahmed
在 mymail.sutd.edu.sg 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
WADI: A water distribution testbed for research in the design of secure cyber physical systems
CM Ahmed, VR Palleti, AP Mathur
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for …, 2017
562017
Model-based attack detection scheme for smart water distribution networks
CM Ahmed, C Murguia, J Ruths
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
522017
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS
CM Ahmed, J Zhou, AP Mathur
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
492018
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems
CM Ahmed, M Ochoa, J Zhou, AP Mathur, R Qadeer, C Murguia, J Ruths
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
392018
Limitations of state estimation based cyber attack detection schemes in industrial control systems
CM Ahmed, S Adepu, A Mathur
2016 Smart City Security and Privacy Workshop (SCSP-W), 1-5, 2016
272016
Hardware identification via sensor fingerprinting in a cyber physical system
CM Ahmed, AP Mathur
2017 IEEE International Conference on Software Quality, Reliability and …, 2017
182017
Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System
A Agrawal, CM Ahmed, EC Chang
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
152018
Multistage downstream attack detection in a cyber physical system
R Qadeer, C Murguia, CM Ahmed, J Ruths
Computer Security, 177-185, 2017
122017
NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints
CM Ahmed, A Mathur, M Ochoa
arXiv preprint arXiv:1712.01598, 2017
92017
Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective
CM Ahmed, J Zhou
IEEE Security & Privacy 18 (6), 14-22, 2020
8*2020
Design, analysis and optimization of multistage LNA at KU-band
M Ahmed, N Shoaib, I Mahmood
Journal of Space Technology 1 (1), 1-95, 2011
82011
Run-Time Resource Management Controller for Power Efficiency of GP-GPU Architecture
S Najam, J Ahmed, S Masood, CM Ahmed
IEEE Access 7, 25493-25505, 2019
72019
Context aware network-assisted hand-off management and interference mitigation scheme for heterogeneous networks
M Ahmed, JW Kim
2014 IEEE Wireless Communications and Networking Conference (WCNC), 2970-2975, 2014
72014
Design, fabrication & testing of Low Noise Amplifier at Ku-Band
N Shoaib, M Ahmad, I Mahmood
Advances in Space Technologies, 2008. ICAST 2008. 2nd International …, 2008
72008
Geo-location based self-organization scheme for femtocell networks
M Ahmed, SG Yoon, S Jeong, S Bahk
2013 International Conference on ICT Convergence (ICTC), 535-539, 2013
62013
Can you see me on performance of wireless fingerprinting in a cyber physical system
J Prakash, CM Ahmed
2017 IEEE 18th International Symposium on High Assurance Systems Engineering …, 2017
52017
Process skew: fingerprinting the process for anomaly detection in industrial control systems
CM Ahmed, J Prakash, R Qadeer, A Agrawal, J Zhou
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
42020
Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems
CM Ahmed, GR MR, AP Mathur
Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, 23-29, 2020
32020
DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games
A Tahsini, N Dunstatter, M Guirguis, CM Ahmed
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
32020
Can Replay Attacks Designed to Steal Water from Water Distribution Systems Remain Undetected?
VR Palleti, VK Mishra, CM Ahmed, A Mathur
ACM Transactions on Cyber-Physical Systems 5 (1), 1-19, 2020
22020
系统目前无法执行此操作,请稍后再试。
文章 1–20