default search action
Rajesh Kumar 0012
Person information
- affiliation: Birla Institute of Technology and Science, Pilani, India
- affiliation (PhD 2018): University of Twente, The Netherlands
Other persons with the same name
- Rajesh Kumar — disambiguation page
- Rajesh Kumar 0001 — Johns Hopkins University, Baltimore, MD, USA
- Rajesh Kumar 0002 — Malaviya National Institute of Technology, Jaipur, India
- Rajesh Kumar 0003 — University of California, Santa Barbara
- Rajesh Kumar 0004 — Aker Kværner Offshore Partner
- Rajesh Kumar 0005 — United Technologies Research Center
- Rajesh Kumar 0006 — Intel Corporation, Hillsboro
- Rajesh Kumar 0007 — Dept. of Mathematics, PGDAV Evening College, University of Delhi
- Rajesh Kumar 0008 — Directorate of Forensic Science, Ministry of Home Affairs, Govt. of India, New Delhi
- Rajesh Kumar 0009 — Int. Institute of Information Technology, CSTAR, Hyderabad, India
- Rajesh Kumar 0010 — Netaji Subhas Institute of Technology, Department of Instrumentation and Control Engineering, New Delhi, India
- Rajesh Kumar 0011 — Sant Longowal Institute of Engineering and Technology, Longowal, India (and 1 more)
- Rajesh Kumar 0013 — Thapar University, Computer Science and Engineering Department, Patiala, India
- Rajesh Kumar 0014 — University of Electronic Science and Technology of China, Computer Science Department, Chengdu, China
- Rajesh Kumar 0015 — North Eastern Regional Institute of Science and Technology, NERIST, Department of Electronics and Communication, Nirjuli, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Mohit Dilip Makwana, Vedant Thakkar, Debanshu Das, Rajesh Kumar:
Simulating Cyber-Attack Scenarios by Discovering Petri-Nets from Large-Scale Event Logs. COMSNETS 2024: 49-54 - 2023
- [c15]Rajesh Kumar, Nitish Yadav:
A methodology for resilient safety-critical infrastructures using statistical model checking. APSEC 2023: 599-603 - [c14]Rajesh Kumar, Ishan Rai, Krish Vora, Mithil Shah:
Realistic Attacks with Realistic Attackers: An Information-Security Risk Analysis of an Automatic Metering Infrastructure. IECON 2023: 1-6 - 2022
- [j3]Rajesh Kumar, Bhavesh Narra, Rohan Kela, Siddhant Singh:
AFMT: Maintaining the safety-security of industrial control systems. Comput. Ind. 136: 103584 (2022) - [j2]Rajesh Kumar, Siddharth Sharma, Chirag Vachhani, Nitish Yadav:
What changed in the cyber-security after COVID-19? Comput. Secur. 120: 102821 (2022) - [j1]Rajesh Kumar, Rohan Kela, Siddhant Singh, Rolando Trujillo-Rasua:
APT attacks on industrial control systems: A tale of three incidents. Int. J. Crit. Infrastructure Prot. 37: 100521 (2022) - [c13]Rajesh Kumar, Siddhant Singh, Bhavesh Narra, Rohan Kela:
Co-engineering Safety-Security Using Statistical Model Checking. FORTE 2022: 88-92 - 2021
- [c12]Budi Aditya Bhat, Rajesh Kumar:
APT: a buzzword and a reality - A bibliometric review of the literature (2010-2020). HPCC/DSS/SmartCity/DependSys 2021: 1972-1979 - [c11]Rajesh Kumar, Siddhant Singh, Rohan Kela:
Analyzing Advanced Persistent Threats Using Game Theory: A Critical Literature Review. Critical Infrastructure Protection 2021: 45-69 - 2020
- [c10]Rajesh Kumar:
An attack tree template based on feature diagram hierarchy. DependSys 2020: 92-97 - [c9]Rajesh Kumar, Siddhant Singh, Rohan Kela:
A Quantitative Security Risk Analysis Framework for Modelling and Analyzing Advanced Persistent Threats. FPS 2020: 29-46 - [c8]Rajesh Kumar:
A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures. Critical Infrastructure Protection 2020: 283-306
2010 – 2019
- 2018
- [c7]Rajesh Kumar, Stefano Schivo, Enno Ruijters, Bugra Mehmet Yildiz, David Huistra, Jacco Brandt, Arend Rensink, Mariëlle Stoelinga:
Effective Analysis of Attack Trees: A Model-Driven Approach. FASE 2018: 56-73 - [c6]Rajesh Kumar, Arend Rensink, Mariëlle Stoelinga:
LOCKS: a property specification language for security goals. SAC 2018: 1907-1915 - 2017
- [c5]Rajesh Kumar, Mariëlle Stoelinga:
Quantitative Security and Safety Analysis with Attack-Fault Trees. HASE 2017: 25-32 - [c4]Stefano Schivo, Bugra M. Yildiz, Enno Ruijters, Christopher Gerking, Rajesh Kumar, Stefan Dziwok, Arend Rensink, Mariëlle Stoelinga:
How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach. SETTA 2017: 319-336 - 2016
- [c3]Marlon Fraile, Margaret Ford, Olga Gadyatskaya, Rajesh Kumar, Mariëlle Stoelinga, Rolando Trujillo-Rasua:
Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study. PoEM 2016: 326-334 - 2015
- [c2]Rajesh Kumar, Enno Ruijters, Mariëlle Stoelinga:
Quantitative Attack Tree Analysis via Priced Timed Automata. FORMATS 2015: 156-171 - [c1]Florian Arnold, Dennis Guck, Rajesh Kumar, Mariëlle Stoelinga:
Sequential and Parallel Attack Tree Modelling. SAFECOMP Workshops 2015: 291-299 - [i1]Rajesh Kumar, Dennis Guck, Mariëlle Stoelinga:
Time Dependent Analysis with Dynamic Counter Measure Trees. CoRR abs/1510.00050 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 01:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint