Follow
Chuadhry Mujeeb Ahmed
Title
Cited by
Cited by
Year
WADI: A water distribution testbed for research in the design of secure cyber physical systems
CM Ahmed, VR Palleti, AP Mathur
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for …, 2017
3102017
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS
CM Ahmed, J Zhou, AP Mathur
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
1202018
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems
CM Ahmed, M Ochoa, J Zhou, AP Mathur, R Qadeer, C Murguia, J Ruths
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
882018
Model-based attack detection scheme for smart water distribution networks
CM Ahmed, C Murguia, J Ruths
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
742017
Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems
CM Ahmed, GR MR, AP Mathur
Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, 23-29, 2020
462020
Limitations of state estimation based cyber attack detection schemes in industrial control systems
CM Ahmed, S Adepu, A Mathur
2016 Smart City Security and Privacy Workshop (SCSP-W), 1-5, 2016
392016
Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation
GR MR, CM Ahmed, A Mathur
Cybersecurity 4 (1), 1-12, 2021
352021
Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective
CM Ahmed, J Zhou
IEEE Security & Privacy 18 (6), 14-22, 2020
322020
Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System
A Agrawal, CM Ahmed, EC Chang
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
262018
Hardware identification via sensor fingerprinting in a cyber physical system
CM Ahmed, AP Mathur
2017 IEEE International Conference on Software Quality, Reliability and …, 2017
262017
NoiSense Print Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints
CM Ahmed, AP Mathur, M Ochoa
ACM Transactions on Privacy and Security (TOPS) 24 (1), 1-35, 2020
232020
Multistage downstream attack detection in a cyber physical system
R Qadeer, C Murguia, CM Ahmed, J Ruths
Computer Security: ESORICS 2017 International Workshops, CyberICPS 2017 and …, 2018
232018
A practical physical watermarking approach to detect replay attacks in a CPS
CM Ahmed, VR Palleti, VK Mishra
Journal of Process Control 116, 136-146, 2022
152022
NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints
CM Ahmed, A Mathur, M Ochoa
arXiv preprint arXiv:1712.01598, 2017
142017
A comprehensive dataset from a smart grid testbed for machine learning based cps security research
CM Ahmed, NK Kandasamy
Cyber-Physical Security for Critical Infrastructures Protection: First …, 2021
132021
Process skew: fingerprinting the process for anomaly detection in industrial control systems
CM Ahmed, J Prakash, R Qadeer, A Agrawal, J Zhou
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
132020
Security in Cyber‐Physical Systems: Foundations and Applications
MA Haque, S Shetty, K Gold, B Krishnappa, CA Lara-Nino, A Diaz-Perez, ...
Springer, 2021
112021
A tale of two testbeds: a comparative study of attack detection techniques in cps
S Athalye, CM Ahmed, J Zhou
Critical Information Infrastructures Security: 15th International Conference …, 2020
112020
Run-Time Resource Management Controller for Power Efficiency of GP-GPU Architecture
S Najam, J Ahmed, S Masood, CM Ahmed
IEEE Access 7, 25493-25505, 2019
112019
Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning
M Azmi Umer, C Mujeeb Ahmed, M Taha Jilani, AP Mathur
arXiv e-prints, arXiv: 2107.05127, 2021
10*2021
The system can't perform the operation now. Try again later.
Articles 1–20