


default search action
Aditya P. Mathur
Aditya Mathur
Person information
- affiliation: Purdue University, West Lafayette, USA
- affiliation: Singapore University of Technology and Design
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j59]Laksh Nanwani
, Kumaraditya Gupta
, Aditya Mathur
, Swayam Agrawal
, A. H. Abdul Hafez
, K. Madhava Krishna
:
Open-set 3D semantic instance maps for vision language navigation - O3D-SIM. Adv. Robotics 38(19-20): 1378-1391 (2024) - [c107]Ivan Christian
, Francisco Furtado
, Aditya P. Mathur
:
DRACE: A Framework for Evaluating Anomaly Detectors for Industrial Control Systems. CPSS@AsiaCCS 2024: 77-87 - [i8]Laksh Nanwani, Kumaraditya Gupta, Aditya Mathur, Swayam Agrawal, A. H. Abdul Hafez, K. Madhava Krishna:
Open-Set 3D Semantic Instance Maps for Vision Language Navigation - O3D-SIM. CoRR abs/2404.17922 (2024) - 2023
- [j58]Aditya P. Mathur
:
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure. IEEE Secur. Priv. 21(4): 51-60 (2023) - [j57]Antonia Bertolino
, Shin Hong
, Aditya P. Mathur
:
Introduction to the special issue on automation of software test and test code quality. J. Softw. Evol. Process. 35(4) (2023) - [c106]Laksh Nanwani
, Anmol Agarwal
, Kanishk Jain, Raghav Prabhakar, Aaron Monis, Aditya Mathur, Krishna Murthy Jatavallabhula, A. H. Abdul Hafez, Vineet Gandhi, K. Madhava Krishna:
Instance-Level Semantic Maps for Vision Language Navigation. RO-MAN 2023: 507-512 - [i7]Laksh Nanwani, Anmol Agarwal, Kanishk Jain, Raghav Prabhakar
, Aaron Monis, Aditya Mathur, Krishna Murthy Jatavallabhula, A. H. Abdul Hafez, Vineet Gandhi, K. Madhava Krishna:
Instance-Level Semantic Maps for Vision Language Navigation. CoRR abs/2305.12363 (2023) - 2022
- [j56]Dillon Cheong Lien Sung, M. R. Gauthama Raman
, Aditya P. Mathur:
Design-knowledge in learning plant dynamics for detecting process anomalies in water treatment plants. Comput. Secur. 113: 102532 (2022) - [j55]Muhammad Azmi Umer
, Khurum Nazir Junejo
, Muhammad Taha Jilani
, Aditya P. Mathur:
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations. Int. J. Crit. Infrastructure Prot. 38: 100516 (2022) - [j54]M. R. Gauthama Raman
, Aditya P. Mathur:
AICrit: A unified framework for real-time anomaly detection in water treatment plants. J. Inf. Secur. Appl. 64: 103046 (2022) - [j53]M. R. Gauthama Raman
, Aditya P. Mathur
:
A Hybrid Physics-Based Data-Driven Framework for Anomaly Detection in Industrial Control Systems. IEEE Trans. Syst. Man Cybern. Syst. 52(9): 6003-6014 (2022) - [c105]Siddhant Shrivastava, Francisco Furtado, Mark Goh, Aditya Mathur:
The Design of Cyber-Physical Exercises (CPXS). CyCom 2022: 348-366 - [c104]Muhammad Azmi Umer, Aditya Mathur, Muhammad Taha Jilani
:
Effect of time patterns in mining process invariants for industrial control systems: an experimental study. SEA4DQ@ESEC/SIGSOFT FSE 2022: 10-17 - [i6]Muhammad Azmi Umer, Khurum Nazir Junejo, Muhammad Taha Jilani, Aditya P. Mathur:
Machine Learning for Intrusion Detection in Industrial Control Systems: Applications, Challenges, and Recommendations. CoRR abs/2202.11917 (2022) - 2021
- [j52]Venkata Reddy Palleti
, Sridhar Adepu, Vishrut Kumar Mishra, Aditya Mathur:
Cascading effects of cyber-attacks on interconnected critical infrastructure. Cybersecur. 4(1): 8 (2021) - [j51]M. R. Gauthama Raman
, Chuadhry Mujeeb Ahmed
, Aditya Mathur:
Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation. Cybersecur. 4(1): 27 (2021) - [j50]Sridhar Adepu, Aditya Mathur:
SafeCI: Avoiding process anomalies in critical infrastructure. Int. J. Crit. Infrastructure Prot. 34: 100435 (2021) - [j49]Venkata Reddy Palleti
, Vishrut Kumar Mishra, Chuadhry Mujeeb Ahmed
, Aditya Mathur:
Can Replay Attacks Designed to Steal Water from Water Distribution Systems Remain Undetected? ACM Trans. Cyber Phys. Syst. 5(1): 9:1-9:19 (2021) - [j48]Sridhar Adepu
, Aditya Mathur
:
Distributed Attack Detection in a Water Treatment Plant: Method and Case Study. IEEE Trans. Dependable Secur. Comput. 18(1): 86-99 (2021) - [j47]Sridhar Adepu
, Aditya Mathur
:
Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems. IEEE Trans. Sustain. Comput. 6(2): 231-244 (2021) - [c103]Salimah Liyakkathali, Gayathri Sugumar, Aditya Mathur:
Attacklets to Test Anomaly Detectors for Critical Infrastructure. ACNS Workshops 2021: 209-227 - [c102]Chuadhry Mujeeb Ahmed
, Martín Ochoa, Jianying Zhou, Aditya Mathur:
Scanning the Cycle: Timing-based Authentication on PLCs. AsiaCCS 2021: 886-900 - [c101]Siddhant Shrivastava, M. R. Gauthama Raman, Aditya Mathur:
PCAT: PLC Command Analysis Tool for automatic incidence response in Water Treatment Plants. IEEE BigData 2021: 2151-2159 - [c100]Muhammad Azmi Umer
, Chuadhry Mujeeb Ahmed
, Muhammad Taha Jilani
, Aditya P. Mathur:
Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning. CPSIOTSEC@CCS 2021: 35-40 - [c99]Madhumitha Balaji, Siddhant Shrivastava
, Sridhar Adepu, Aditya Mathur:
Super Detector: An Ensemble Approach for Anomaly Detection in Industrial Control Systems. CRITIS 2021: 24-43 - [i5]Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya Mathur:
Scanning the Cycle: Timing-based Authentication on PLCs. CoRR abs/2102.08985 (2021) - [i4]Muhammad Azmi Umer, Chuadhry Mujeeb Ahmed, Muhammad Taha Jilani, Aditya P. Mathur:
Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning. CoRR abs/2107.05127 (2021) - 2020
- [j46]M. R. Gauthama Raman
, Wenjie Dong, Aditya Mathur:
Deep autoencoders as anomaly detectors: Method and case study in a distributed water treatment plant. Comput. Secur. 99: 102055 (2020) - [j45]Muhammad Azmi Umer
, Aditya Mathur, Khurum Nazir Junejo, Sridhar Adepu:
Generating invariants using design and data-centric approaches for distributed attack detection. Int. J. Crit. Infrastructure Prot. 28: 100341 (2020) - [j44]M. R. Gauthama Raman, Nivethitha Somu
, Aditya P. Mathur:
A multilayer perceptron model for anomaly detection in water treatment plants. Int. J. Crit. Infrastructure Prot. 31: 100393 (2020) - [j43]Sridhar Adepu
, Nandha Kumar Kandasamy, Jianying Zhou
, Aditya Mathur:
Attacks on smart grid: power supply interruption and malicious power generation. Int. J. Inf. Sec. 19(2): 189-211 (2020) - [j42]Salimah Liyakkathali, Francisco Furtado, Gayathri Sugumar, Aditya Mathur:
A Mechanism to Assess the Effectiveness Anomaly Detectors in Industrial Control Systems. J. Integr. Des. Process. Sci. 24(3-4): 35-50 (2020) - [j41]Chuadhry Mujeeb Ahmed
, Aditya P. Mathur, Martín Ochoa:
NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints. ACM Trans. Priv. Secur. 24(1): 2:1-2:35 (2020) - [c98]Sridhar Adepu, Venkata Reddy Palleti, Gyanendra Mishra, Aditya Mathur:
Investigation of Cyber Attacks on a Water Distribution System. ACNS Workshops 2020: 274-291 - [c97]Chuadhry Mujeeb Ahmed
, M. R. Gauthama Raman, Aditya P. Mathur:
Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems. CPSS@AsiaCCS 2020: 23-29 - [c96]Herman Wijaya, Maurício Finavaro Aniche, Aditya Mathur:
Domain-Based Fuzzing for Supervised Learning of Anomaly Detection in Cyber-Physical Systems. ICSE (Workshops) 2020: 237-244
2010 – 2019
- 2019
- [j40]Vishrut Kumar Mishra, Venkata Reddy Palleti
, Aditya Mathur:
A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system. Int. J. Crit. Infrastructure Prot. 26 (2019) - [j39]Gayathri Sugumar, Aditya Mathur:
A method for testing distributed anomaly detectors. Int. J. Crit. Infrastructure Prot. 27 (2019) - [j38]Aung Maw, Sridhar Adepu, Aditya Mathur:
ICS-BlockOpS: Blockchain for operational data security in industrial control system. Pervasive Mob. Comput. 59 (2019) - [j37]Hanyu Pei
, Kai-Yuan Cai, Beibei Yin
, Aditya P. Mathur
, Min Xie:
Dynamic Random Testing: Technique and Experimental Evaluation. IEEE Trans. Reliab. 68(3): 872-892 (2019) - [c95]M. R. Gauthama Raman, Nivethitha Somu
, Aditya P. Mathur:
Anomaly Detection in Critical Infrastructure Using Probabilistic Neural Network. ATIS 2019: 129-141 - [c94]Qin Lin, Sicco Verwer, Robert E. Kooij, Aditya Mathur:
Using Datasets from Industrial Control Systems for Cyber Security Research and Education. CRITIS 2019: 122-133 - [c93]Gayathri Sugumar, Aditya Mathur:
Assessment of a Method for Detecting Process Anomalies Using Digital-Twinning. EDCC 2019: 119-126 - [c92]Sridhar Adepu, Eunsuk Kang, Aditya P. Mathur:
Challenges in Secure Engineering of Critical Infrastructure Systems. ASE Workshops 2019: 61-64 - [c91]Cheng Feng, Venkata Reddy Palleti, Aditya Mathur, Deeph Chana:
A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems. NDSS 2019 - [i3]Sridhar Adepu, Venkata Reddy Palleti, Gyanendra Mishra, Aditya Mathur:
Investigation of Cyber Attacks on a Water Distribution System. CoRR abs/1906.02279 (2019) - 2018
- [j36]Siddhant Shrivastava, Sridhar Adepu, Aditya Mathur:
Design and assessment of an Orthogonal Defense Mechanism for a water treatment facility. Robotics Auton. Syst. 101: 114-125 (2018) - [c90]Chuadhry Mujeeb Ahmed
, Jianying Zhou, Aditya P. Mathur:
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS. ACSAC 2018: 566-581 - [c89]Aditya Mathur:
On The Limits of Detecting Process Anomalies in Critical Infrastructure. CPSS@AsiaCCS 2018: 1 - [c88]Chuadhry Mujeeb Ahmed
, Martín Ochoa, Jianying Zhou
, Aditya P. Mathur, Rizwan Qadeer, Carlos Murguia
, Justin Ruths:
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems. AsiaCCS 2018: 483-497 - [c87]Qin Lin, Sridhar Adepu, Sicco Verwer, Aditya Mathur:
TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems. AsiaCCS 2018: 525-536 - [c86]Sridhar Adepu, Nandha Kumar Kandasamy, Aditya Mathur:
EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security. CyberICPS/SECPRE@ESORICS 2018: 37-52 - [c85]Sai Sidharth Patlolla, Bruce M. McMillin, Sridhar Adepu, Aditya Mathur:
An Approach for Formal Analysis of the Security of a Water Treatment Testbed. PRDC 2018: 115-124 - [i2]Sridhar Adepu, Aditya Mathur:
Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems. CoRR abs/1809.04786 (2018) - 2017
- [j35]Giedre Sabaliauskaite
, Geok See Ng, Justin Ruths, Aditya Mathur:
A comprehensive approach, and a case study, for conducting attack detection experiments in Cyber-Physical Systems. Robotics Auton. Syst. 98: 174-191 (2017) - [c84]Muhammad Azmi Umer
, Aditya Mathur, Khurum Nazir Junejo, Sridhar Adepu:
Integrating Design and Data Centric Approaches to Generate Invariants for Distributed Attack Detection. CPS-SPC@CCS 2017: 131-136 - [c83]Chuadhry Mujeeb Ahmed
, Venkata Reddy Palleti
, Aditya P. Mathur:
WADI: a water distribution testbed for research in the design of secure cyber physical systems. CySWATER@CPSWeek 2017: 25-28 - [c82]Aditya Mathur:
SecWater: a multi-layer security framework for water treatment plants. CySWATER@CPSWeek 2017: 29-32 - [c81]Giedre Sabaliauskaite
, Geok See Ng, Justin Ruths, Aditya Mathur:
Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems. PRDC 2017: 235-244 - [c80]Gayathri Sugumar, Aditya Mathur:
Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems. QRS Companion 2017: 138-145 - [c79]Sridhar Adepu, Gyanendra Mishra, Aditya Mathur:
Access Control in Water Distribution Networks: A Case Study. QRS 2017: 184-191 - [c78]Sridhar Adepu, Jay Prakash, Aditya Mathur:
WaterJam: An Experimental Case Study of Jamming Attacks on a Water Treatment System. QRS Companion 2017: 341-347 - [c77]Chuadhry Mujeeb Ahmed
, Aditya P. Mathur:
Hardware Identification via Sensor Fingerprinting in a Cyber Physical System. QRS Companion 2017: 517-524 - [c76]Sridhar Adepu, Aditya Mathur:
From Design to Invariants: Detecting Attacks on Cyber Physical Systems. QRS Companion 2017: 533-540 - [i1]Chuadhry Mujeeb Ahmed, Aditya Mathur, Martín Ochoa:
NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints. CoRR abs/1712.01598 (2017) - 2016
- [j34]Sridhar Adepu, Siddhant Shrivastava
, Aditya Mathur:
Argus: An Orthogonal Defense Framework to Protect Public Infrastructure against Cyber-Physical Attacks. IEEE Internet Comput. 20(5): 38-45 (2016) - [c75]Sridhar Adepu, Aditya Mathur:
Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant. AsiaCCS 2016: 449-460 - [c74]Aditya P. Mathur:
Challenges in Testing the Design of Secure Complex Critical Public Infrastructure. COMPSAC Workshops 2016: 45 - [c73]Aditya P. Mathur:
Designing [Secure] Complex Critical Public Infrastructure. COMPSAC 2016: 282 - [c72]Sridhar Adepu, Aditya Mathur:
Generalized Attacker and Attack Models for Cyber Physical Systems. COMPSAC 2016: 283-292 - [c71]Giedre Sabaliauskaite
, Geok See Ng, Justin Ruths, Aditya P. Mathur:
Empirical Assessment of Corrupt Sensor Data Detection Methods in a Robot. COMPSAC Workshops 2016: 482-489 - [c70]Aditya P. Mathur, Nils Ole Tippenhauer
:
SWaT: a water treatment testbed for research and training on ICS security. CySWATER@CPSWeek 2016: 31-36 - [c69]Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, Aditya Mathur:
A Dataset to Support Research in the Design of Secure Water Treatment Systems. CRITIS 2016: 88-99 - [c68]Giedre Sabaliauskaite
, Sridhar Adepu, Aditya Mathur:
A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems. CRITIS 2016: 189-200 - [c67]Sridhar Adepu, Aditya P. Mathur:
Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study. CSDM Asia 2016: 75-94 - [c66]Sridhar Adepu, Aditya Mathur:
An Investigation into the Response of a Water Treatment System to Cyber Attacks. HASE 2016: 141-148 - [c65]Giedre Sabaliauskaite
, Geok See Ng, Justin Ruths, Aditya P. Mathur:
Empirical Assessment of Methods to Detect Cyber Attacks on a Robot. HASE 2016: 248-251 - [c64]Eunsuk Kang, Sridhar Adepu, Daniel Jackson, Aditya P. Mathur:
Model-based security analysis of a water treatment system. SEsCPS@ICSE 2016: 22-28 - [c63]Sridhar Adepu, Aditya Mathur:
Using Process Invariants to Detect Cyber Attacks on a Water Treatment System. SEC 2016: 91-104 - [c62]Sridhar Adepu, Aditya P. Mathur:
Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions. SG-CRC 2016: 59-74 - [e1]Aditya Mathur, Abhik Roychoudhury:
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016. Cryptology and Information Security Series 14, IOS Press 2016, ISBN 978-1-61499-616-3 [contents] - 2015
- [j33]Fevzi Belli, Mutlu Beyazit
, André Takeshi Endo
, Aditya P. Mathur, Adenilso da Silva Simão
:
Fault domain-based testing in imperfect situations: a heuristic approach and case studies. Softw. Qual. J. 23(3): 423-452 (2015) - [c61]Sridhar Adepu, Aditya Mathur, Jagadeesh Gunda, Sasa Z. Djokic:
An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical Systems. ICA3PP (3) 2015: 785-798 - [c60]Giedre Sabaliauskaite
, Geok See Ng, Justin Ruths, Aditya P. Mathur:
Experimental Evaluation of Stealthy Attack Detection in a Robot. PRDC 2015: 70-79 - 2014
- [c59]Giedre Sabaliauskaite
, Aditya P. Mathur:
Design of Intelligent Checkers to Enhance the Security and Safety of Cyber Physical Systems. COMPSAC Workshops 2014: 7-12 - [c58]Giedre Sabaliauskaite
, Aditya P. Mathur:
Countermeasures to Enhance Cyber-physical System Security and Safety. COMPSAC Workshops 2014: 13-18 - [c57]Giedre Sabaliauskaite
, Aditya P. Mathur:
Aligning Cyber-Physical System Safety and Security. CSDM Asia 2014: 41-53 - 2013
- [j32]Hai Hu, Chang-Hai Jiang, Kai-Yuan Cai, W. Eric Wong, Aditya P. Mathur:
Enhancing software reliability estimates using modified adaptive testing. Inf. Softw. Technol. 55(2): 288-300 (2013) - [c56]Giedre Sabaliauskaite
, Aditya P. Mathur:
Intelligent Checkers to Improve Attack Detection in Cyber Physical Systems. CyberC 2013: 27-30 - [c55]Karthikeyan Rajasekharan, Aditya P. Mathur, See-Kiong Ng:
Effective Crowdsourcing for Software Feature Ideation in Online Co-Creation Forums. SEKE 2013: 119-124 - 2012
- [j31]Fevzi Belli, Mutlu Beyazit
, Aditya P. Mathur, Nimal Nissanke:
Modeling, Analysis, and Testing of System Vulnerabilities. Adv. Comput. 84: 39-92 (2012) - [c54]Weiguang Wang, Qingkai Zeng, Aditya P. Mathur:
A Security Assurance Framework Combining Formal Verification and Security Functional Testing. QSIC 2012: 136-139 - 2011
- [j30]Yi Fang, Luo Si, Aditya P. Mathur:
Discriminative probabilistic models for expert search in heterogeneous information sources. Inf. Retr. 14(2): 158-177 (2011) - [j29]Robert M. Hierons
, Aditya Mathur:
ICST 2008 Special Issue. Softw. Test. Verification Reliab. 21(1): 1 (2011) - [c53]Huanyin Yi, Chang-Hai Jiang, Hai Hu, Kai-Yuan Cai, Aditya P. Mathur:
Using Markov-Chains to Model Reliability and QoS for Deployed Service-Based Systems. COMPSAC Workshops 2011: 356-361 - [c52]W. Eric Wong, Antonia Bertolino
, Vidroha Debroy, Aditya P. Mathur, Jeff Offutt, Mladen A. Vouk:
Teaching software testing: Experiences, lessons learned and the path forward. CSEE&T 2011: 530-534 - [c51]Yi Fang, Naveen Somasundaram, Luo Si, Jeongwoo Ko, Aditya P. Mathur:
Analysis of an expert search query log. SIGIR 2011: 1189-1190 - 2010
- [j28]Yi Fang, Luo Si, Aditya P. Mathur:
Discriminative graphical models for faculty homepage discovery. Inf. Retr. 13(6): 618-635 (2010) - [j27]Ammar Masood, Arif Ghafoor, Aditya P. Mathur:
Fault coverage of Constrained Random Test Selection for access control: A formal analysis. J. Syst. Softw. 83(12): 2607-2617 (2010) - [j26]Ammar Masood, Arif Ghafoor, Aditya P. Mathur:
Conformance Testing of Temporal Role-Based Access Control Systems. IEEE Trans. Dependable Secur. Comput. 7(2): 144-158 (2010) - [c50]Vahid Garousi
, Aditya Mathur:
Current State of the Software Testing Education in North American Academia and Some Recommendations for the New Educators. CSEE&T 2010: 89-96 - [c49]Yi Fang, Luo Si, Aditya P. Mathur:
Discriminative models of integrating document evidence and document-candidate associations for expert search. SIGIR 2010: 683-690
2000 – 2009
- 2009
- [j25]João W. Cangussu, Aditya P. Mathur:
Guest Editors' Introduction. Int. J. Softw. Eng. Knowl. Eng. 19(5): 625 (2009) - [j24]W. Eric Wong, Aditya P. Mathur:
Editorial. J. Syst. Softw. 82(9): 1375 (2009) - [j23]Ammar Masood, Rafae Bhatti, Arif Ghafoor, Aditya P. Mathur:
Scalable and Effective Test Generation for Role-Based Access Control Systems. IEEE Trans. Software Eng. 35(5): 654-668 (2009) - 2008
- [j22]Aditya P. Mathur, Johnny Wong:
Message from the guest editors. J. Syst. Softw. 81(10): 1623-1624 (2008) - [c48]Stephen S. Yau, João W. Cangussu, Aditya P. Mathur, Fevzi Belli, Kai-Yuan Cai:
Message from the IWSC 2008 Workshop Organizers. COMPSAC 2008: 813 - [c47]Stephen S. Yau, João W. Cangussu, Aditya P. Mathur, Fevzi Belli, Kai-Yuan Cai:
IWSC 2008 Workshop Organization. COMPSAC 2008: 814-815 - [c46]Scott D. Miller, Raymond A. DeCarlo, Aditya P. Mathur:
Quantitative Modeling for Incremental Software Process Control. COMPSAC 2008: 830-835 - [c45]K. R. Jayaram, Aditya P. Mathur:
On the Adequacy of Statecharts as a Source of Tests for Cryptographic Protocols. COMPSAC 2008: 937-942 - [p1]João W. Cangussu, Kai-Yuan Cai, Scott D. Miller, Aditya P. Mathur:
Software Cybernetics. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2007
- [c44]James Early, Rajesh Subramanyan, Aditya P. Mathur:
Academic/Industry Collaboration in Undergraduate Software Engineering - A Fifteen Year Perspective. FECS 2007: 28-34 - 2006
- [j21]Fevzi Belli, Kai-Yuan Cai, Raymond A. DeCarlo, Aditya P. Mathur:
Introduction to the special section on software cybernetics. J. Syst. Softw. 79(11): 1483-1485 (2006) - [j20]Scott D. Miller, Raymond A. DeCarlo, Aditya P. Mathur, João W. Cangussu:
A control-theoretic approach to the management of the software system test phase. J. Syst. Softw. 79(11): 1486-1503 (2006) - 2005
- [c43]Scott D. Miller, Aditya P. Mathur, Raymond A. DeCarlo:
DIG: A Tool for Software Process Data Extraction and Grooming. COMPSAC (1) 2005: 35-40 - [c42]Scott D. Miller, Raymond A. DeCarlo, Aditya P. Mathur:
A Software Cybernetic Approach to Control of the Software System Test Phase. COMPSAC (2) 2005: 103-108 - [c41]Aditya P. Mathur:
Model-Based Software Testing and Verification. COMPSAC (1) 2005: 329 - [c40]Qianxiang Wang, Aditya P. Mathur:
Interceptor Based Constraint Violation Detection. ECBS 2005: 457-464 - 2004
- [c39]Scott D. Miller, Raymond A. DeCarlo, Aditya P. Mathur:
Modeling and Control of the Incremental Software Test Process. COMPSAC Workshops 2004: 156-159 - [c38]