Follow
Rajesh Kumar
Rajesh Kumar
Assistant Professor, BITS-Pilani | PhD, University of Twente | MS, Scuola Superiore Sant Anna, Pisa
Verified email at pilani.bits-pilani.ac.in - Homepage
Title
Cited by
Cited by
Year
Quantitative security and safety analysis with attack-fault trees
R Kumar, M Stoelinga
2017 IEEE 18th International Symposium on High Assurance Systems Engineering …, 2017
1162017
Quantitative attack tree analysis via priced timed automata
R Kumar, E Ruijters, M Stoelinga
Formal Modeling and Analysis of Timed Systems: 13th International Conference …, 2015
932015
Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study
M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua
The Practice of Enterprise Modeling: 9th IFIP WG 8.1. Working Conference …, 2016
652016
Sequential and parallel attack tree modelling
F Arnold, D Guck, R Kumar, M Stoelinga
Computer Safety, Reliability, and Security: SAFECOMP 2015 Workshops, ASSURE …, 2015
512015
Effective analysis of attack trees: A model-driven approach
R Kumar, S Schivo, E Ruijters, BM Yildiz, D Huistra, J Brandt, A Rensink, ...
Fundamental Approaches to Software Engineering: 21st International …, 2018
382018
APT attacks on industrial control systems: A tale of three incidents
R Kumar, R Kela, S Singh, R Trujillo-Rasua
International Journal of Critical Infrastructure Protection 37, 100521, 2022
262022
What changed in the cyber-security after COVID-19?
R Kumar, S Sharma, C Vachhani, N Yadav
Computers & Security, 2022
192022
How to efficiently build a front-end tool for UPPAAL: a model-driven approach
S Schivo, BM Yildiz, E Ruijters, C Gerking, R Kumar, S Dziwok, A Rensink, ...
Dependable Software Engineering. Theories, Tools, and Applications: Third …, 2017
162017
AFMT: Maintaining the safety-security of industrial control systems
R Kumar, B Narra, R Kela, S Singh
Computers in Industry 136, 103584, 2022
112022
Truth or dare: quantitative security risk analysis via attack trees
R Kumar
University of Twente, 2018
92018
Time dependent analysis with dynamic counter measure trees
R Kumar, D Guck, MIA Stoelinga
Thirteenth International Workshop on Quantitative Aspects of Programming …, 2015
82015
Analyzing Advanced Persistent Threats Using Game Theory: A Critical Literature Review
R Kumar, S Singh, R Kela
International Conference on Critical Infrastructure Protection, 45-69, 2021
72021
A quantitative security risk analysis framework for modelling and analyzing advanced persistent threats
R Kumar, S Singh, R Kela
International Symposium on Foundations and Practice of Security, 29-46, 2020
72020
A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures
R Kumar
International Conference on Critical Infrastructure Protection, 283-306, 2020
62020
LOCKS: a property specification language for security goals
R Kumar, A Rensink, M Stoelinga
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1907-1915, 2018
62018
APT: a buzzword and a reality-A bibliometric review of the literature (2010-2020)
BA Bhat, R Kumar
7th IEEE International Conference on Dependability in Sensor, Cloud, and Big …, 2021
42021
Quantitative safety-security risk analysis of interconnected cyber-infrastructures
R Kumar
2022 IEEE 10th Region 10 Humanitarian Technology Conference (R10-HTC), 100-106, 2022
32022
An attack tree template based on feature diagram hierarchy
R Kumar
2020 IEEE 6th International Conference on Dependability in Sensor, Cloud and …, 2020
32020
Co-engineering Safety-Security Using Statistical Model Checking
R Kumar, S Singh, B Narra, R kela
Formal Techniques for Distributed Objects, Components, and Systems. FORTE …, 2022
12022
Simulating cyber-attack scenarios by discovering Petri-Nets from large-scale event logs
MD Makwana, V Thakkar, D Das, R Kumar
2024 16th International Conference on COMmunication Systems & NETworkS …, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20