Follow
Rajesh Kumar
Rajesh Kumar
BITS-Pilani | PhD, University of Twente | MS, Scuola Superiore Sant Anna, Pisa
Verified email at pilani.bits-pilani.ac.in - Homepage
Title
Cited by
Cited by
Year
Quantitative security and safety analysis with attack-fault trees
R Kumar, M Stoelinga
2017 IEEE 18th International Symposium on High Assurance Systems Engineering …, 2017
1302017
Quantitative attack tree analysis via priced timed automata
R Kumar, E Ruijters, M Stoelinga
Formal Modeling and Analysis of Timed Systems: 13th International Conference …, 2015
972015
Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study
M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua
The Practice of Enterprise Modeling: 9th IFIP WG 8.1. Working Conference …, 2016
712016
Sequential and parallel attack tree modelling
F Arnold, D Guck, R Kumar, M Stoelinga
Computer Safety, Reliability, and Security: SAFECOMP 2015 Workshops, ASSURE …, 2015
552015
Effective analysis of attack trees: A model-driven approach
R Kumar, S Schivo, E Ruijters, BM Yildiz, D Huistra, J Brandt, A Rensink, ...
Fundamental Approaches to Software Engineering: 21st International …, 2018
422018
APT attacks on industrial control systems: A tale of three incidents
R Kumar, R Kela, S Singh, R Trujillo-Rasua
International Journal of Critical Infrastructure Protection 37, 100521, 2022
382022
What changed in the cyber-security after COVID-19?
R Kumar, S Sharma, C Vachhani, N Yadav
Computers & Security, 2022
272022
AFMT: Maintaining the safety-security of industrial control systems
R Kumar, B Narra, R Kela, S Singh
Computers in Industry 136, 103584, 2022
162022
How to efficiently build a front-end tool for UPPAAL: a model-driven approach
S Schivo, BM Yildiz, E Ruijters, C Gerking, R Kumar, S Dziwok, A Rensink, ...
Dependable Software Engineering. Theories, Tools, and Applications: Third …, 2017
162017
Analyzing Advanced Persistent Threats Using Game Theory: A Critical Literature Review
R Kumar, S Singh, R Kela
International Conference on Critical Infrastructure Protection, 45-69, 2021
112021
Truth or dare: quantitative security risk analysis via attack trees
R Kumar
University of Twente, 2018
102018
Time dependent analysis with dynamic counter measure trees
R Kumar, D Guck, MIA Stoelinga
Thirteenth International Workshop on Quantitative Aspects of Programming …, 2015
102015
A quantitative security risk analysis framework for modelling and analyzing advanced persistent threats
R Kumar, S Singh, R Kela
International Symposium on Foundations and Practice of Security, 29-46, 2020
82020
A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures
R Kumar
International Conference on Critical Infrastructure Protection, 283-306, 2020
72020
LOCKS: a property specification language for security goals
R Kumar, A Rensink, M Stoelinga
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1907-1915, 2018
72018
Quantitative safety-security risk analysis of interconnected cyber-infrastructures
R Kumar
2022 IEEE 10th Region 10 Humanitarian Technology Conference (R10-HTC), 100-106, 2022
42022
APT: a buzzword and a reality-A bibliometric review of the literature (2010-2020)
BA Bhat, R Kumar
7th IEEE International Conference on Dependability in Sensor, Cloud, and Big …, 2021
42021
An attack tree template based on feature diagram hierarchy
R Kumar
2020 IEEE 6th International Conference on Dependability in Sensor, Cloud and …, 2020
42020
Simulating cyber-attack scenarios by discovering Petri-Nets from large-scale event logs
MD Makwana, V Thakkar, D Das, R Kumar
2024 16th International Conference on COMmunication Systems & NETworkS …, 2024
12024
Realistic attacks with realistic attackers: An information-security risk analysis of an automatic metering infrastructure
R Kumar, I Rai, K Vora, M Shah
IECON 2023- 49th Annual Conference of the IEEE Industrial Electronics …, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20