Architecture and security of SCADA systems: A review G Yadav, K Paul International Journal of Critical Infrastructure Protection 34, 100433, 2021 | 229 | 2021 |
Assessment of scada system vulnerabilities G Yadav, K Paul 2019 24th IEEE International Conference on Emerging Technologies and Factory …, 2019 | 25 | 2019 |
IoT-PEN: An E2E penetration testing framework for IoT G Yadav, K Paul, A Allakany, K Okamura Journal of information processing 28, 633-642, 2020 | 23 | 2020 |
Iot-pen: A penetration testing framework for iot G Yadav, K Paul, A Allakany, K Okamura 2020 International Conference on Information Networking (ICOIN), 196-201, 2020 | 21 | 2020 |
Penetration testing framework for iot G Yadav, A Allakany, V Kumar, K Paul, K Okamura 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI …, 2019 | 17 | 2019 |
PatchRank: Ordering updates for SCADA systems G Yadav, K Paul 2019 24th IEEE International Conference on Emerging Technologies and Factory …, 2019 | 15 | 2019 |
SmartPatch: A patch prioritization framework G Yadav, P Gauravaram, AK Jindal, K Paul Computers in Industry 137, 103595, 2022 | 10 | 2022 |
Detection and mitigation of lfa attack in sdn-iot network A Allakany, G Yadav, K Paul, K Okamura Web, Artificial Intelligence and Network Applications: Proceedings of the …, 2020 | 7 | 2020 |
SmartPatch: a patch prioritization framework for SCADA chain in smart grid G Yadav, P Gauravaram, AK Jindal Proceedings of the 26th Annual International Conference on Mobile Computing …, 2020 | 6 | 2020 |
Vulnerability Management in IIoT-Based Systems: What, Why and How G Yadav, K Paul, P Gauravaram Secure and Trusted Cyber Physical Systems: Recent Approaches and Future …, 2022 | 4 | 2022 |
Global monitor using spatiotemporally correlated local monitors G Yadav, K Paul 2021 IEEE 20th International Symposium on Network Computing and Applications …, 2021 | 2 | 2021 |
An automated end-to-end penetration testing for IoT A Allakany, G Yadav, V Kumar, K Paul, K Okamura, C Center The National Conference of the Information Processing Society 5, 05, 2019 | 2 | 2019 |
prasavGraph: Android based Labour Monitoring S Singh, K Paul, G Yadav, S Prasad International Conference on Health Informatics 6, 458-466, 2016 | 1 | 2016 |
An approach to select and schedule the most appropriate sequence of security patches, for a large set of vulnerabilities in a power generation system, using game theory and … RL Minz, G Yadav, RK Kalle https://www.bookpark.ne.jp/cm/ieej/detail/IEEJ-20240325C00701-012-PDF/, 67-72, 2024 | | 2024 |
Techniques for enhanced vulnerability management for industrial internet of things G Yadav IIT Delhi, 2022 | | 2022 |