Zobrazeno 1 - 10
of 166
pro vyhledávání: '"Mathur, Aditya P."'
Autor:
Nanwani, Laksh, Gupta, Kumaraditya, Mathur, Aditya, Agrawal, Swayam, Hafez, A. H. Abdul, Krishna, K. Madhava
Publikováno v:
Advanced Robotics - Taylor and Francis - 2024
Humans excel at forming mental maps of their surroundings, equipping them to understand object relationships and navigate based on language queries. Our previous work SI Maps [1] showed that having instance-level information and the semantic understa
Externí odkaz:
http://arxiv.org/abs/2404.17922
Autor:
Nanwani, Laksh, Agarwal, Anmol, Jain, Kanishk, Prabhakar, Raghav, Monis, Aaron, Mathur, Aditya, Murthy, Krishna, Hafez, Abdul, Gandhi, Vineet, Krishna, K. Madhava
Publikováno v:
IEEE RO-MAN 2023
Humans have a natural ability to perform semantic associations with the surrounding objects in the environment. This allows them to create a mental map of the environment, allowing them to navigate on-demand when given linguistic instructions. A natu
Externí odkaz:
http://arxiv.org/abs/2305.12363
Publikováno v:
International Journal of Critical Infrastructure Protection, 2022, 100516, ISSN 1874-5482
Methods from machine learning are being applied to design Industrial Control Systems resilient to cyber-attacks. Such methods focus on two major areas: the detection of intrusions at the network-level using the information acquired through network pa
Externí odkaz:
http://arxiv.org/abs/2202.11917
Adversarial learning is used to test the robustness of machine learning algorithms under attack and create attacks that deceive the anomaly detection methods in Industrial Control System (ICS). Given that security assessment of an ICS demands that an
Externí odkaz:
http://arxiv.org/abs/2107.05127
Programmable Logic Controllers (PLCs) are a core component of an Industrial Control System (ICS). However, if a PLC is compromised or the commands sent across a network from the PLCs are spoofed, consequences could be catastrophic. In this work, a no
Externí odkaz:
http://arxiv.org/abs/2102.08985
A Cyber Physical System (CPS) consists of cyber components for computation and communication, and physical components such as sensors and actuators for process control. These components are networked and interact in a feedback loop. CPS are found in
Externí odkaz:
http://arxiv.org/abs/1906.02279
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Adepu, Sridhar, Mathur, Aditya
A hackfest named SWaT Security Showdown (S3) has been organized consecutively for two years. S3 has enabled researchers and practitioners to assess the effectiveness of methods and products aimed at detecting cyber attacks launched in real-time on an
Externí odkaz:
http://arxiv.org/abs/1809.04786
In recent years fingerprinting of various physical and logical devices has been proposed with the goal of uniquely identifying users or devices of mainstream IT systems such as PCs, Laptops and smart phones. On the other hand, the application of such
Externí odkaz:
http://arxiv.org/abs/1712.01598
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.