Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

Browse by All Cardiff Authors

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Number of items: 41.

Orr, Fraser, Nafees, Muhammad Nouman, Saxena, Neetesh and Choi, Bong Jun 2021. Securing publisher-subscriber in smart grid infrastructure. Electronics 10 (19) , 2355. 10.3390/electronics10192355
file

Liu, Chenyang, Alrowaili, Yazeed, Saxena, Neetesh and Konstantinou, Charalambos 2021. Cyber risks to critical smart grid assets of industrial control systems. Energies 14 (17) , 5501. 10.3390/en14175501
file

Burke, George and Saxena, Neetesh 2021. Cyber risks prediction and analysis in medical emergency equipment for situational awareness. Sensors 21 (16) , 5325. 10.3390/s21165325
file

Karunarathne, S M, Saxena, N. and Khan, M K 2021. Security and privacy in IoT smart healthcare. IEEE Internet Computing 25 (4) , pp. 37-48. 10.1109/MIC.2021.3051675
file

Chugh, N., Tomar, G. S., Bhadoria, R. S. and Saxena, N. 2021. A novel anomaly behavior detection scheme for mobile ad hoc networks. Electronics 10 (14) , 1635. 10.3390/electronics10141635
file

Saxena, Neetesh, Xiong, Leilei, Chukwuka, Victor and Grijalva, Santiago 2021. Impact evaluation of malicious control commands in cyber-physical smart grids. IEEE Transactions on Sustainable Computing 6 (2) , pp. 208-220. 10.1109/TSUSC.2018.2879670

Sharma, Uttam, Tomer, Pradeep, Ali, Syed Sadaf, Saxena, Neetesh and Bhadoria, Robin Singh 2021. Optimized authentication system with high security and privacy. Electronics 10 (4) , 458. 10.3390/electronics10040458
file

Gope, Prosanta, Millwood, Owen and Saxena, Neetesh 2021. A provably secure authentication scheme for RFID-enabled UAV applications. Computer Communications 166 , pp. 19-25. 10.1016/j.comcom.2020.11.009
Item availability restricted.
file

Kumar, Ajit, Saxena, Neetesh and Choi, Bong Jun 2021. Machine learning algorithm for detection of false data injection attack in power system. Presented at: 35th International Conference on Information Networking (ICOIN 2021), Jeju Island, Korea, 13-16 January 2021.
file

Nafees, Muhammad Nouman, Saxena, Neetesh and Burnap, Peter 2021. Specification-based process control attack detection in substation automation. Presented at: 42nd IEEE Symposium on Security and Privacy 2021, Virtual, 23-27 May 2021.

Asiri, Mohammed, Saxena, Neetesh and Burnap, Peter 2021. Investigating usable indicators against cyber-attacks in industrial control systems. Presented at: 17th Symposium on Usable Privacy and Security (USENIX Security 2021), Virtual, 08-10 August 2021.

Kumar, A., Saxena, N. and Choi, B. J. 2021. FedTLG: federated learning using trusted local groups. Presented at: 16th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2021), Virtual, 07-11 June 2021.

Alrowaili, Yazeed, Saxena, Neetesh and Burnap, Peter 2021. Determining asset criticality in cyber-physical smart grid. Presented at: 26th European Symposium on Research in Computer Security (ESORICS 2021), Virtual, 04-08 October 2021.

Nafees, M. N., Saxena, N. and Burnap, P. 2021. Optimized predictive control for AGC cyber resiliency. Presented at: 2021 ACM Conference on Computer and Communications Security (CCS), Seoul, South Korea, 14-19 November 2021.

Saxena, N, Hayes, E, Bertino, E, Ojo, P, Choo, K-K R and Burnap, P 2020. Impact and key challenges of insider threats on organizations and critical businesses. Electronics 9 (9) , 1460. 10.3390/electronics9091460
file

Tung, Yung-Hao, Wei, Hung-Chuan, Ti, Yen-Wu, Tsou, Yao-Tung, Saxena, Neetesh and Yu, Chia-Mu 2020. Counteracting UDP flooding attacks in SDN. Electronics 9 (8) , 1239. 10.3390/electronics9081239
file

Saxena, N., Thomas, I., Gope, P., Burnap, P. and Kumar, N. 2020. PharmaCrypt: blockchain for critical pharmaceutical industry to counterfeit drugs. Computer 53 (7) , pp. 29-44. 10.1109/MC.2020.2989238
file

Saxena, Neetesh, Shen, Hong, Komninos, Nikos, Choo, Kim-Kwang Raymond and Chaudhari, Narendra S. 2020. BVPSMS: A batch verification protocol for end-to-end secure SMS for mobile users. IEEE Transactions on Dependable and Secure Computing 17 (3) , pp. 550-565. 10.1109/TDSC.2018.2799223
file

Saxena, Neetesh, Cardenas, Alvaro A., Beyah, Raheem and Lu, Rongxing 2020. Introduction to the special issue on user-centric security and safety for CPS [Editorial]. ACM Transactions on Cyber-Physical Systems 4 (3) , 29. 10.1145/3392715
Item availability restricted.
file

Bhadoria, Robin Singh, Nimbalkar, Atharva and Saxena, Neetesh 2020. On the role of Blockchain technology in the Internet of Things. In: Kim, Shiho and Deka, Ganesh Chandra eds. Advanced Applications of Blockchain Technology, Springer, pp. 129-140.
file

Singh, V., Saxena, N., Pathak, D., Saini, G. and Bhatnagar, D. 2020. Improving smart healthcare safety & security using Kinect. Presented at: International Conference on Cybersecurity in Emerging Digital Era (ICCEDE 2020), Greater Noida, India, 9-10 October 2020.

Asad, B, Saxena, N. and Katos, V 2020. Analysis of the security and privacy risks and challenges in smart cities’ traffic light system. Presented at: 3rd Smart Cities Symposium (SCS 2020), Virtual, 21-23 September 2020.
file

Asad, Belal and Saxena, Neetesh 2020. On the feasibility of DoS attack on smart door lock IoT network. Presented at: 8th International Symposium on Security in Computing and Communications (SSCC 2020), Virtual, 14-17 October 2020.
file

Nafees, Muhammad Nouman, Saxena, Neetesh, Burnap, Peter and Choi, Bong Jun 2020. Impact of energy consumption attacks on LoRaWAN-enabled devices in industrial context. Presented at: ACM Conference on Computer and Communications Security (CCS 2020), Virtual, 9-13 November 2020.
file

Nafees, Muhammad Nouman, Saxena, Neetesh, Khan, Rashid and Burnap, Peter 2020. Towards distance relay attack discrimination for situational awareness-based anomaly detection. Presented at: Annual Computer Security Applications Conference (ACSAC 2020), Virtual, 7-11 December 2020.

Adewole, Kayode, Saxena, Neetesh and Bhadauria, Saumya 2019. Application of cryptocurrencies using Blockchain for e-commerce online payment. In: Maleh, Yassine, Shojaafar, Mohammad, Alazab, Mamoun and Romdhani, Imed eds. Blockchain for Cybersecurity and Privacy: Architectures, Challenges and Applications, C&C Press, Taylor & Francis Group,
file

Saxena, Neetesh, Conti, Mauro, Choo, Kim-Kwang Raymond and Chaudhari, Narendra S. 2019. BAS-VAS: A novel secure protocol for value added service delivery to mobile devices. IEEE Transactions on Information Forensics and Security 15 , pp. 1470-1485. 10.1109/TIFS.2019.2940908
file

Saxena, Neetesh and Grijalva, Santiago 2018. Efficient signature scheme for delivering authentic control commands in the smart grid. IEEE Transactions on Smart Grid 9 (5) , pp. 4323-4334. 10.1109/TSG.2017.2655014

Saxena, Neetesh and Choi, Bong Jun 2018. Integrated distributed authentication protocol for smart grid communications. IEEE Systems Journal 12 (3) , pp. 2545-2556. 10.1109/JSYST.2016.2574699
file

Chaudhary, Rajat, Jindal, Anish, Aujla, Gagangeet Singh, Kumar, Neeraj, Das, Ashok Kumar and Saxena, Neetesh 2018. LSCSH: Lattice-based secure cryptosystem for smart healthcare in smart cities environment. IEEE COMMUNICATIONS MAGAZINE 56 (4) , pp. 24-32. 10.1109/MCOM.2018.1700787

Saxena, Neetesh, Grijalva, Santiago and Choi, Bong Jun 2018. Securing restricted publisher-subscriber communications in smart grid substations. Presented at: International Conference on COMmunication Systems and NETworkS (COMSNETS), Bengaluru, India, 3-7 Jan. 2018. 2018 10th International Conference on Communication Systems & Networks (COMSNETS). IEEE, pp. 364-371. 10.1109/COMSNETS.2018.8328220
file

Stone, Jeremy A., Saxena, Neetesh and Dogan, Huseyin 2018. Systematic analysis: Resistance to traffic analysis attacks in Tor System for critical infrastructures. Presented at: IEEE International Conference on System, Man, and Cybernetics (SMC), Miyazaki, Japan, 7-10 Oct. 2018. 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, pp. 2832-2837. 10.1109/SMC.2018.00482

Saxena, Neetesh and Chaudhari, Narendra S. 2018. Secure algorithms for SAKA protocol in the GSM network. Presented at: 10th IFIP Wireless and Mobile Networking Conference (WMNC), Valencia, Spain, 25-27 Sep. 2017. 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC). IEEE, pp. 1-8. 10.1109/WMNC.2017.8248853

Saxena, Neetesh, Chukwuka, Victor, Xiong, Leilei and Grijalva, Santiago 2017. CPSA: A cyber-physical security assessment tool for situational awareness in smart grid. Presented at: ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) in Conjunction with ACM CCS, Dallas, USA, 3 Nov. 2017. CPS '17: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. ACM, pp. 69-79. 10.1145/3140241.3140246
file

Saxena, Neetesh, Grijalva, Santiago, Chukwuka, Victor and Vasilakos, Athanasios V. 2017. Network Security and Privacy Challenges in Smart Vehicle-to-Grid. IEEE Wireless Communications 24 (4) , pp. 88-98. 10.1109/MWC.2016.1600039WC

Saxena, Neetesh and Grijalva, Santiago 2017. Dynamic secrets and secret keys based scheme for securing last mile smart grid wireless communication. IEEE Transactions on Industrial Informatics 13 (3) , pp. 1482-1491. 10.1109/TII.2016.2610950

Saxena, Neetesh, Choi, Bong Jun and Grijalva, Santiago 2017. Secure and privacy-preserving concentration of meeting data in AMI networks. Presented at: IEEE International Conference on Communications (ICC), Paris, France, 21-25 May 2017. 2017 IEEE International Conference on Communications (ICC). IEEE, pp. 1-7. 10.1109/ICC.2017.7996874
file

Saxena, Neetesh, Grijalva, Santiago and Chaudhari, Narendra S. 2016. Authentication Protocol for an IoT-Enabled LTE Network. ACM Transactions on Internet Technology 16 (4) , -. 10.1145/2981547

Saxena, Neetesh and Choi, Bong Jun 2016. Authentication scheme for flexible charging and discharging of mobile vehicles in the V2G networks. IEEE Transactions on Information Forensics and Security 11 (7) , pp. 1438-1452. 10.1109/TIFS.2016.2532840

Saxena, Neetesh, Choi, Bong Jun and Lu, Rongxing 2016. Authentication and authorization scheme for various user roles and devices in smart grid. IEEE Transactions on Information Forensics and Security 11 (5) , pp. 907-921. 10.1109/TIFS.2015.2512525

Saxena, N. and Chaudhari, N. S. 2014. EasySMS: a protocol for end to end secure transmission of SMS. IEEE Transactions on Information Forensics and Security 9 (7) , pp. 1157-1168. 10.1109/TIFS.2014.2320579
file

This list was generated on Wed Oct 20 06:15:58 2021 BST.