Althunayyan, Muzun, Saxena, Neetesh, Li, Shancang and Gope, P
2022.
Evaluation of black-box web application security scanners in detecting injection vulnerabilities.
Electronics
11
(13)
, 2049.
10.3390/electronics11132049
![]() |
![]() |
Mohammed, Abubakar Sadiq, Saxena, Neetesh and Rana, Omer 2022. Wheels on the modbus - attacking ModbusTCP communications. Presented at: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2022), San Antonio, TX, United States, 16-19 May 2022. WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York: ACM, pp. 288-289. 10.1145/3507657.3529654 |
![]() |
Verma, Girraj, Gope, Prosanta, Saxena, Neetesh and Kumar, Neeraj 2022. CB-DA: Lightweight and escrow-free certificate-based data aggregation for smart grid. IEEE Transactions on Dependable and Secure Computing 10.1109/TDSC.2022.3169952 |
![]() |
Li, Shancang, Iqbal, Muddesar and Saxena, Neetesh
2022.
Future industry internet of things with aero-trust security.
Information Systems Frontiers
10.1007/s10796-021-10199-5
![]() |
![]() |
Merlino, Jorge C., Asiri, Mohammed and Saxena, Neetesh
2022.
DDoS cyber-incident detection in smart grids.
Sustainability
14
(5)
, 2730.
10.3390/su14052730
![]() |
|
Ali, Syed Sadaf, Ganapathi, Iyyakutti Iyappan, Vu, Ngoc-Son, Ali, Syed Danish, Saxena, Neetesh and Werghi
2022.
Image forgery detection using deeplearning by recompressing the images.
Electronics
11
(3)
, 403.
10.3390/electronics11030403
![]() |
![]() |
Aljohani, Roaa, Saxena, Neetesh and Bhadoria, R. S. 2022. Security issues and challenges in cloud computing. In: Alharahsheh, Husam H. and Mazumdar, Anupam eds. Handbook of Research on Cloud Computing Applications in SMES, IGI Global, |
![]() |
Khan, R., Saxena, N., Rana, O. and Gope, P. 2022. ATVSA: vehicle driver profiling for situational awareness. Presented at: IEEE European Symposium on Security and Privacy, ACSW, Genoa, Italy, 06-10 June 2022. IEEE, |
|
Kumar, Ajit, Saxena, Neetesh, Souhwan, Jung and Choi, Bong Jun
2021.
Improving detection of false data injection attacks using machine learning with feature selection and oversampling.
Electronics
15
(1)
, 212.
10.3390/en15010212
![]() |
![]() |
Nafees, M. N., Saxena, N. and Burnap, P.
2021.
Optimized predictive control for AGC cyber resiliency.
Presented at: 2021 ACM Conference on Computer and Communications Security (CCS),
Seoul, South Korea,
14-19 November 2021.
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security.
ACM,
pp. 2450-2452.
10.1145/3460120.3485358
![]() |
|
Orr, Fraser, Nafees, Muhammad Nouman, Saxena, Neetesh and Choi, Bong Jun
2021.
Securing publisher-subscriber in smart grid infrastructure.
Electronics
10
(19)
, 2355.
10.3390/electronics10192355
![]() |
![]() |
Liu, Chenyang, Alrowaili, Yazeed, Saxena, Neetesh and Konstantinou, Charalambos
2021.
Cyber risks to critical smart grid assets of industrial control systems.
Energies
14
(17)
, 5501.
10.3390/en14175501
![]() |
![]() |
Burke, George and Saxena, Neetesh
2021.
Cyber risks prediction and analysis in medical emergency equipment for situational awareness.
Sensors
21
(16)
, 5325.
10.3390/s21165325
![]() |
![]() |
Karunarathne, S M, Saxena, N. and Khan, M K 2021. Security and privacy in IoT smart healthcare. IEEE Internet Computing 25 (4) , pp. 37-48. 10.1109/MIC.2021.3051675 |
|
Chugh, N., Tomar, G. S., Bhadoria, R. S. and Saxena, N.
2021.
A novel anomaly behavior detection scheme for mobile ad hoc networks.
Electronics
10
(14)
, 1635.
10.3390/electronics10141635
![]() |
![]() |
Saxena, Neetesh, Xiong, Leilei, Chukwuka, Victor and Grijalva, Santiago 2021. Impact evaluation of malicious control commands in cyber-physical smart grids. IEEE Transactions on Sustainable Computing 6 (2) , pp. 208-220. 10.1109/TSUSC.2018.2879670 |
![]() |
Nafees, Muhammad Nouman, Saxena, Neetesh and Burnap, Peter 2021. Specification-based process control attack detection in substation automation. Presented at: 42nd IEEE Symposium on Security and Privacy 2021, Virtual, 23-27 May 2021. |
![]() |
Sharma, Uttam, Tomer, Pradeep, Ali, Syed Sadaf, Saxena, Neetesh and Bhadoria, Robin Singh
2021.
Optimized authentication system with high security and privacy.
Electronics
10
(4)
, 458.
10.3390/electronics10040458
![]() |
|
Gope, Prosanta, Millwood, Owen and Saxena, Neetesh 2021. A provably secure authentication scheme for RFID-enabled UAV applications. Computer Communications 166 , pp. 19-25. 10.1016/j.comcom.2020.11.009 |
|
Kumar, Ajit, Saxena, Neetesh and Choi, Bong Jun
2021.
Machine learning algorithm for detection of false data injection attack in power system.
Presented at: 35th International Conference on Information Networking (ICOIN 2021),
Jeju Island, Korea,
13-16 January 2021.
![]() |
![]() |
Asiri, Mohammed, Saxena, Neetesh and Burnap, Peter 2021. Investigating usable indicators against cyber-attacks in industrial control systems. Presented at: 17th Symposium on Usable Privacy and Security (USENIX Security 2021), Virtual, 08-10 August 2021. |
![]() |
Kumar, A., Saxena, N. and Choi, B. J. 2021. FedTLG: federated learning using trusted local groups. Presented at: 16th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2021), Virtual, 07-11 June 2021. |
![]() |
Alrowaili, Yazeed, Saxena, Neetesh and Burnap, Peter 2021. Determining asset criticality in cyber-physical smart grid. Presented at: 26th European Symposium on Research in Computer Security (ESORICS 2021), Virtual, 04-08 October 2021. |
![]() |
Saxena, N, Hayes, E, Bertino, E, Ojo, P, Choo, K-K R and Burnap, P
2020.
Impact and key challenges of insider threats on organizations and critical businesses.
Electronics
9
(9)
, 1460.
10.3390/electronics9091460
![]() |
![]() |
Tung, Yung-Hao, Wei, Hung-Chuan, Ti, Yen-Wu, Tsou, Yao-Tung, Saxena, Neetesh and Yu, Chia-Mu
2020.
Counteracting UDP flooding attacks in SDN.
Electronics
9
(8)
, 1239.
10.3390/electronics9081239
![]() |
![]() |
Saxena, N., Thomas, I., Gope, P., Burnap, P. and Kumar, N.
2020.
PharmaCrypt: blockchain for critical pharmaceutical industry to counterfeit drugs.
Computer
53
(7)
, pp. 29-44.
10.1109/MC.2020.2989238
![]() |
|
Saxena, Neetesh, Shen, Hong, Komninos, Nikos, Choo, Kim-Kwang Raymond and Chaudhari, Narendra S. 2020. BVPSMS: A batch verification protocol for end-to-end secure SMS for mobile users. IEEE Transactions on Dependable and Secure Computing 17 (3) , pp. 550-565. 10.1109/TDSC.2018.2799223 |
|
Saxena, Neetesh, Cardenas, Alvaro A., Beyah, Raheem and Lu, Rongxing
2020.
Introduction to the special issue on user-centric security and safety for CPS [Editorial].
ACM Transactions on Cyber-Physical Systems
4
(3)
, 29.
10.1145/3392715
Item availability restricted. |
![]() |
Bhadoria, Robin Singh, Nimbalkar, Atharva and Saxena, Neetesh 2020. On the role of Blockchain technology in the Internet of Things. In: Kim, Shiho and Deka, Ganesh Chandra eds. Advanced Applications of Blockchain Technology, Springer, pp. 129-140. |
|
Singh, V., Saxena, N., Pathak, D., Saini, G. and Bhatnagar, D. 2020. Improving smart healthcare safety & security using Kinect. Presented at: International Conference on Cybersecurity in Emerging Digital Era (ICCEDE 2020), Greater Noida, India, 9-10 October 2020. |
![]() |
Asad, B, Saxena, N. and Katos, V 2020. Analysis of the security and privacy risks and challenges in smart cities’ traffic light system. Presented at: 3rd Smart Cities Symposium (SCS 2020), Virtual, 21-23 September 2020. |
|
Asad, Belal and Saxena, Neetesh 2020. On the feasibility of DoS attack on smart door lock IoT network. Presented at: 8th International Symposium on Security in Computing and Communications (SSCC 2020), Virtual, 14-17 October 2020. |
|
Nafees, Muhammad Nouman, Saxena, Neetesh, Burnap, Peter and Choi, Bong Jun 2020. Impact of energy consumption attacks on LoRaWAN-enabled devices in industrial context. Presented at: ACM Conference on Computer and Communications Security (CCS 2020), Virtual, 9-13 November 2020. |
|
Nafees, Muhammad Nouman, Saxena, Neetesh, Khan, Rashid and Burnap, Peter 2020. Towards distance relay attack discrimination for situational awareness-based anomaly detection. Presented at: Annual Computer Security Applications Conference (ACSAC 2020), Virtual, 7-11 December 2020. |
![]() |
Adewole, Kayode, Saxena, Neetesh and Bhadauria, Saumya
2019.
Application of cryptocurrencies using Blockchain for e-commerce online payment.
In: Maleh, Yassine, Shojaafar, Mohammad, Alazab, Mamoun and Romdhani, Imed eds.
Blockchain for Cybersecurity and Privacy: Architectures, Challenges and Applications,
C&C Press, Taylor & Francis Group,
pp. 263-306.
![]() |
|
Saxena, Neetesh, Conti, Mauro, Choo, Kim-Kwang Raymond and Chaudhari, Narendra S. 2019. BAS-VAS: A novel secure protocol for value added service delivery to mobile devices. IEEE Transactions on Information Forensics and Security 15 , pp. 1470-1485. 10.1109/TIFS.2019.2940908 |
|
Saxena, Neetesh and Grijalva, Santiago 2018. Efficient signature scheme for delivering authentic control commands in the smart grid. IEEE Transactions on Smart Grid 9 (5) , pp. 4323-4334. 10.1109/TSG.2017.2655014 |
![]() |
Saxena, Neetesh and Choi, Bong Jun
2018.
Integrated distributed authentication protocol for smart grid communications.
IEEE Systems Journal
12
(3)
, pp. 2545-2556.
10.1109/JSYST.2016.2574699
![]() |
|
Chaudhary, Rajat, Jindal, Anish, Aujla, Gagangeet Singh, Kumar, Neeraj, Das, Ashok Kumar and Saxena, Neetesh 2018. LSCSH: Lattice-based secure cryptosystem for smart healthcare in smart cities environment. IEEE COMMUNICATIONS MAGAZINE 56 (4) , pp. 24-32. 10.1109/MCOM.2018.1700787 |
![]() |
Saxena, Neetesh, Grijalva, Santiago and Choi, Bong Jun 2018. Securing restricted publisher-subscriber communications in smart grid substations. Presented at: International Conference on COMmunication Systems and NETworkS (COMSNETS), Bengaluru, India, 3-7 Jan. 2018. 2018 10th International Conference on Communication Systems & Networks (COMSNETS). IEEE, pp. 364-371. 10.1109/COMSNETS.2018.8328220 |
|
Stone, Jeremy A., Saxena, Neetesh and Dogan, Huseyin 2018. Systematic analysis: Resistance to traffic analysis attacks in Tor System for critical infrastructures. Presented at: IEEE International Conference on System, Man, and Cybernetics (SMC), Miyazaki, Japan, 7-10 Oct. 2018. 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, pp. 2832-2837. 10.1109/SMC.2018.00482 |
![]() |
Saxena, Neetesh and Chaudhari, Narendra S. 2018. Secure algorithms for SAKA protocol in the GSM network. Presented at: 10th IFIP Wireless and Mobile Networking Conference (WMNC), Valencia, Spain, 25-27 Sep. 2017. 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC). IEEE, pp. 1-8. 10.1109/WMNC.2017.8248853 |
![]() |
Saxena, Neetesh, Chukwuka, Victor, Xiong, Leilei and Grijalva, Santiago 2017. CPSA: A cyber-physical security assessment tool for situational awareness in smart grid. Presented at: ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) in Conjunction with ACM CCS, Dallas, USA, 3 Nov. 2017. CPS '17: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. ACM, pp. 69-79. 10.1145/3140241.3140246 |
|
Saxena, Neetesh, Grijalva, Santiago, Chukwuka, Victor and Vasilakos, Athanasios V. 2017. Network Security and Privacy Challenges in Smart Vehicle-to-Grid. IEEE Wireless Communications 24 (4) , pp. 88-98. 10.1109/MWC.2016.1600039WC |
![]() |
Saxena, Neetesh and Grijalva, Santiago 2017. Dynamic secrets and secret keys based scheme for securing last mile smart grid wireless communication. IEEE Transactions on Industrial Informatics 13 (3) , pp. 1482-1491. 10.1109/TII.2016.2610950 |
![]() |
Saxena, Neetesh, Choi, Bong Jun and Grijalva, Santiago
2017.
Secure and privacy-preserving concentration of meeting data in AMI networks.
Presented at: IEEE International Conference on Communications (ICC),
Paris, France,
21-25 May 2017.
2017 IEEE International Conference on Communications (ICC).
IEEE,
pp. 1-7.
10.1109/ICC.2017.7996874
![]() |
|
Saxena, Neetesh, Grijalva, Santiago and Chaudhari, Narendra S. 2016. Authentication Protocol for an IoT-Enabled LTE Network. ACM Transactions on Internet Technology 16 (4) , -. 10.1145/2981547 |
![]() |
Saxena, Neetesh and Choi, Bong Jun 2016. Authentication scheme for flexible charging and discharging of mobile vehicles in the V2G networks. IEEE Transactions on Information Forensics and Security 11 (7) , pp. 1438-1452. 10.1109/TIFS.2016.2532840 |
![]() |
Saxena, Neetesh, Choi, Bong Jun and Lu, Rongxing 2016. Authentication and authorization scheme for various user roles and devices in smart grid. IEEE Transactions on Information Forensics and Security 11 (5) , pp. 907-921. 10.1109/TIFS.2015.2512525 |
![]() |
Saxena, N. and Chaudhari, N. S. 2014. EasySMS: a protocol for end to end secure transmission of SMS. IEEE Transactions on Information Forensics and Security 9 (7) , pp. 1157-1168. 10.1109/TIFS.2014.2320579 |
![]() |