default search action
Venkata Reddy Palleti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j10]Rajib Ranjan Maiti, Cheah Huei Yoong, Venkata Reddy Palleti, Arlindo Silva, Christopher M. Poskitt:
Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 20(4): 3378-3391 (2023) - 2022
- [c5]Muhammad Omer Shahid, Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, Jianying Zhou:
Curse of System Complexity and Virtue of Operational Invariants: Machine Learning based System Modeling and Attack Detection in CPS. DSC 2022: 1-8 - 2021
- [j9]Cheah Huei Yoong, Venkata Reddy Palleti, Rajib Ranjan Maiti, Arlindo Silva, Christopher M. Poskitt:
Deriving invariant checkers for critical infrastructure using axiomatic design principles. Cybersecur. 4(1): 6 (2021) - [j8]Venkata Reddy Palleti, Sridhar Adepu, Vishrut Kumar Mishra, Aditya Mathur:
Cascading effects of cyber-attacks on interconnected critical infrastructure. Cybersecur. 4(1): 8 (2021) - [j7]Venkata Reddy Palleti, Vishrut Kumar Mishra, Chuadhry Mujeeb Ahmed, Aditya Mathur:
Can Replay Attacks Designed to Steal Water from Water Distribution Systems Remain Undetected? ACM Trans. Cyber Phys. Syst. 5(1): 9:1-9:19 (2021) - 2020
- [j6]Evangelos Pournaras, Riccardo Taormina, Manish Thapa, Stefano Galelli, Venkata Reddy Palleti, Robert E. Kooij:
Cascading Failures in Interconnected Power-to-Water Networks. SIGMETRICS Perform. Evaluation Rev. 47(4): 16-20 (2020) - [c4]Sridhar Adepu, Venkata Reddy Palleti, Gyanendra Mishra, Aditya Mathur:
Investigation of Cyber Attacks on a Water Distribution System. ACNS Workshops 2020: 274-291 - [c3]Cheah Huei Yoong, Venkata Reddy Palleti, Arlindo Silva, Christopher M. Poskitt:
Towards Systematically Deriving Defence Mechanisms from Functional Requirements of Cyber-Physical Systems. CPSS@AsiaCCS 2020: 11-22 - [i2]Cheah Huei Yoong, Venkata Reddy Palleti, Arlindo Silva, Christopher M. Poskitt:
Towards Systematically Deriving Defence Mechanisms from Functional Requirements of Cyber-Physical Systems. CoRR abs/2007.03651 (2020)
2010 – 2019
- 2019
- [j5]Casper de Winter, Venkata Reddy Palleti, Daniël Worm, Robert E. Kooij:
Optimal placement of imperfect water quality sensors in water distribution networks. Comput. Chem. Eng. 121: 200-211 (2019) - [j4]Vishrut Kumar Mishra, Venkata Reddy Palleti, Aditya Mathur:
A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system. Int. J. Crit. Infrastructure Prot. 26 (2019) - [c2]Cheng Feng, Venkata Reddy Palleti, Aditya Mathur, Deeph Chana:
A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems. NDSS 2019 - [i1]Sridhar Adepu, Venkata Reddy Palleti, Gyanendra Mishra, Aditya Mathur:
Investigation of Cyber Attacks on a Water Distribution System. CoRR abs/1906.02279 (2019) - 2018
- [j3]Venkata Reddy Palleti, Varghese Kurian, Shankar Narasimhan, Raghunathan Rengaswamy:
Actuator network design to mitigate contamination effects in Water Distribution Networks. Comput. Chem. Eng. 108: 194-205 (2018) - [j2]Venkata Reddy Palleti, Jude Victor Joseph, Arlindo Silva:
A contribution of axiomatic design principles to the analysis and impact of attacks on critical infrastructures. Int. J. Crit. Infrastructure Prot. 23: 21-32 (2018) - 2017
- [c1]Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, Aditya P. Mathur:
WADI: a water distribution testbed for research in the design of secure cyber physical systems. CySWATER@CPSWeek 2017: 25-28 - 2016
- [j1]Venkata Reddy Palleti, Shankar Narasimhan, Raghunathan Rengaswamy, Ravi Teja, S. Murty Bhallamudi:
Sensor network design for contaminant detection and identification in water distribution networks. Comput. Chem. Eng. 87: 246-256 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint