default search action
Aditya P. Mathur
Person information
- affiliation: Purdue University, West Lafayette, USA
- affiliation: Singapore University of Technology and Design
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j59]Laksh Nanwani, Kumaraditya Gupta, Aditya Mathur, Swayam Agrawal, A. H. Abdul Hafez, K. Madhava Krishna:
Open-set 3D semantic instance maps for vision language navigation - O3D-SIM. Adv. Robotics 38(19-20): 1378-1391 (2024) - [c107]Ivan Christian, Francisco Furtado, Aditya P. Mathur:
DRACE: A Framework for Evaluating Anomaly Detectors for Industrial Control Systems. CPSS@AsiaCCS 2024: 77-87 - [i8]Laksh Nanwani, Kumaraditya Gupta, Aditya Mathur, Swayam Agrawal, A. H. Abdul Hafez, K. Madhava Krishna:
Open-Set 3D Semantic Instance Maps for Vision Language Navigation - O3D-SIM. CoRR abs/2404.17922 (2024) - 2023
- [j58]Aditya P. Mathur:
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure. IEEE Secur. Priv. 21(4): 51-60 (2023) - [j57]Antonia Bertolino, Shin Hong, Aditya P. Mathur:
Introduction to the special issue on automation of software test and test code quality. J. Softw. Evol. Process. 35(4) (2023) - [c106]Laksh Nanwani, Anmol Agarwal, Kanishk Jain, Raghav Prabhakar, Aaron Monis, Aditya Mathur, Krishna Murthy Jatavallabhula, A. H. Abdul Hafez, Vineet Gandhi, K. Madhava Krishna:
Instance-Level Semantic Maps for Vision Language Navigation. RO-MAN 2023: 507-512 - [i7]Laksh Nanwani, Anmol Agarwal, Kanishk Jain, Raghav Prabhakar, Aaron Monis, Aditya Mathur, Krishna Murthy Jatavallabhula, A. H. Abdul Hafez, Vineet Gandhi, K. Madhava Krishna:
Instance-Level Semantic Maps for Vision Language Navigation. CoRR abs/2305.12363 (2023) - 2022
- [j56]Dillon Cheong Lien Sung, M. R. Gauthama Raman, Aditya P. Mathur:
Design-knowledge in learning plant dynamics for detecting process anomalies in water treatment plants. Comput. Secur. 113: 102532 (2022) - [j55]Muhammad Azmi Umer, Khurum Nazir Junejo, Muhammad Taha Jilani, Aditya P. Mathur:
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations. Int. J. Crit. Infrastructure Prot. 38: 100516 (2022) - [j54]M. R. Gauthama Raman, Aditya P. Mathur:
AICrit: A unified framework for real-time anomaly detection in water treatment plants. J. Inf. Secur. Appl. 64: 103046 (2022) - [j53]M. R. Gauthama Raman, Aditya P. Mathur:
A Hybrid Physics-Based Data-Driven Framework for Anomaly Detection in Industrial Control Systems. IEEE Trans. Syst. Man Cybern. Syst. 52(9): 6003-6014 (2022) - [c105]Siddhant Shrivastava, Francisco Furtado, Mark Goh, Aditya Mathur:
The Design of Cyber-Physical Exercises (CPXS). CyCom 2022: 348-366 - [c104]Muhammad Azmi Umer, Aditya Mathur, Muhammad Taha Jilani:
Effect of time patterns in mining process invariants for industrial control systems: an experimental study. SEA4DQ@ESEC/SIGSOFT FSE 2022: 10-17 - [i6]Muhammad Azmi Umer, Khurum Nazir Junejo, Muhammad Taha Jilani, Aditya P. Mathur:
Machine Learning for Intrusion Detection in Industrial Control Systems: Applications, Challenges, and Recommendations. CoRR abs/2202.11917 (2022) - 2021
- [j52]Venkata Reddy Palleti, Sridhar Adepu, Vishrut Kumar Mishra, Aditya Mathur:
Cascading effects of cyber-attacks on interconnected critical infrastructure. Cybersecur. 4(1): 8 (2021) - [j51]M. R. Gauthama Raman, Chuadhry Mujeeb Ahmed, Aditya Mathur:
Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation. Cybersecur. 4(1): 27 (2021) - [j50]Sridhar Adepu, Aditya Mathur:
SafeCI: Avoiding process anomalies in critical infrastructure. Int. J. Crit. Infrastructure Prot. 34: 100435 (2021) - [j49]Venkata Reddy Palleti, Vishrut Kumar Mishra, Chuadhry Mujeeb Ahmed, Aditya Mathur:
Can Replay Attacks Designed to Steal Water from Water Distribution Systems Remain Undetected? ACM Trans. Cyber Phys. Syst. 5(1): 9:1-9:19 (2021) - [j48]Sridhar Adepu, Aditya Mathur:
Distributed Attack Detection in a Water Treatment Plant: Method and Case Study. IEEE Trans. Dependable Secur. Comput. 18(1): 86-99 (2021) - [j47]Sridhar Adepu, Aditya Mathur:
Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems. IEEE Trans. Sustain. Comput. 6(2): 231-244 (2021) - [c103]Salimah Liyakkathali, Gayathri Sugumar, Aditya Mathur:
Attacklets to Test Anomaly Detectors for Critical Infrastructure. ACNS Workshops 2021: 209-227 - [c102]Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya Mathur:
Scanning the Cycle: Timing-based Authentication on PLCs. AsiaCCS 2021: 886-900 - [c101]Siddhant Shrivastava, M. R. Gauthama Raman, Aditya Mathur:
PCAT: PLC Command Analysis Tool for automatic incidence response in Water Treatment Plants. IEEE BigData 2021: 2151-2159 - [c100]Muhammad Azmi Umer, Chuadhry Mujeeb Ahmed, Muhammad Taha Jilani, Aditya P. Mathur:
Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning. CPSIOTSEC@CCS 2021: 35-40 - [c99]Madhumitha Balaji, Siddhant Shrivastava, Sridhar Adepu, Aditya Mathur:
Super Detector: An Ensemble Approach for Anomaly Detection in Industrial Control Systems. CRITIS 2021: 24-43 - [i5]Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya Mathur:
Scanning the Cycle: Timing-based Authentication on PLCs. CoRR abs/2102.08985 (2021) - [i4]Muhammad Azmi Umer, Chuadhry Mujeeb Ahmed, Muhammad Taha Jilani, Aditya P. Mathur:
Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning. CoRR abs/2107.05127 (2021) - 2020
- [j46]M. R. Gauthama Raman, Wenjie Dong, Aditya Mathur:
Deep autoencoders as anomaly detectors: Method and case study in a distributed water treatment plant. Comput. Secur. 99: 102055 (2020) - [j45]Muhammad Azmi Umer, Aditya Mathur, Khurum Nazir Junejo, Sridhar Adepu:
Generating invariants using design and data-centric approaches for distributed attack detection. Int. J. Crit. Infrastructure Prot. 28: 100341 (2020) - [j44]M. R. Gauthama Raman, Nivethitha Somu, Aditya P. Mathur:
A multilayer perceptron model for anomaly detection in water treatment plants. Int. J. Crit. Infrastructure Prot. 31: 100393 (2020) - [j43]Sridhar Adepu, Nandha Kumar Kandasamy, Jianying Zhou, Aditya Mathur:
Attacks on smart grid: power supply interruption and malicious power generation. Int. J. Inf. Sec. 19(2): 189-211 (2020) - [j42]Salimah Liyakkathali, Francisco Furtado, Gayathri Sugumar, Aditya Mathur:
A Mechanism to Assess the Effectiveness Anomaly Detectors in Industrial Control Systems. J. Integr. Des. Process. Sci. 24(3-4): 35-50 (2020) - [j41]Chuadhry Mujeeb Ahmed, Aditya P. Mathur, Martín Ochoa:
NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints. ACM Trans. Priv. Secur. 24(1): 2:1-2:35 (2020) - [c98]Sridhar Adepu, Venkata Reddy Palleti, Gyanendra Mishra, Aditya Mathur:
Investigation of Cyber Attacks on a Water Distribution System. ACNS Workshops 2020: 274-291 - [c97]Chuadhry Mujeeb Ahmed, M. R. Gauthama Raman, Aditya P. Mathur:
Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems. CPSS@AsiaCCS 2020: 23-29 - [c96]Herman Wijaya, Maurício Finavaro Aniche, Aditya Mathur:
Domain-Based Fuzzing for Supervised Learning of Anomaly Detection in Cyber-Physical Systems. ICSE (Workshops) 2020: 237-244
2010 – 2019
- 2019
- [j40]Vishrut Kumar Mishra, Venkata Reddy Palleti, Aditya Mathur:
A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system. Int. J. Crit. Infrastructure Prot. 26 (2019) - [j39]Gayathri Sugumar, Aditya Mathur:
A method for testing distributed anomaly detectors. Int. J. Crit. Infrastructure Prot. 27 (2019) - [j38]Aung Maw, Sridhar Adepu, Aditya Mathur:
ICS-BlockOpS: Blockchain for operational data security in industrial control system. Pervasive Mob. Comput. 59 (2019) - [j37]Hanyu Pei, Kai-Yuan Cai, Beibei Yin, Aditya P. Mathur, Min Xie:
Dynamic Random Testing: Technique and Experimental Evaluation. IEEE Trans. Reliab. 68(3): 872-892 (2019) - [c95]M. R. Gauthama Raman, Nivethitha Somu, Aditya P. Mathur:
Anomaly Detection in Critical Infrastructure Using Probabilistic Neural Network. ATIS 2019: 129-141 - [c94]Qin Lin, Sicco Verwer, Robert E. Kooij, Aditya Mathur:
Using Datasets from Industrial Control Systems for Cyber Security Research and Education. CRITIS 2019: 122-133 - [c93]Gayathri Sugumar, Aditya Mathur:
Assessment of a Method for Detecting Process Anomalies Using Digital-Twinning. EDCC 2019: 119-126 - [c92]Sridhar Adepu, Eunsuk Kang, Aditya P. Mathur:
Challenges in Secure Engineering of Critical Infrastructure Systems. ASE Workshops 2019: 61-64 - [c91]Cheng Feng, Venkata Reddy Palleti, Aditya Mathur, Deeph Chana:
A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems. NDSS 2019 - [i3]Sridhar Adepu, Venkata Reddy Palleti, Gyanendra Mishra, Aditya Mathur:
Investigation of Cyber Attacks on a Water Distribution System. CoRR abs/1906.02279 (2019) - 2018
- [j36]Siddhant Shrivastava, Sridhar Adepu, Aditya Mathur:
Design and assessment of an Orthogonal Defense Mechanism for a water treatment facility. Robotics Auton. Syst. 101: 114-125 (2018) - [c90]Chuadhry Mujeeb Ahmed, Jianying Zhou, Aditya P. Mathur:
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS. ACSAC 2018: 566-581 - [c89]Aditya Mathur:
On The Limits of Detecting Process Anomalies in Critical Infrastructure. CPSS@AsiaCCS 2018: 1 - [c88]Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya P. Mathur, Rizwan Qadeer, Carlos Murguia, Justin Ruths:
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems. AsiaCCS 2018: 483-497 - [c87]Qin Lin, Sridhar Adepu, Sicco Verwer, Aditya Mathur:
TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems. AsiaCCS 2018: 525-536 - [c86]Sridhar Adepu, Nandha Kumar Kandasamy, Aditya Mathur:
EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security. CyberICPS/SECPRE@ESORICS 2018: 37-52 - [c85]Sai Sidharth Patlolla, Bruce M. McMillin, Sridhar Adepu, Aditya Mathur:
An Approach for Formal Analysis of the Security of a Water Treatment Testbed. PRDC 2018: 115-124 - [i2]Sridhar Adepu, Aditya Mathur:
Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems. CoRR abs/1809.04786 (2018) - 2017
- [j35]Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya Mathur:
A comprehensive approach, and a case study, for conducting attack detection experiments in Cyber-Physical Systems. Robotics Auton. Syst. 98: 174-191 (2017) - [c84]Muhammad Azmi Umer, Aditya Mathur, Khurum Nazir Junejo, Sridhar Adepu:
Integrating Design and Data Centric Approaches to Generate Invariants for Distributed Attack Detection. CPS-SPC@CCS 2017: 131-136 - [c83]Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, Aditya P. Mathur:
WADI: a water distribution testbed for research in the design of secure cyber physical systems. CySWATER@CPSWeek 2017: 25-28 - [c82]Aditya Mathur:
SecWater: a multi-layer security framework for water treatment plants. CySWATER@CPSWeek 2017: 29-32 - [c81]Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya Mathur:
Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems. PRDC 2017: 235-244 - [c80]Gayathri Sugumar, Aditya Mathur:
Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems. QRS Companion 2017: 138-145 - [c79]Sridhar Adepu, Gyanendra Mishra, Aditya Mathur:
Access Control in Water Distribution Networks: A Case Study. QRS 2017: 184-191 - [c78]Sridhar Adepu, Jay Prakash, Aditya Mathur:
WaterJam: An Experimental Case Study of Jamming Attacks on a Water Treatment System. QRS Companion 2017: 341-347 - [c77]Chuadhry Mujeeb Ahmed, Aditya P. Mathur:
Hardware Identification via Sensor Fingerprinting in a Cyber Physical System. QRS Companion 2017: 517-524 - [c76]Sridhar Adepu, Aditya Mathur:
From Design to Invariants: Detecting Attacks on Cyber Physical Systems. QRS Companion 2017: 533-540 - [i1]Chuadhry Mujeeb Ahmed, Aditya Mathur, Martín Ochoa:
NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints. CoRR abs/1712.01598 (2017) - 2016
- [j34]Sridhar Adepu, Siddhant Shrivastava, Aditya Mathur:
Argus: An Orthogonal Defense Framework to Protect Public Infrastructure against Cyber-Physical Attacks. IEEE Internet Comput. 20(5): 38-45 (2016) - [c75]Sridhar Adepu, Aditya Mathur:
Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant. AsiaCCS 2016: 449-460 - [c74]Aditya P. Mathur:
Challenges in Testing the Design of Secure Complex Critical Public Infrastructure. COMPSAC Workshops 2016: 45 - [c73]Aditya P. Mathur:
Designing [Secure] Complex Critical Public Infrastructure. COMPSAC 2016: 282 - [c72]Sridhar Adepu, Aditya Mathur:
Generalized Attacker and Attack Models for Cyber Physical Systems. COMPSAC 2016: 283-292 - [c71]Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya P. Mathur:
Empirical Assessment of Corrupt Sensor Data Detection Methods in a Robot. COMPSAC Workshops 2016: 482-489 - [c70]Aditya P. Mathur, Nils Ole Tippenhauer:
SWaT: a water treatment testbed for research and training on ICS security. CySWATER@CPSWeek 2016: 31-36 - [c69]Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, Aditya Mathur:
A Dataset to Support Research in the Design of Secure Water Treatment Systems. CRITIS 2016: 88-99 - [c68]Giedre Sabaliauskaite, Sridhar Adepu, Aditya Mathur:
A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems. CRITIS 2016: 189-200 - [c67]Sridhar Adepu, Aditya P. Mathur:
Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study. CSDM Asia 2016: 75-94 - [c66]Sridhar Adepu, Aditya Mathur:
An Investigation into the Response of a Water Treatment System to Cyber Attacks. HASE 2016: 141-148 - [c65]Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya P. Mathur:
Empirical Assessment of Methods to Detect Cyber Attacks on a Robot. HASE 2016: 248-251 - [c64]Eunsuk Kang, Sridhar Adepu, Daniel Jackson, Aditya P. Mathur:
Model-based security analysis of a water treatment system. SEsCPS@ICSE 2016: 22-28 - [c63]Sridhar Adepu, Aditya Mathur:
Using Process Invariants to Detect Cyber Attacks on a Water Treatment System. SEC 2016: 91-104 - [c62]Sridhar Adepu, Aditya P. Mathur:
Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions. SG-CRC 2016: 59-74 - [e1]Aditya Mathur, Abhik Roychoudhury:
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016. Cryptology and Information Security Series 14, IOS Press 2016, ISBN 978-1-61499-616-3 [contents] - 2015
- [j33]Fevzi Belli, Mutlu Beyazit, André Takeshi Endo, Aditya P. Mathur, Adenilso da Silva Simão:
Fault domain-based testing in imperfect situations: a heuristic approach and case studies. Softw. Qual. J. 23(3): 423-452 (2015) - [c61]Sridhar Adepu, Aditya Mathur, Jagadeesh Gunda, Sasa Z. Djokic:
An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical Systems. ICA3PP (3) 2015: 785-798 - [c60]Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya P. Mathur:
Experimental Evaluation of Stealthy Attack Detection in a Robot. PRDC 2015: 70-79 - 2014
- [c59]Giedre Sabaliauskaite, Aditya P. Mathur:
Design of Intelligent Checkers to Enhance the Security and Safety of Cyber Physical Systems. COMPSAC Workshops 2014: 7-12 - [c58]Giedre Sabaliauskaite, Aditya P. Mathur:
Countermeasures to Enhance Cyber-physical System Security and Safety. COMPSAC Workshops 2014: 13-18 - [c57]Giedre Sabaliauskaite, Aditya P. Mathur:
Aligning Cyber-Physical System Safety and Security. CSDM Asia 2014: 41-53 - 2013
- [j32]Hai Hu, Chang-Hai Jiang, Kai-Yuan Cai, W. Eric Wong, Aditya P. Mathur:
Enhancing software reliability estimates using modified adaptive testing. Inf. Softw. Technol. 55(2): 288-300 (2013) - [c56]Giedre Sabaliauskaite, Aditya P. Mathur:
Intelligent Checkers to Improve Attack Detection in Cyber Physical Systems. CyberC 2013: 27-30 - [c55]Karthikeyan Rajasekharan, Aditya P. Mathur, See-Kiong Ng:
Effective Crowdsourcing for Software Feature Ideation in Online Co-Creation Forums. SEKE 2013: 119-124 - 2012
- [j31]Fevzi Belli, Mutlu Beyazit, Aditya P. Mathur, Nimal Nissanke:
Modeling, Analysis, and Testing of System Vulnerabilities. Adv. Comput. 84: 39-92 (2012) - [c54]Weiguang Wang, Qingkai Zeng, Aditya P. Mathur:
A Security Assurance Framework Combining Formal Verification and Security Functional Testing. QSIC 2012: 136-139 - 2011
- [j30]Yi Fang, Luo Si, Aditya P. Mathur:
Discriminative probabilistic models for expert search in heterogeneous information sources. Inf. Retr. 14(2): 158-177 (2011) - [j29]Robert M. Hierons, Aditya Mathur:
ICST 2008 Special Issue. Softw. Test. Verification Reliab. 21(1): 1 (2011) - [c53]Huanyin Yi, Chang-Hai Jiang, Hai Hu, Kai-Yuan Cai, Aditya P. Mathur:
Using Markov-Chains to Model Reliability and QoS for Deployed Service-Based Systems. COMPSAC Workshops 2011: 356-361 - [c52]W. Eric Wong, Antonia Bertolino, Vidroha Debroy, Aditya P. Mathur, Jeff Offutt, Mladen A. Vouk:
Teaching software testing: Experiences, lessons learned and the path forward. CSEE&T 2011: 530-534 - [c51]Yi Fang, Naveen Somasundaram, Luo Si, Jeongwoo Ko, Aditya P. Mathur:
Analysis of an expert search query log. SIGIR 2011: 1189-1190 - 2010
- [j28]Yi Fang, Luo Si, Aditya P. Mathur:
Discriminative graphical models for faculty homepage discovery. Inf. Retr. 13(6): 618-635 (2010) - [j27]Ammar Masood, Arif Ghafoor, Aditya P. Mathur:
Fault coverage of Constrained Random Test Selection for access control: A formal analysis. J. Syst. Softw. 83(12): 2607-2617 (2010) - [j26]Ammar Masood, Arif Ghafoor, Aditya P. Mathur:
Conformance Testing of Temporal Role-Based Access Control Systems. IEEE Trans. Dependable Secur. Comput. 7(2): 144-158 (2010) - [c50]Vahid Garousi, Aditya Mathur:
Current State of the Software Testing Education in North American Academia and Some Recommendations for the New Educators. CSEE&T 2010: 89-96 - [c49]Yi Fang, Luo Si, Aditya P. Mathur:
Discriminative models of integrating document evidence and document-candidate associations for expert search. SIGIR 2010: 683-690
2000 – 2009
- 2009
- [j25]João W. Cangussu, Aditya P. Mathur:
Guest Editors' Introduction. Int. J. Softw. Eng. Knowl. Eng. 19(5): 625 (2009) - [j24]W. Eric Wong, Aditya P. Mathur:
Editorial. J. Syst. Softw. 82(9): 1375 (2009) - [j23]Ammar Masood, Rafae Bhatti, Arif Ghafoor, Aditya P. Mathur:
Scalable and Effective Test Generation for Role-Based Access Control Systems. IEEE Trans. Software Eng. 35(5): 654-668 (2009) - 2008
- [j22]Aditya P. Mathur, Johnny Wong:
Message from the guest editors. J. Syst. Softw. 81(10): 1623-1624 (2008) - [c48]Stephen S. Yau, João W. Cangussu, Aditya P. Mathur, Fevzi Belli, Kai-Yuan Cai:
Message from the IWSC 2008 Workshop Organizers. COMPSAC 2008: 813 - [c47]Stephen S. Yau, João W. Cangussu, Aditya P. Mathur, Fevzi Belli, Kai-Yuan Cai:
IWSC 2008 Workshop Organization. COMPSAC 2008: 814-815 - [c46]Scott D. Miller, Raymond A. DeCarlo, Aditya P. Mathur:
Quantitative Modeling for Incremental Software Process Control. COMPSAC 2008: 830-835 - [c45]K. R. Jayaram, Aditya P. Mathur:
On the Adequacy of Statecharts as a Source of Tests for Cryptographic Protocols. COMPSAC 2008: 937-942 - [p1]João W. Cangussu, Kai-Yuan Cai, Scott D. Miller, Aditya P. Mathur:
Software Cybernetics. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2007
- [c44]James Early, Rajesh Subramanyan, Aditya P. Mathur:
Academic/Industry Collaboration in Undergraduate Software Engineering - A Fifteen Year Perspective. FECS 2007: 28-34 - 2006
- [j21]Fevzi Belli, Kai-Yuan Cai, Raymond A. DeCarlo, Aditya P. Mathur:
Introduction to the special section on software cybernetics. J. Syst. Softw. 79(11): 1483-1485 (2006) - [j20]Scott D. Miller, Raymond A. DeCarlo, Aditya P. Mathur, João W. Cangussu:
A control-theoretic approach to the management of the software system test phase. J. Syst. Softw. 79(11): 1486-1503 (2006) - 2005
- [c43]Scott D. Miller, Aditya P. Mathur, Raymond A. DeCarlo:
DIG: A Tool for Software Process Data Extraction and Grooming. COMPSAC (1) 2005: 35-40 - [c42]Scott D. Miller, Raymond A. DeCarlo, Aditya P. Mathur:
A Software Cybernetic Approach to Control of the Software System Test Phase. COMPSAC (2) 2005: 103-108 - [c41]Aditya P. Mathur:
Model-Based Software Testing and Verification. COMPSAC (1) 2005: 329 - [c40]Qianxiang Wang, Aditya P. Mathur:
Interceptor Based Constraint Violation Detection. ECBS 2005: 457-464 - 2004
- [c39]Scott D. Miller, Raymond A. DeCarlo, Aditya P. Mathur:
Modeling and Control of the Incremental Software Test Process. COMPSAC Workshops 2004: 156-159 - [c38]J. Jenny Li, Tangqiu Li, Zongkai Lin, Aditya P. Mathur, Karama Kanoun:
Computer Supported Cooperative Work in Software Engineering. COMPSAC 2004: 328 - [c37]João W. Cangussu, Richard M. Karcich, Aditya P. Mathur, Raymond A. DeCarlo:
Software Release Control using Defect Based Quality Estimation. ISSRE 2004: 440-450 - 2003
- [j19]João W. Cangussu, Raymond A. DeCarlo, Aditya P. Mathur:
Using Sensitivity Analysis to Validate a State Variable Model of the Software Test Process. IEEE Trans. Software Eng. 29(5): 430-443 (2003) - [c36]Baskar Sridharan, Aditya P. Mathur, Kai-Yuan Cai:
Synthesizing Distributed Controllers for the Safe Operation of ConnectedSpaces. PerCom 2003: 452-459 - [c35]Baskar Sridharan, Aditya P. Mathur, Kai-Yuan Cai:
Using Supervisory Control to Synthesize Safety Controllers for Connected Spaces. QSIC 2003: 186- - [c34]João W. Cangussu, Raymond A. DeCarlo, Aditya P. Mathur:
Monitoring the software test process using statistical process control: a logarithmic approach. ESEC / SIGSOFT FSE 2003: 158-167 - [c33]Kai-Yuan Cai, João W. Cangussu, Raymond A. DeCarlo, Aditya P. Mathur:
An Overview of Software Cybernetics. STEP 2003: 77-86 - 2002
- [j18]Baskar Sridharan, Aditya P. Mathur, Steven G. Ungar:
Digital device manuals for the management of ConnectedSpaces. IEEE Commun. Mag. 40(8): 78-85 (2002) - [j17]João W. Cangussu, Raymond A. DeCarlo, Aditya P. Mathur:
A Formal Model of the Software Test Process. IEEE Trans. Software Eng. 28(8): 782-796 (2002) - [c32]João W. Cangussu, Aditya P. Mathur, Raymond A. DeCarlo:
Effect of Disturbances on the Convergence of Failure Intensity. ISSRE 2002: 377-387 - 2001
- [j16]Márcio Eduardo Delamaro, José Carlos Maldonado, Alberto Pasquini, Aditya P. Mathur:
Interface Mutation Test Adequacy Criterion: An Empirical Evaluation. Empir. Softw. Eng. 6(2): 111-142 (2001) - [j15]Sudipto Ghosh, Aditya P. Mathur:
Interface mutation. Softw. Test. Verification Reliab. 11(3): 227-247 (2001) - [j14]Márcio Eduardo Delamaro, José Carlos Maldonado, Aditya P. Mathur:
Interface Mutation: An Approach for Integration Testing. IEEE Trans. Software Eng. 27(3): 228-247 (2001) - [c31]Ramkumar Natarajan, Aditya P. Mathur, Paul McKee:
A XML based Policy-Driven Management Information Service. Integrated Network Management 2001: 277-280 - [c30]Katerina Goseva-Popstojanova, Aditya P. Mathur, Kishor S. Trivedi:
Many architecture-based software reliability modelsComparison of Architecture-Based Software Reliability Models. ISSRE 2001: 22-33 - [c29]João W. Cangussu, Aditya P. Mathur, Raymond A. DeCarlo:
Feedback Control of the Software Test Process Through Measurements of Software Reliability. ISSRE 2001: 232-241 - [c28]João W. Cangussu, Raymond A. DeCarlo, Aditya P. Mathur:
A state model for the Software Test Process with automated parameter identification. SMC 2001: 706-711 - [c27]João W. Cangussu, Raymond A. DeCarlo, Aditya P. Mathur:
Sensitivity analysis of a state variable model of the Software Test Process. SMC 2001: 712-717 - 2000
- [c26]Wenliang Du, Aditya P. Mathur:
Testing for Software Vulnerability Using Environment Perturbation. DSN 2000: 603-612 - [c25]Neelam Gupta, Aditya P. Mathur, Mary Lou Soffa:
Generating Test Data for Branch Coverage. ASE 2000: 219-228 - [c24]Sudipto Ghosh, Aditya P. Mathur:
Interface Mutation to Assess the Adequacy of Tests for Components and Systems. TOOLS (34) 2000: 37- - [c23]Baskar Sridharan, Sambrama Mundkur, Aditya P. Mathur:
Non-Intrusive Testing, Monitoring and Control of Distributed CORBA Objects. TOOLS (33) 2000: 195-
1990 – 1999
- 1999
- [j13]W. Eric Wong, Joseph Robert Horgan, Aditya P. Mathur, Alberto Pasquini:
Test set size minimization and fault detection effectiveness: A case study in a space application. J. Syst. Softw. 48(2): 79-89 (1999) - [c22]Wenliang Du, Praerit Garg, Aditya P. Mathur:
Security Relevancy Analysis on the Registry of Windows NT 4.0. ACSAC 1999: 331-338 - [c21]Neelam Gupta, Aditya P. Mathur, Mary Lou Soffa:
UNA Based Iterative Test Data Generation and Its Evaluation. ASE 1999: 224- - 1998
- [j12]W. Eric Wong, Joseph Robert Horgan, Saul London, Aditya P. Mathur:
Effect of Test Set Minimization on Fault Detection Effectiveness. Softw. Pract. Exp. 28(4): 347-369 (1998) - [c20]Neelam Gupta, Aditya P. Mathur, Mary Lou Soffa:
Automated Test Data Generation Using an Iterative Relaxation Method. SIGSOFT FSE 1998: 231-244 - 1997
- [c19]W. Eric Wong, Joseph Robert Horgan, Aditya P. Mathur, Alberto Pasquini:
Test Set Size Minimization and Fault Detection Effectiveness: A Case Study in a Space Application. COMPSAC 1997: 522-528 - [c18]Saileshwar Krishnamurthy, Aditya P. Mathur:
On the estimation of reliability of a software system using reliabilities of its components. ISSRE 1997: 146-155 - 1996
- [c17]Saileshwar Krishnamurthy, Aditya P. Mathur:
On predicting reliability of modules using code coverage. CASCON 1996: 22 - [c16]Márcio Eduardo Delamaro, José Carlos Maldonado, Aditya P. Mathur:
Integration testing using interface mutation. ISSRE 1996: 112-121 - 1995
- [j11]W. Eric Wong, Aditya P. Mathur:
Reducing the cost of mutation testing: An empirical study. J. Syst. Softw. 31(3): 185-196 (1995) - [j10]W. Eric Wong, Aditya P. Mathur:
Fault detection effectiveness of mutation and data flow testing. Softw. Qual. J. 4(1): 69-83 (1995) - [j9]Richard A. DeMillo, Aditya P. Mathur, W. Eric Wong:
Some Critical Remarks on a Hierarchy of Fault-Detecting Abilities of Test Methods. IEEE Trans. Software Eng. 21(10): 858-861 (1995) - [c15]David B. Boardman, Geoffrey Greene, Vivek Khandelwal, Aditya P. Mathur:
LISTEN: A Tool to Investigate the Use of Sound for the Analysis of Program Behavior. COMPSAC 1995: 184-189 - [c14]W. Eric Wong, Joseph Robert Horgan, Saul London, Aditya P. Mathur:
Effect of Test Set Minimization on Fault Detection Effectiveness. ICSE 1995: 41-50 - [c13]Fabio Del Frate, Praerit Garg, Aditya P. Mathur, Alberto Pasquini:
On the correlation between code coverage and software reliability. ISSRE 1995: 124-132 - 1994
- [j8]Ling-Yu Chuang, Vernon Rego, Aditya P. Mathur:
Experiments with Program unification on the Cray Y-MP. Concurr. Pract. Exp. 6(1): 33-53 (1994) - [j7]Aditya P. Mathur, W. Eric Wong:
An Empirical Comparison of Data Flow and Mutation-Based Test Adequacy Criteria. Softw. Test. Verification Reliab. 4(1): 9-31 (1994) - [c12]Aditya P. Mathur, W. Eric Wong:
A Theoretical Comparison Between Mutation and Data Flow Based Test Adequacy Criteria. ACM Conference on Computer Science 1994: 38-45 - [c11]David B. Boardman, Aditya P. Mathur:
A Two-Semester Undergraduate Sequence in Software Engineering: Architecutre & Experience. CSEE 1994: 5-22 - [c10]W. Eric Wong, Aditya P. Mathur, José Carlos Maldonado:
Mutation Versus All-uses: An Empirical Evaluation of Cost, Strength and Effectiveness. Software Quality and Productivity 1994: 258-265 - [c9]W. Eric Wong, Joseph R. Horgan, Saul London, Aditya P. Mathur:
Effect of test set size and block coverage on the fault detection effectiveness. ISSRE 1994: 230-238 - [c8]Mei-Hwa Chen, Aditya P. Mathur, Vernon Rego:
A case study to investigate sensitivity of reliability estimates to errors in operational profile. ISSRE 1994: 276-281 - [c7]W. Eric Wong, José Carlos Maldonado, Márcio E. Delamaro, Aditya P. Mathur:
Constrained Mutation in C programs. SBES 1994: 439-452 - 1993
- [j6]Byoungju Choi, Aditya P. Mathur:
High-performance mutation testing. J. Syst. Softw. 20(2): 135-152 (1993) - [c6]Mei-Hwa Chen, Michael K. Jones, Aditya P. Mathur, Vernon Rego:
TERSE: A tool for evaluating software reliability models. ISSRE 1993: 274-283 - [c5]Aditya P. Mathur, Weichen E. Wong:
Evaluation of The Cost of Alternate Mutation Strategies. SBES 1993: 320-334 - 1992
- [j5]Ling-Yu Chuang, Vernon Rego, Aditya P. Mathur:
An application of program unification to priority queue vectorization. Int. J. Parallel Program. 21(3): 193-224 (1992) - [j4]Joseph Robert Horgan, Aditya P. Mathur:
Assessing Testing Tools in Research and Education. IEEE Softw. 9(3): 61-69 (1992) - 1991
- [j3]Edward W. Krauser, Aditya P. Mathur, Vernon Rego:
High Performance Software Testing on SIMD Machines. IEEE Trans. Software Eng. 17(5): 403-423 (1991) - [c4]Richard A. DeMillo, Edward W. Krauser, Aditya P. Mathur:
Compiler-integrated program mutation. COMPSAC 1991: 351-356 - [c3]Aditya P. Mathur:
Performance, effectiveness, and reliability issues in software testing. COMPSAC 1991: 604-605 - 1990
- [j2]Vernon Rego, Aditya P. Mathur:
Concurrency Enhancement through Program Unification: A Performance Analysis. J. Parallel Distributed Comput. 8(3): 201-217 (1990) - [j1]Vernon Rego, Aditya P. Mathur:
Exploiting Parallelism Across Program Execution: A Unification Technique and Its Analysis. IEEE Trans. Parallel Distributed Syst. 1(4): 399-414 (1990)
1980 – 1989
- 1989
- [c2]Byoungju Choi, Aditya P. Mathur, Brian Pattison:
PMothra: Scheduling Mutants for Execution on a Hypercube. Symposium on Testing, Analysis, and Verification 1989: 58-65 - 1988
- [c1]Aditya P. Mathur, Edward W. Krauser:
Modeling Mutation on a Vector Processor. ICSE 1988: 154-161
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint