default search action
Neetesh Saxena
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Yazeed Alrowaili, Neetesh Saxena, Pete Burnap:
Towards Developing an Asset-Criticality Identification Framework in Smart Grids. CSR 2024: 720-725 - 2023
- [j28]Ayodeji O. Rotibi, Neetesh Saxena, Pete Burnap, Alex Tarter:
Extended Dependency Modeling Technique for Cyber Risk Identification in ICS. IEEE Access 11: 37229-37242 (2023) - [j27]Abubakar Sadiq Mohammed, Eirini Anthi, Omer F. Rana, Neetesh Saxena, Pete Burnap:
Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication. Comput. Secur. 124: 103007 (2023) - [j26]Muhammad Nouman Nafees, Neetesh Saxena, Alvaro A. Cárdenas, Santiago Grijalva, Pete Burnap:
Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: A Review. ACM Comput. Surv. 55(10): 215:1-215:36 (2023) - [j25]Yazeed Alrowaili, Neetesh Saxena, Anurag Srivastava, Mauro Conti, Pete Burnap:
A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification. IET Cyper-Phys. Syst.: Theory & Appl. 8(3): 160-185 (2023) - [j24]Mohammed Asiri, Neetesh Saxena, Rigel Gjomemo, Pete Burnap:
Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective. ACM Trans. Cyber Phys. Syst. 7(2): 15:1-15:33 (2023) - [j23]Girraj Kumar Verma, Prosanta Gope, Neetesh Saxena, Neeraj Kumar:
CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid. IEEE Trans. Dependable Secur. Comput. 20(3): 2011-2024 (2023) - [j22]Prosanta Gope, Biplab Sikdar, Neetesh Saxena:
Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges. IEEE Trans. Ind. Informatics 19(1): 867-869 (2023) - [c20]Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems. ACNS Workshops 2023: 700-704 - [c19]Connor J. Potter, Neetesh Saxena, Soumyadev Maity:
Clarity: Analysing Security in Web Applications. COMSNETS 2023: 522-528 - [c18]Mohammed Asiri, Neetesh Saxena, Pete Burnap:
ARCSG: Advancing Resilience of Cyber-Physical Smart Grid: An Integrated Co-Simulation Approach Incorporating Indicators of Compromise. EuroS&P Workshops 2023: 370-378 - 2022
- [c17]Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
Poster: Physics-Informed Augmentation for Contextual Anomaly Detection in Smart Grid. CCS 2022: 3427-3429 - [c16]Rashid Khan, Neetesh Saxena, Omer F. Rana, Prosanta Gope:
ATVSA: Vehicle Driver Profiling for Situational Awareness. EuroS&P Workshops 2022: 348-357 - [c15]Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
On The Efficacy of Physics-Informed Context-Based Anomaly Detection for Power Systems. SmartGridComm 2022: 374-379 - [c14]Abubakar Sadiq Mohammed, Neetesh Saxena, Omer F. Rana:
Wheels on the Modbus - Attacking ModbusTCP Communications. WISEC 2022: 288-289 - 2021
- [j21]Prosanta Gope, Owen Millwood, Neetesh Saxena:
A provably secure authentication scheme for RFID-enabled UAV applications. Comput. Commun. 166: 19-25 (2021) - [j20]Sivanarayani M. Karunarathne, Neetesh Saxena, Muhammad Khurram Khan:
Security and Privacy in IoT Smart Healthcare. IEEE Internet Comput. 25(4): 37-48 (2021) - [j19]George Burke, Neetesh Saxena:
Cyber Risks Prediction and Analysis in Medical Emergency Equipment for Situational Awareness. Sensors 21(16): 5325 (2021) - [j18]Neetesh Saxena, Leilei Xiong, Victor Chukwuka, Santiago Grijalva:
Impact Evaluation of Malicious Control Commands in Cyber-Physical Smart Grids. IEEE Trans. Sustain. Comput. 6(2): 208-220 (2021) - [c13]Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
Optimized Predictive Control for AGC Cyber Resiliency. CCS 2021: 2450-2452 - [c12]Ajit Kumar, Neetesh Saxena, Bong Jun Choi:
Machine Learning Algorithm for Detection of False Data Injection Attack in Power System. ICOIN 2021: 385-390 - 2020
- [j17]Neetesh Saxena, Ieuan Thomas, Prosanta Gope, Pete Burnap, Neeraj Kumar:
PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs. Computer 53(7): 29-44 (2020) - [j16]Neetesh Saxena, Alvaro A. Cárdenas, Raheem Beyah, Rongxing Lu, Kim-Kwang Raymond Choo, Yiran Chen:
Introduction to the Special Issue on User-Centric Security and Safety for CPS. ACM Trans. Cyber Phys. Syst. 4(3): 29:1-29:2 (2020) - [j15]Neetesh Saxena, Hong Shen, Nikos Komninos, Kim-Kwang Raymond Choo, Narendra S. Chaudhari:
BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users. IEEE Trans. Dependable Secur. Comput. 17(3): 550-565 (2020) - [j14]Neetesh Saxena, Mauro Conti, Kim-Kwang Raymond Choo, Narendra S. Chaudhari:
BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices. IEEE Trans. Inf. Forensics Secur. 15: 1470-1485 (2020) - [c11]Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap, Bong Jun Choi:
Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in Industrial Context. CCS 2020: 2117-2119 - [c10]Belal Asad, Neetesh Saxena:
On the Feasibility of DoS Attack on Smart Door Lock IoT Network. SSCC 2020: 123-138
2010 – 2019
- 2018
- [j13]Rajat Chaudhary, Anish Jindal, Gagangeet Singh Aujla, Neeraj Kumar, Ashok Kumar Das, Neetesh Saxena:
LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment. IEEE Commun. Mag. 56(4): 24-32 (2018) - [j12]Neetesh Saxena, Bong Jun Choi:
Integrated Distributed Authentication Protocol for Smart Grid Communications. IEEE Syst. J. 12(3): 2545-2556 (2018) - [j11]Neetesh Saxena, Santiago Grijalva:
Efficient Signature Scheme for Delivering Authentic Control Commands in the Smart Grid. IEEE Trans. Smart Grid 9(5): 4323-4334 (2018) - [c9]Neetesh Saxena, Santiago Grijalva, Bong Jun Choi:
Securing restricted publisher-subscriber communications in smart grid substations. COMSNETS 2018: 364-371 - [c8]Rajat Chaudhary, Gagangeet Singh Aujla, Neeraj Kumar, Ashok Kumar Das, Neetesh Saxena, Joel J. P. C. Rodrigues:
LaCSys: Lattice-Based Cryptosystem for Secure Communication in Smart Grid Environment. ICC 2018: 1-6 - [c7]Jeremy A. Stone, Neetesh Saxena, Huseyin Dogan:
Systematic Analysis: Resistance to Traffic Analysis Attacks in Tor System for Critical Infrastructures. SMC 2018: 2832-2837 - 2017
- [j10]Neetesh Saxena, Santiago Grijalva:
Dynamic Secrets and Secret Keys Based Scheme for Securing Last Mile Smart Grid Wireless Communication. IEEE Trans. Ind. Informatics 13(3): 1482-1491 (2017) - [j9]Neetesh Saxena, Santiago Grijalva, Victor Chukwuka, Athanasios V. Vasilakos:
Network Security and Privacy Challenges in Smart Vehicle-to-Grid. IEEE Wirel. Commun. 24(4): 88-98 (2017) - [c6]Neetesh Saxena, Victor Chukwuka, Leilei Xiong, Santiago Grijalva:
CPSA: A Cyber-Physical Security Assessment Tool for Situational Awareness in Smart Grid. CPS-SPC@CCS 2017: 69-79 - [c5]Neetesh Saxena, Bong Jun Choi, Santiago Grijalva:
Secure and privacy-preserving concentration of metering data in AMI networks. ICC 2017: 1-7 - [c4]Neetesh Saxena, Narendra S. Chaudhari:
Secure algorithms for SAKA protocol in the GSM network. WMNC 2017: 1-8 - 2016
- [j8]Neetesh Saxena, Bong Jun Choi, Rongxing Lu:
Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid. IEEE Trans. Inf. Forensics Secur. 11(5): 907-921 (2016) - [j7]Neetesh Saxena, Bong Jun Choi:
Authentication Scheme for Flexible Charging and Discharging of Mobile Vehicles in the V2G Networks. IEEE Trans. Inf. Forensics Secur. 11(7): 1438-1452 (2016) - [j6]Neetesh Saxena, Santiago Grijalva, Narendra S. Chaudhari:
Authentication Protocol for an IoT-Enabled LTE Network. ACM Trans. Internet Techn. 16(4): 25:1-25:20 (2016) - 2015
- [j5]Neetesh Saxena, Jaya Thomas, Narendra S. Chaudhari:
ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks. Wirel. Pers. Commun. 84(3): 1981-2012 (2015) - [c3]Neetesh Saxena, Bong Jun Choi, Shinyoung Cho:
Lightweight Privacy-Preserving Authentication Scheme for V2G Networks in the Smart Grid. TrustCom/BigDataSE/ISPA (1) 2015: 604-611 - 2014
- [j4]Neetesh Saxena, Narendra S. Chaudhari:
SecureSMS: A secure SMS protocol for VAS and other applications. J. Syst. Softw. 90: 138-150 (2014) - [j3]Neetesh Saxena, Narendra S. Chaudhari:
EasySMS: A Protocol for End-to-End Secure Transmission of SMS. IEEE Trans. Inf. Forensics Secur. 9(7): 1157-1168 (2014) - [j2]Neetesh Saxena, Narendra S. Chaudhari:
Secure-AKA: An Efficient AKA Protocol for UMTS Networks. Wirel. Pers. Commun. 78(2): 1345-1373 (2014) - 2013
- [j1]Neetesh Saxena, Narendra S. Chaudhari:
An enhanced NPA protocol for secure communications in GSM network. Int. J. Secur. Networks 8(1): 13-28 (2013) - [c2]Neetesh Saxena, Narendra S. Chaudhari:
An Efficient Batch Verification Protocol for Value Added Services. SMC 2013: 1560-1565 - 2012
- [c1]Neetesh Saxena, Narendra S. Chaudhari:
A secure approach for SMS in GSM network. CUBE 2012: 59-64
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-02 20:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint