A master attack methodology for an AI-based automated attack planner for smart cities G Falco, A Viswanathan, C Caldera, H Shrobe IEEE Access 6, 48360-48373, 2018 | 135 | 2018 |
Cubesat security attack tree analysis G Falco, A Viswanathan, A Santangelo 2021 IEEE 8th International Conference on Space Mission Challenges for …, 2021 | 48 | 2021 |
Analyzing Resiliency of the Smart Grid Communication Architectures under Cyber Attack A AlMajali, A Viswanathan, C Neuman 5th Workshop on Cyber Security Experimentation and Test, 2012 | 48 | 2012 |
A semantic framework for data analysis in networked systems A Viswanathan, A Hussain, J Mirkovic, S Schwab, J Wroclawski Proc. of the USENIX Symposium on Networked Systems Design and Implementation, 2011 | 30 | 2011 |
Tracking Temporal Evolution of Network Activity for Botnet Detection K Sinha, A Viswanathan, J Bunn arXiv preprint arXiv:1908.03443, 12, 2019 | 25 | 2019 |
Virtualization with XEN A Viswanathan Trusted Computing CS599, University of Southern California, 21pp.(Spring 2007), 2007 | 23 | 2007 |
Deconstructing the assessment of anomaly-based intrusion detectors A Viswanathan, K Tan, C Neuman International Workshop on Recent Advances in Intrusion Detection, 286-306, 2013 | 21 | 2013 |
A survey of isolation techniques A Viswanathan, BC Neuman Unpublished Report, 2010 | 21 | 2010 |
A systems approach to analysing cyber-physical threats in the Smart Grid A AlMajali, E Rice, A Viswanathan, K Tan, C Neuman 2013 IEEE International Conference on Smart Grid Communications …, 2013 | 20 | 2013 |
An international technical standard for commercial space system cybersecurity-a call to action G Falco, W Henry, M Aliberti, B Bailey, M Bailly, S Bonnart, N Boschetti, ... ASCEND 2022, 4302, 2022 | 17 | 2022 |
Resilience Evaluation of Demand Response as Spinning Reserve under Cyber-Physical Threats A AlMajali, A Viswanathan, C Neuman Electronics 6 (1), 2, 2017 | 16 | 2017 |
Mission-Centric Cyber Security Assessment of Critical Systems JL Pecharich, A Viswanathan, S Stathatos, B Wright, K Tan AIAA SPACE 2016, 2016 | 15 | 2016 |
Model based methodology for translating high-level cyber threat descriptions into system-specific actionable defense tactics K Tan, JL Pecharich, AA Viswanathan, MI Pomerantz, DE Celik, ... US Patent 11,425,157, 2022 | 11 | 2022 |
Enhancing Cybersecurity Education through High-Fidelity Live Exercises (HiFLiX) J Sigholm, G Falco, A Viswanathan Proceedings of the 52nd Hawaii International Conference on System Sciences, 10, 2019 | 9 | 2019 |
A survey of isolation techniques, Draft Copy, University of Southern California A Viswanathan, BC Neuman Information Sciences Institute, CA, 2012 | 7 | 2012 |
Generating high-fidelity cybersecurity data with generative adversarial networks J Le, A Viswanathan, Y Zhang ASCEND 2020, 4117, 2020 | 6 | 2020 |
CubeSAT Cybersecurity Challenge Workshop G Falco, A Viswanathan, A Santangelo | 5 | 2020 |
Secure-by-component: A System-of-systems Design Paradigm for Securing Space Missions A Viswanathan, B Bailey, K Tan, G Falco | 4 | 2024 |
The new space race: cyber security for space missions J Pecharich, A Viswanathan Pasadena, CA: Jet Propulsion Laboratory, National Aeronautics and Space …, 2016 | 3 | 2016 |
The LinkStar Cybersecurity “Sandbox”, a platform to test small satellite vulnerabilities within the Community–Updates and Lessons Learned AD Santangelo, G Falco, A Viswanathan AIAA SCITECH 2022 Forum, 0239, 2022 | 2 | 2022 |