SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations D Upadhyay, S Sampalli Computers & Security 89, 101666, 2020 | 207 | 2020 |
Gradient Boosting Feature Selection with Machine Learning Classifiers for Intrusion Detection on Power Grids D Upadhyay, J Manero, M Zaman, S Sampalli IEEE Transactions on Network and Service Management, 2020 | 95 | 2020 |
Intrusion detection in SCADA based power grids: Recursive feature elimination model with majority vote ensemble algorithm D Upadhyay, J Manero, M Zaman, S Sampalli IEEE Transactions on Network Science and Engineering 8 (3), 2559-2574, 2021 | 60 | 2021 |
An efficient key management and multi-layered security framework for SCADA systems D Upadhyay, M Zaman, R Joshi, S Sampalli IEEE Transactions on Network and Service Management 19 (1), 642-660, 2021 | 21 | 2021 |
Randomness analysis of A5/1 Stream Cipher for secure mobile communication D Upadhyay, P Sharma, S Valiveti International Journal Of Computer Science & Communication 3, 95-100, 2014 | 20 | 2014 |
Investigating the avalanche effect of various cryptographically secure Hash functions and Hash-based applications D Upadhyay, N Gaikwad, M Zaman, S Sampalli IEEE Access 10, 112472-112486, 2022 | 13 | 2022 |
Vulnerabilities’ assessment and mitigation strategies for the small linux server, Onion Omega2 D Upadhyay, S Sampalli, B Plourde Electronics 9 (6), 967, 2020 | 11 | 2020 |
Cryptanalysis of hardware based stream ciphers and implementation of GSM stream cipher to propose a novel approach for designing n-bit LFSR stream cipher D Upadhyay, T Shah, P Sharma 2015 19th International Symposium on VLSI Design and Test, 1-6, 2015 | 8 | 2015 |
A comparative analysis of different LFSR-based ciphers and parallel computing platforms for development of generic cipher compatible on both hardware and software platforms T Shah, D Upadhyay, P Sharma Proceedings of the International Conference on Recent Cognizance in Wireless …, 2016 | 6 | 2016 |
Design, Implementation, and Analysis of GSM Stream Cipher: Software Simulators vs Real Test Bed-FPGA D Upadhyay, A Shah, P Sharma 2014 International Conference on Computational Intelligence and …, 2014 | 5 | 2014 |
Design Analysis of an n-Bit LFSR-Based Generic Stream Cipher and Its Implementation Discussion on Hardware and Software Platforms T Shah, D Upadhyay Proceedings of the International Congress on Information and Communication …, 2016 | 4 | 2016 |
Hardware implementation of greatest common divisor using subtractor in Euclid algorithm D Upadhyay, H Patel International Journal of Computer Applications 65 (7), 2013 | 4 | 2013 |
Enhancement of GSM stream Cipher security using variable taps mechanism and nonlinear combination functions on Linear feedback shift registers D Upadhyay, P Sharma, S Sampalli Proceedings of First International Conference on Information and …, 2016 | 3 | 2016 |
Comparative analysis of tabular generative adversarial network (GAN) models for generation and validation of power grid synthetic datasets D Upadhyay, Q Luo, J Manero, M Zaman, S Sampalli IEEE EUROCON 2023-20th International Conference on Smart Technologies, 677-682, 2023 | 2 | 2023 |
Randomness evaluation of ZUC, SNOW and GRAIN stream ciphers D Upadhya, S Gandhi Proceedings of International Conference on Communication and Networks …, 2017 | 2 | 2017 |
Tracking cancer patients medical history using wireless emerging technology: near field communication S Bhagat, D Upadhyay, P Oza International Journal of VLSI Design & Communication Systems 6 (1), 1, 2015 | 2 | 2015 |
SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations Computers & Security, Volume 89, 2020 D Upadhyay, S Sampalli C, 0 | 2 | |
Intrusion detection in SCADA-based power grids: feature selection using gradient boosting scoring model with decision tree classifiers D Upadhyay, J Manero, M Zaman, S Sampalli Natural Sciences and Engineering Research Council (NSERC), Canada, 2020 | 1 | 2020 |
Modelling and performance analysis of various CMOS applications based on recent technologies H Sidhpura, N Dave, D Upadhyay 2015 International Conference on Computational Intelligence and …, 2015 | 1 | 2015 |
Validation of a Machine Learning-Based IDS Design Framework Using ORNL Datasets for Power System With SCADA M Zaman, D Upadhyay, CH Lung IEEE Access 11, 118414-118426, 2023 | | 2023 |