Feedback

Rajesh Kumar

Assistant Professor

Research Interests: Formal Verification, Cyber-Physical systems. Modelling complex infrastructures

Assistant Professor,
Department of Computer Science & Information Systems
Birla Institute of Technology & Science, K.K Birla Goa Campus
Goa, INDIA
(Please note a change in location and email address, rajesh.k@pilani.bits-pilani.ac.in do not work anymore)

Publications

Journals

  •   Rajesh Kumar, Rohan Kela, Siddhant Singh, Bhavesh Narra, AFMT: Maintaining the safety-security of industrial control systems, Volume 136April 2022, 103584, Computers in Industry, Elsevier (IF=11.245, Q1, Research paper, SCIE) 
  • Rajesh Kumar, Rohan Kela, Siddhant Singh, Rolando Trujillo Rasua, APT Attacks on Industrial Control Systems: A Tale of Three Incidents, Volume 37, July 2022, 100521, International Journal of Critical Infrastructure Protection, Elsevier (IF=3.683, Q1, Research paper, SCIE) 
  • Rajesh Kumar, Siddharth Sharma, Chirag Vachhani, Nitish Yadav, What changed in information security after COVID-19?, Computers & Security, Elsevier (IF=5.105, Q1, Research paper, SCIE), Volume 120, September 2022, 102821 

Book chapters 

  • Rajesh Kumar: "A model based safety and security risk framework for interconnected architectures", J. Staggs and S. Shenoi (Eds.), Springer, Cham, Critical Infrastructure Protection XIV, 2020, (Revised Selected Papers: Fourteenth Annual IFIP WG 11.10 International Conference, Hardcover ISBN 978-3-030-62839-0,10.1007/978-3-030-62840-6
  • Rajesh Kumar, Rohan Kela, Siddhant Singh, Analyzing advanced persistent threats using game theory: A critical literature review based on risk management perspective,J. Staggs and S. Shenoi (Eds.), Springer, Cham, Critical Infrastructure Protection XV, 2021, (Revised Selected Papers: Fifteenth Annual IFIP WG 11.10 International Conference, Print ISBN 978-3-030-93510-8, DOI https://doi.org/10.1007/978-3-030-93511-5_3

International conferences.

  • Rajesh Kumar, Ishan Rai, Krish Vora, Mithil Shah," Realistic attacks with realistic attackers: An information-security risk analysis of an automatic metering infrastructure", 49th Annual Conference of the IEEE Industrial Electronics Society (IECON 2023), 16-19th October 2023, Singapore, IEEE
  • Rajesh Kumar, "Quantitative Safety-Security Risk Analysis of Interconnected Cyber-Infrastructures"  10th IEEE Humanitarian Conference, Hyderabad, India  pp. 100-106, doi: 10.1109/R10-HTC54060.2022.9929906.
  • Rajesh Kumar, Rohan Kela, Siddhant Singh and Bhavesh Narra, "Co-engineering safety-security using statistical model checking", 42nd International Conference on Formal Techniques for Distributed Objects, Components, and Systems,  June 13-17, 2022, Lucca, Italy (CORE Rank A), https://doi.org/10.1007/978-3-031-08679-3_6
  • Rajesh Kumar, Aditya Budi, "APT: a Buzzword and a Reality - A Bibilometric Review of Literature (2010-2020)", 7th International Conference on dependability in sensors, cloud and big data systems and applications (DependSys 2021), 22 - 24 December 2022,doi: 10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00295
  • Rajesh Kumar, "An attack tree template based on feature diagram hierarchy",  62020 IEEE 6th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application (DependSys), 2020, pp. 92-97, doi: 10.1109/DependSys51298.2020.00022.
  • Rajesh Kumar, Siddhant Singh, Rohan Kela, "A quantitative risk analysis framework for advanced persistent threats", 13th International Symposium on Foundations & Practice of Security, Montreal, Canada, 1-2-3 December 2020, ISBN 978-3-030-70880-1, Lecture Notes in Computer Science, vol 12637. Springer, Cham. https://doi.org/10.1007/978-3-030-70881-8_3
  • Rajesh Kumar, Arend Rensink and Mariëlle Stoelinga. "LOCKS: a property specification language for security goals," 33rd Symposium on Applied Computing SAC 2018, Pau, France, April 9–13, 2018, doi: 10.1145/3167132.3167336, ISBN: 978-1-4503-5191-1, Pages 1907-1915
  • Rajesh Kumar, Mariëlle Stoelinga. "Quantitative Security and Safety Analysis with Attack-Fault Trees ," 18th IEEE International Symposium on High Assurance Systems Engineering, HASE 2017, Singapore, January 12-14, 2017, DOI: 10.1109/HASE.2017.12, Print ISSN: 1530-2059
  • Rajesh Kumar and Enno Ruijters and Mariëlle Stoelinga. " Quantitative Attack Tree Analysis via Priced Timed Automata", Formal Modeling and Analysis of Timed Systems - 13th International Conference, FORMATS 2015, Madrid, Spain, September 2-4, 2015, DOI: 10.1007/978-3-319-22975-1_11, ISBN 978-3-319-22974-4
  • Marlon Fraile, Margaret Ford, Olga Gadyatskaya, Rajesh Kumar, Mariëlle Stoelinga, Rolando Trujillo-Rasua. "Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study",The Practice of Enterprise Modeling - 9th IFIP WG 8.1. Working Conference, PoEM 2016, Skovde, Sweden, November 8-10, 2016, DOI https://doi.org/10.1007/978-3-319-48393-1_24, Print ISBN 978-3-319-48392-4
  • Florian Arnold, Dennis Guck, Rajesh Kumar, Mariëlle Stoelinga. "Sequential and Parallel Attack Tree Modelling", Computer Safety, Reliability, and Security - SAFECOMP 2015 Workshops, ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, DOI: 10.1007/978-3-319-24249-1_25
  • Rajesh Kumar, Dennis Guck, Mariëlle Stoelinga."Time Dependent Analysis with Dynamic Counter Measure Trees", 13th Workshop on Quantitative Aspects of Programming Languages,  abs/1510.00050, arXiv
  • Rajesh Kumar , Stefano Schivo , Enno Ruijters , Bugra Mehmet Yildiz, David Huistra , Jacco Brandt, Arend Rensink and Marielle Stoelinga, "Efficient Analysis of Attack Trees: a Model-Driven Approach”, 21st International Conference on Fundamental Approaches to Software Engineering FASE 2018, ETAPS 2018: 14-20 April 2018, Thessaloniki, Greece, DOI: 10.1007/978-3-319-89363-1_4.
  • Stefano Schivo, Bugra M. Yildiz, Enno Ruijters, Christopher Gerking, Rajesh Kumar, Stefan Dziwok, Arend Rensink, Mariëlle Stoelinga. "How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach, " Dependable Software Engineering. Theories, Tools, and Applications - Third International Symposium, SETTA 2017, Changsha, China, October 23-25, 201, DOI: 10.1007/978-3-319-69483-2_19.

 PhD Thesis.

 Truth or Dare: Quantitative security risk analysis via attack trees, R.Kumar, DOI: 10.3990/1.9789036546256