BITS Pilani

  • Page last updated on Monday, September 20, 2021



Research output.

Book chapters     

  1. Rajesh Kumar: "Secsafe: A model based safety and security risk framework for interconnected architectures", J. Staggs and S. Shenoi (Eds.), Springer, Cham, Critical Infrastructure Protection XIV, 2020, (Revised Selected Papers: Fourteenth Annual IFIP WG 11.10 International Conference, Hardcover ISBN 978-3-030-62839-0,10.1007/978-3-030-62840-6
  2. Rajesh Kumar, Rohan Kela, Siddhant Singh, Analyzing advanced persistent threats using game theory: A critical literature review based on risk management perspective,J. Staggs and S. Shenoi (Eds.), Springer, Cham, Critical Infrastructure Protection XV, 2021, (Revised Selected Papers: Fifteenth Annual IFIP WG 11.10 International Conference (Accepted)
International conferences.
  1. Rajesh Kumar, "An attack tree template based on feature diagram hierarchy",  6th International Conference on dependability in sensors, cloud and bigdata systems and applications (DependSys 2020), 14 - 16 December 2020, Fiji (To appear)
  2. Rajesh Kumar, Siddhant Singh, Rohan Kela, "A quantitative risk analysis framework for advanced persistent threats", 13th International Symposium on Foundations & Practice of Security, Montreal, Canada, 1-2-3 December 2020 (To appear)
  3. Rajesh Kumar, Arend Rensink and Mariëlle Stoelinga. "LOCKS: a property specification language for security goals," 33rd Symposium on Applied Computing SAC 2018, Pau, France, April 9–13, 2018, doi: 10.1145/3167132.3167336, ISBN: 978-1-4503-5191-1, Pages 1907-1915
  4. Rajesh Kumar, Mariëlle Stoelinga. "Quantitative Security and Safety Analysis with Attack-Fault Trees ," 18th IEEE International Symposium on High Assurance Systems Engineering, HASE 2017, Singapore, January 12-14, 2017, DOI: 10.1109/HASE.2017.12, Print ISSN: 1530-2059
  5. Rajesh Kumar and Enno Ruijters and Mariëlle Stoelinga. " Quantitative Attack Tree Analysis via Priced Timed Automata", Formal Modeling and Analysis of Timed Systems - 13th International Conference, FORMATS 2015, Madrid, Spain, September 2-4, 2015, DOI: 10.1007/978-3-319-22975-1_11, ISBN 978-3-319-22974-4
  6. Marlon Fraile, Margaret Ford, Olga Gadyatskaya, Rajesh Kumar, Mariëlle Stoelinga, Rolando Trujillo-Rasua. "Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study",The Practice of Enterprise Modeling - 9th IFIP WG 8.1. Working Conference, PoEM 2016, Skovde, Sweden, November 8-10, 2016, DOI, Print ISBN 978-3-319-48392-4
  7. Florian Arnold, Dennis Guck, Rajesh Kumar, Mariëlle Stoelinga. "Sequential and Parallel Attack Tree Modelling", Computer Safety, Reliability, and Security - SAFECOMP 2015 Workshops, ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, DOI: 10.1007/978-3-319-24249-1_25
  8. Rajesh Kumar, Dennis Guck, Mariëlle Stoelinga."Time Dependent Analysis with Dynamic Counter Measure Trees",abs/1510.00050,arXiv
  9. Rajesh Kumar , Stefano Schivo , Enno Ruijters , Bugra Mehmet Yildiz, David Huistra , Jacco Brandt, Arend Rensink and Marielle Stoelinga, "Efficient Analysis of Attack Trees: a Model-Driven Approach”, 21st International Conference on Fundamental Approaches to Software Engineering FASE 2018, ETAPS 2018: 14-20 April 2018, Thessaloniki, Greece, DOI: 10.1007/978-3-319-89363-1_4.
  10. Stefano Schivo, Bugra M. Yildiz, Enno Ruijters, Christopher Gerking, Rajesh Kumar, Stefan Dziwok, Arend Rensink, Mariëlle Stoelinga. "How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach, " Dependable Software Engineering. Theories, Tools, and Applications - Third International Symposium, SETTA 2017, Changsha, China, October 23-25, 201, DOI: 10.1007/978-3-319-69483-2_19.
 PhD Thesis.

 Truth or Dare: Quantitative security risk analysis via attack trees, R.Kumar, DOI: 10.3990/1.9789036546256

Papers at different stages. 
 (Pls make a correspondence to know more on each of the paper.)


  1.  APT: a buzzword or reality - A review and trend analysis  (2010-2020)
  2.  AFMT: Maintaining the safety-security of industrial control systems.
  3.  Risk management approaches against advanced persistent threats in industrial systems
  4.  APT: A tale of three incidents
  5.   PAST: A tool for safety-security analysis 


Quick Links

    An Institution Deemed to be University estd. vide Sec.3 of the UGC Act,1956 under notification # F.12-23/63.U-2 of Jun 18,1964

    © 2021 Centre for Software Development,SDET Unit, BITS-Pilani, India.

    Designed and developed by fractal | ink design studios