Follow
Sibin Mohan
Title
Cited by
Cited by
Year
Securing vehicle-to-everything (V2X) communication platforms
M Hasan, S Mohan, T Shimizu, H Lu
IEEE Transactions on Intelligent Vehicles 5 (4), 693-713, 2020
2472020
Time-based intrusion detection in cyber-physical systems
C Zimmer, B Bhat, F Mueller, S Mohan
Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical …, 2010
1662010
S3A: Secure system simplex architecture for enhanced security and robustness of cyber-physical systems
S Mohan, S Bak, E Betti, H Yun, L Sha, M Caccamo
Proceedings of the 2nd ACM international conference on High confidence …, 2013
153*2013
A unified digital twin framework for real-time monitoring and evaluation of smart manufacturing systems
Y Qamsane, CY Chen, EC Balta, BC Kao, S Mohan, J Moyne, D Tilbury, ...
2019 IEEE 15th international conference on automation science and …, 2019
1312019
SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems
MK Yoon, S Mohan, J Choi, JE Kim, L Sha
2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium …, 2013
1292013
End-to-end network delay guarantees for real-time systems using SDN
R Kumar, M Hasan, S Padhy, K Evchenko, L Piramanayagam, S Mohan, ...
2017 IEEE Real-Time Systems Symposium (RTSS), 231-242, 2017
1002017
Towards automated safety vetting of plc code in real-world plants
M Zhang, CY Chen, BC Kao, Y Qamsane, Y Shao, Y Lin, E Shi, S Mohan, ...
2019 IEEE Symposium on Security and Privacy (SP), 522-538, 2019
832019
A framework for the safe interoperability of medical devices in the presence of network failures
C Kim, M Sun, S Mohan, H Yun, L Sha, TF Abdelzaher
Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical …, 2010
832010
Taskshuffler: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems
MK Yoon, S Mohan, CY Chen, L Sha
2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS …, 2016
822016
Guaranteed physical security with restart-based design for cyber-physical systems
F Abdi, CY Chen, M Hasan, S Liu, S Mohan, M Caccamo
2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS …, 2018
772018
Addressing safety and security contradictions in cyber-physical systems
M Sun, S Mohan, L Sha, C Gunter
Proceedings of the 1st Workshop on Future Directions in Cyber-Physical …, 2009
772009
Real-time systems security through scheduler constraints
S Mohan, MK Yoon, R Pellizzoni, R Bobba
2014 26th Euromicro Conference on Real-Time Systems, 129-140, 2014
762014
A Novel Side-Channel in Real-Time Schedulers
CY Chen, S Mohan, R Pellizzoni, RB Bobba, N Kiyavash
2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS …, 2019
72*2019
Memory heat map: anomaly detection in real-time embedded systems using memory behavior
MK Yoon, S Mohan, J Choi, L Sha
Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015
712015
Push-assisted migration of real-time tasks in multi-core processors
A Sarkar, F Mueller, H Ramaprasad, S Mohan
ACM Sigplan Notices 44 (7), 80-89, 2009
712009
A linux in unikernel clothing
HC Kuo, D Williams, R Koller, S Mohan
Proceedings of the Fifteenth European Conference on Computer Systems, 1-15, 2020
682020
Learning execution contexts from system call distribution for anomaly detection in smart embedded system
MK Yoon, S Mohan, J Choi, M Christodorescu, L Sha
Proceedings of the Second International Conference on Internet-of-Things …, 2017
682017
A generalized model for preventing information leakage in hard real-time systems
R Pellizzoni, N Paryab, MK Yoon, S Bak, S Mohan, RB Bobba
21st IEEE Real-Time and Embedded Technology and Applications Symposium, 271-282, 2015
642015
Securing real-time internet-of-things
CY Chen, M Hasan, S Mohan
Sensors 18 (12), 4356, 2018
582018
Preserving physical safety under cyber attacks
F Abdi, CY Chen, M Hasan, S Liu, S Mohan, M Caccamo
IEEE Internet of Things Journal 6 (4), 6285-6300, 2018
502018
The system can't perform the operation now. Try again later.
Articles 1–20