Sandeep Shukla
#60,080
Most Influential Person Now
Computer scientist
Sandeep Shukla's AcademicInfluence.com Rankings
Sandeep Shuklacomputer-science Degrees
Computer Science
#3371
World Rank
#3537
Historical Rank
Database
#7703
World Rank
#8005
Historical Rank

Download Badge
Computer Science
Sandeep Shukla's Degrees
- PhD Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Sandeep Shukla Influential?
(Suggest an Edit or Addition)According to Wikipedia, Sandeep Kumar Shukla is currently Poonam and Prabhu Goel Chair Professor and previous head of Computer Science and Engineering Department, Indian Institute of Technology, Kanpur, India. He is currently the Editor-in-Chief of ACM Transactions on Embedded Systems, and associate editor for ACM transactions on Cyber Physical Systems. He is currently the joint director of C3i centre at IIT Kanpur along with Manindra Agrawal.
Sandeep Shukla's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- GECO: Global Event-Driven Co-Simulation Framework for Interconnected Power System and Communication Network (2012) (224)
- Power system and communication network co-simulation for smart grid applications (2011) (186)
- Online strategies for dynamic power management in systems with multiple power-saving states (2003) (185)
- Competitive analysis of dynamic power management strategies for systems with multiple power saving states (2002) (124)
- Observations on self-stabilizing graph algorithms for anonymous networks (1995) (100)
- Using probabilistic model checking for dynamic power management (2005) (88)
- Towards a heterogeneous simulation kernel for system-level models: a SystemC kernel for synchronous data flow models (2004) (86)
- Evaluating the reliability of NAND multiplexing with PRISM (2005) (83)
- Interfacing Power System and ICT Simulators: Challenges, State-of-the-Art, and Case Studies (2018) (82)
- NANOPRISM: a tool for evaluating granularity vs. reliability trade-offs in nano architectures (2004) (76)
- SystemC Kernel extensions for heterogeneous system modeling - a framework for multi-MoC modeling and simulation (2004) (71)
- Algorithms for power savings (2003) (68)
- A Survey of Automatic Protocol Reverse Engineering Tools (2015) (67)
- A model checking approach to evaluating system level dynamic power management policies for embedded systems (2001) (65)
- An overview of the competitive and adversarial approaches to designing dynamic power management strategies (2005) (64)
- Nanolab: a tool for evaluating reliability of defect-tolerant nano architectures (2004) (63)
- A cross-layer approach for power-performance optimization in distributed mobile systems (2005) (59)
- SCGPSim: A fast SystemC simulator on GPUs (2010) (58)
- Communication network modeling and simulation for Wide Area Measurement applications (2012) (58)
- Machine learning in cybersecurity: A review (2019) (52)
- Evaluating the reliability of defect-tolerant architectures for nanotechnology with probabilistic model checking (2004) (50)
- Metamodeling: An Emerging Representation Paradigm for System-Level Design (2009) (48)
- Cyber security impacts on all-PMU state estimator - a case study on co-simulation platform GECO (2012) (47)
- Nano, quantum and molecular computing: implications to high level design and validation (2004) (47)
- Introspection in system-level language frameworks: meta-level vs. integrated (2003) (44)
- An environment for dynamic component composition for efficient co-design (2002) (44)
- Polychrony for formal refinement-checking in a system-level design methodology (2003) (44)
- SystemCXML: An Exstensible SystemC Front end Using XML (2005) (44)
- Reliability Analysis of Large Circuits Using Scalable Techniques and Tools (2007) (39)
- A New Heuristic for Bad Cycle Detection Using BDDs (1997) (38)
- Nano, Quantum and Molecular Computing (2004) (38)
- Formal analysis and validation of continuous-time Markov chain based system level power management strategies (2002) (37)
- SystemC Kernel Extensions for Hetero-geneous System Modeling (2004) (36)
- Malware Classification Using Image Representation (2019) (34)
- Modeling and validating globally asynchronous design in synchronous frameworks (2004) (34)
- On the Complexity of Relational Problems for Finite State Processes (Extended Abstract) (1996) (34)
- Model-driven test generation for system level validation (2007) (33)
- Comparing Reliability-Redundancy Tradeoffs for Two von Neumann Multiplexing Architectures (2007) (32)
- Agent Based Supervision of Zone 3 Relays to Prevent Hidden Failure Based Tripping (2010) (29)
- Model-Driven Validation of SystemC Designs (2007) (29)
- A study of communication and power system infrastructure interdependence on PMU-based wide area monitoring and protection (2012) (28)
- Developing self - stabilizing coloring algorithms via systematic randomization (1994) (28)
- XFM: An incremental methodology for developing formal models (2005) (28)
- BALBOA: a component-based design environment for system models (2003) (28)
- Dataflow Architectures for GALS (2008) (27)
- Power estimation methodology for a high-level synthesis framework (2009) (27)
- Automated concurrency re-assignment in high level system models for efficient system-level simulation (2002) (26)
- Comprehensive review on Maximum Power Point Tracking techniques: Wind Energy (2015) (26)
- Validating families of latency insensitive protocols (2005) (25)
- Formal Methods and Models for System Design (2004) (25)
- Constructive polychronous systems (2013) (24)
- An alternative polychronous model and synthesis methodology for model-driven embedded software (2010) (24)
- High Level Power Estimation Models for FPGAs (2011) (24)
- A detailed analysis of the effective-load-carrying-capacity behavior of plug-in electric vehicles in the power grid (2012) (23)
- A rule-based model of computation for SystemC: integrating SystemC and Bluespec for co-design (2006) (23)
- A Functional Programming Framework of Heterogeneous Model of Computation for System Design (2004) (22)
- Scalable techniques and tools for reliability analysis of large circuits (2007) (22)
- Formal methods for Dynamic Power Management (2003) (22)
- Fundamental Problems in Computing, Essays in Honor of Professor Daniel J. Rosenkrantz (2009) (22)
- Generating Multi-Threaded code from Polychronous Specifications (2009) (21)
- Using Aspect-GAMMA in the design of embedded systems (2002) (21)
- Stochastic learning feedback hybrid automata for dynamic power management in embedded systems (2003) (21)
- A hierarchically distributed non-intrusive agent aided distance relaying protection scheme to supervise Zone 3 (2013) (20)
- Integrating system descriptions by clocked guarded actions (2011) (20)
- FORGE: a framework for optimization of distributed embedded systems software (2003) (20)
- Detecting malicious accounts in permissionless blockchains using temporal graph properties (2020) (19)
- Malware Classification using Early Stage Behavioral Analysis (2019) (19)
- Verifying Compiler Based Refinement of BluespecTM (2008) (18)
- Heterogeneous Behavioral Hierarchy Extensions for SystemC (2007) (18)
- Synthesis of Embedded Software - Frameworks and Methodologies for Correctness by Construction (2014) (18)
- Typing abstractions and management in a component framework (2003) (17)
- Vulnerabilities and Countermeasures - A Survey on the Cyber Security Issues in the Transmission Subsystem of a Smart Grid (2012) (17)
- Representation of synchronous, asynchronous, and polychronous components by clocked guarded actions (2014) (17)
- Efficient Usage of Concurrency Models in an Object-Oriented Co-design Framework (2001) (17)
- HORNSAT, Model Checking, Verification and games (Extended Abstract) (1996) (17)
- On the Deterministic Multi-threaded Software Synthesis from Polychronous Specifications (2008) (17)
- Design with race-free hardware semantics (2006) (17)
- Reliability evaluation of von Neumann multiplexing based defect-tolerant majority circuits (2004) (16)
- Design Fault Directed Test Generation for Microprocessor Validation (2007) (16)
- SMT based false causal loop detection during code synthesis from Polychronous specifications (2011) (16)
- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning (2020) (16)
- Hardware Coprocessor Synthesis from an ANSI C Specification (2009) (16)
- Translating concurrent action oriented specifications to synchronous guarded actions (2010) (15)
- VSCADA: A reconfigurable virtual SCADA test-bed for simulating power utility control center operations (2015) (15)
- The polynomial time decidability of simulation relations for finite processes: A HORNSAT based approach (1996) (15)
- Evaluating reliability of defect tolerant architecture for nanotechnology using probabilistic model (2004) (15)
- MCF: A Metamodeling-Based Component Composition Framework—Composing SystemC IPs for Executable System Models (2008) (15)
- Formal methods and models for system design: a system level perspective (2004) (15)
- CARH: service-oriented architecture for validating system-level designs (2006) (15)
- Sequence to sequence deep learning models for solar irradiation forecasting (2019) (15)
- A Methodology for Power Aware High-Level Synthesis of Co-processors from Software Algorithms (2010) (14)
- Editorial: Distributed Public Ledgers and Block Chains - What Good Are They for Embedded Systems? (2016) (14)
- EmCodeSyn: A visual framework for multi-rate data flow specifications and code synthesis for embedded applications (2009) (14)
- Aspects + GAMMA = AspectGAMMA A Formal Framework for Aspect-Oriented Specification (2002) (14)
- Co-simulating power systems and communication network for accurate modeling and simulation of PMU based wide area measurement systems using a global event scheduling technique (2013) (14)
- The challenge of interoperability: Model-based integration for automotive control software (2015) (13)
- Construction of a microgrid communication network (2014) (13)
- A Compositional Behavioral Modeling Framework for Embedded System Design and Conformance Checking (2005) (13)
- MCBCG: Model Checking Based Sequential Clock-Gating (2009) (13)
- Embedding Polychrony into Synchrony (2013) (13)
- EWD: A metamodeling driven customizable multi-MoC system modeling framework (2007) (13)
- Heterogeneous Behavioral Hierarchy for System Level Designs (2006) (12)
- MRICDF: A Polychronous Model for Embedded Software Synthesis (2010) (12)
- SCoPE: Statistical Regression Based Power Models for Co-Processors Power Estimation (2009) (12)
- Improving SystemC simulation through Petri net reductions (2005) (11)
- SoC Design Space Exploration through Automated IP Selection from SystemC IP Library (2006) (11)
- Multijunction Fault-Tolerance Architecture for Nanoscale Crossbar Memories (2008) (11)
- Implementation of solar based PWM fed two phase interleaved boost converter (2015) (11)
- The Multi-Domain Frame Packing Problem for CAN-FD (2017) (11)
- Distributed Simulation of AADL Specifications in a Polychronous Model of Computation (2009) (11)
- Preserving Patient’s Privacy using Proxy Re-encryption in Permissioned Blockchain (2019) (11)
- Low Power Design with High-Level Power Estimation and Power-Aware Synthesis (2011) (11)
- SML-Sys: a functional framework with multiple models of computation for modeling heterogeneous system (2008) (11)
- Extreme formal modeling (XFM) for hardware models (2004) (11)
- Model-Driven Engineering and Safety-Critical Embedded Software (2009) (11)
- Assertion-Based Modal Power Estimation (2007) (11)
- Efficient simulation of synthesis-oriented system level designs (2002) (10)
- Partitioned security processor architecture on FPGA platform (2018) (10)
- The Model Checking View to Clock Gating and Operand Isolation (2010) (10)
- Algorithms for low power hardware synthesis from Concurrent Action Oriented Specifications (CAOS) (2007) (10)
- Synthesizing embedded software with safety wrappers through polyhedral analysis in a polychronous framework (2012) (10)
- Guest Editors' Introduction: The True State of the Art of ESL Design (2006) (10)
- Low-power hardware synthesis from TRS-based specifications (2006) (10)
- AD-HOC vs. SUPERVISORY WIDE AREA BACKUP RELAY PROTECTION VALIDATED ON POWER/NETWORK CO-SIMULATION PLATFORM (2011) (10)
- Accelerating SystemC simulations using GPUs (2012) (10)
- THD Analysis of Eleven Level Cascaded H-Bridge Multilevel Inverter with Different Types of Load Using in Drives Applications (2015) (10)
- Faster Software Synthesis Using Actor Elimination Techniques for Polychronous Formalism (2010) (10)
- The State of Android Security (2020) (9)
- A behavioural type inference system for compositional system-on-chip design (2004) (9)
- Flexible VLSI architectures for Galois field multipliers (2017) (9)
- Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology (2021) (9)
- Evading API Call Sequence Based Malware Classifiers (2019) (9)
- Multi-Junction Fault Tolerance Architecture for Nanoscale Crossbar Memories (2006) (9)
- Entangled Blockchains in Land Registry Management (2019) (9)
- Fault‐ and Defect‐Tolerant Architectures for Nanocomputing (2009) (9)
- Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures (2016) (9)
- Guest Editors' Introduction: Challenges for Reliable Design at the Nanoscale (2005) (9)
- A New Multi-threaded Code Synthesis Methodology and Tool for Correct-by-Construction Synthesis from Polychronous Specifications (2013) (9)
- Tools and techniques for evaluating reliability of defect-tolerant nano architectures (2004) (9)
- A Distributed Real-Time Event Correlation Architecture for SCADA Security (2013) (8)
- Smart Grid Communications and Networking: Networking technologies for wide-area measurement applications (2012) (8)
- Minimizing back pressure for latency insensitive system synthesis (2010) (8)
- Metamodeling: What is it good for? (2009) (8)
- A Framework for Analyzing Load-Carrying-Capacity of Plug-In Electric Vehicles and Impact on Solar Generators (2011) (8)
- Ingredients for Successful System Level Design Methodology (2008) (8)
- Algorithms for Low Power Hardware Synthesis from CAOS-- Concurrent Action Oriented Specifications (2006) (8)
- Tackling an Abstraction Gap: Co-simulating SystemC DE with Bluespec ESL (2007) (8)
- Vulnerability Assessment and Mitigation for Industrial Critical Infrastructures with Cyber Physical Test Bed (2019) (8)
- UMoC++ : Modeling Environment for Heterogeneous Systems based on Generic MoCs (2005) (8)
- Interoperability as a design issue in C++ based modeling environments (2001) (8)
- Behavioral type inference for compositional system design (2004) (8)
- Structured Component Composition Frameworks for Embedded System Design (2002) (8)
- MCF: A Metamodeling-based Visual Component Composition Framework (2006) (8)
- Uniform approaches to the verification of finite state systems (1997) (8)
- Tools and techniques for evaluating reliability trade-offs for NANO-architectures (2004) (7)
- Mapping functional behavior onto architectural model in a model driven embedded system design (2015) (7)
- Applying Verification Collaterals for Accurate Power Estimation (2008) (7)
- High level modeling and validation methodologies for embedded systems: bridging the productivity gap (2003) (7)
- Offset Assignment to Signals for Improving Frame Packing in CAN-FD (2017) (7)
- Automated Classification of Web-Application Attacks for Intrusion Detection (2019) (7)
- Presentation and Formal Verification of a Family of Protocols for Latency Insensitive Design (2005) (7)
- Automated Extraction of Structural Information from SystemC-based IP for Validation (2005) (7)
- On Model-Based Software Development (2013) (7)
- Metamodeling-Driven IP Reuse for SoC Integration and Microprocessor Design (2009) (7)
- An Analysis of the Composition of Synchronous Systems (2009) (7)
- UMoC++: A C++-Based Multi-MoC Modeling Environment (2006) (7)
- Implementing Multi-MoC Extensions for SystemC : Adding CSP & FSM Kernels for Heterogeneous Modeling (2004) (7)
- A simulation and validation tool for self-stabilizing protocols (1996) (7)
- Nano, quantum, and molecular computing: are we ready for the validation and test challenges? (2003) (7)
- Mining metadata for composability of IPs from SystemC IP library (2008) (7)
- Model Based Test Generation for Microprocessor Architecture Validation (2007) (6)
- Optimizing system models for simulation efficiency (2004) (6)
- Guest Editors' Introduction: GALS Design and Validation (2007) (6)
- Design For Synthesis , Transform for Simulation : Automatic Transformation of Threading Structures in High-Level System Models (2001) (6)
- Modeling and Control of Standalone PMSG WECS for Grid Compatibility at Varying Wind Speeds (2014) (6)
- Accurate power estimation of hardware co-processors using system level simulation (2009) (6)
- EWD : A Metamodeling Driven Customizable Multi-MoC System Modeling Environment (2004) (6)
- Improved False Causal Loop Detection in Polychronous Specificationof Embedded Software (2011) (6)
- Analysis of Scheduled Latency Insensitive Systems with Periodic Clock Calculus (2009) (5)
- Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems (2021) (5)
- A Functional Programming Framework for Latency Insensitive Protocol Validation (2005) (5)
- Reliability analysis of fault-tolerant reconfigurable nano-architectures (2004) (5)
- XFM: extreme formal method for capturing formal specification into abstract models (2004) (5)
- Panel: Assertion-Based Verification -What's the Big Deal? (2006) (5)
- Hardware optimizations for crypto implementations (Invited paper) (2016) (5)
- Towards Behavioural Hierarchy Extensions for SystemC (2005) (5)
- Simplification of C-RTL equivalent checking for fused multiply add unit using intermediate models (2013) (5)
- Special issue on formal methods for globally asynchronous and locally synchronous (GALS) systems (2006) (5)
- Coprocessor design space exploration using high level synthesis (2010) (5)
- Modular design through component abstraction (2004) (5)
- Optimizing grid contribution and economic returns from solar generators by managing the output uncertainty risk (2011) (5)
- Model Checking Bluespec Specified Hardware Designs (2007) (5)
- Hierarchical and Incremental Verification for System Level Design: Challenges and Accomplishments (2003) (5)
- Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains (2021) (5)
- An Insecurity Study of Ethereum Smart Contracts (2020) (5)
- System Level Design Methodology for System On Chips using Multi-Threaded Graphs (2005) (5)
- MMV: A Metamodeling Based Microprocessor Validation Environment (2008) (5)
- Techniques for Power-Aware Hardware Synthesis from Concurrent Action Oriented Specifications (2007) (5)
- Formal Verification of Hierarchically Distributed Agent Based Protection Scheme in Smart Grid (2012) (5)
- On the Difficulties of Concurrent-System Design, Illustrated with a 2×2 Switch Case Study (2009) (5)
- Modelling Environment for Heterogeneous Systems based on MoCs (2005) (5)
- Concurrency in System Level Design: Conflict Between Simulation and Synthesis Goals (2002) (5)
- Detecting Word Based DGA Domains Using Ensemble Models (2020) (5)
- Statistical Regression Based Power Models (2012) (5)
- On Cosimulating Multiple Abstraction-Level System-Level Models (2008) (4)
- Panel: given that hardware verification has been an uphill battle, what is the future of software verification? (2004) (4)
- Reliability Driven Probabilistic Design Paradigm for Transient Error Tolerant Architectures on Nanofabrics (2004) (4)
- On the Polychronous Approach to Embedded Software Design (2007) (4)
- STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Environments (2020) (4)
- A Probabilistic Analysis For Fault Detectability of Code Coverage Metrics (2006) (4)
- Efficient Hardware-Software Codesigns of AES Encryptor and RS-BCH Encoder (2018) (4)
- A Trace-Based Framework for Verifiable GALS Composition of IPs (2008) (4)
- Effects of property ordering in an incremental formal modeling methodology (2004) (4)
- Editorial: Big Data, Internet of Things, Cybersecurity - A New Trinity of Embedded Systems Research (2015) (4)
- Vulnerability and Transaction behavior based detection of Malicious Smart Contracts (2021) (4)
- Polychronous Methodology For System Design: A True Concurrency Approach (2006) (4)
- Formal transformation of a KPN specification to a GALS implementation (2008) (4)
- Using Aspect-GAMMA in Design and Verification of Embedded Systems ( Extended Abstract ) (2002) (4)
- Approaches for Assigning Offsets to Signals for Improving Frame Packing in CAN-FD (2020) (4)
- Stochastic learning feedback hybrid automata for power management in embedded systems (2003) (4)
- Editorial: To Use or Not To? Embedded Systems for Voting (2018) (4)
- Unification and Matching in Process Algebras (1998) (4)
- Towards refinement types for time-dependent data-flow networks (2015) (4)
- System level simulation guided approach to improve the efficacy of clock-gating (2010) (4)
- Formal verification - prove it or pitch it (2003) (4)
- Reliability analysis for defect-tolerant nano-architectures in the presence of interconnect noise (2004) (3)
- Low Power Hardware Synthesis from Concurrent Action-Oriented Specifications (2010) (3)
- Optimization of back pressure and throughput for latency insensitive systems (2010) (3)
- Automated clock inference for stream function-based system level specifications (2005) (3)
- New Techniques for Sequential Software Synthesis from a Polychronous Data Flow Formalism (2011) (3)
- Towards Malicious address identification in Bitcoin (2021) (3)
- DeepDetect: A Practical On-device Android Malware Detector (2021) (3)
- A hybrid framework for design and analysis of fault-tolerant architectures (2006) (3)
- LDAP Directory Services ? Just Another Database Application (2000) (3)
- ServiceFORGE : A Software Architecture for Power and Quality Aware Services (2003) (3)
- A Review: Malware Analysis Work at IIT Kanpur (2020) (3)
- Distributed VSCADA: An integrated heterogeneous framework for power system utility security modeling and simulation (2015) (3)
- Representation of synchronous, asynchronous, and polychronous components by clocked guarded actions (2012) (3)
- Deep vs. Shallow, Kernel vs. Language--What is Better for Heterogeneous Modeling in SystemC? (2006) (3)
- System imbalance minimizing renewable generation portfolio selection in the presence of plug-in electric vehicles (2012) (3)
- APECS: An AADL and polychrony based embedded computing system design environment with an elevator control case study (2013) (3)
- Parallelizing High-Level Synthesis: A Code Transformational Approach to High-Level Synthesis (2006) (3)
- Computing optimal solar penetration in the presence of plug-in electric vehicles (2012) (3)
- A hierarchical networked micro-simulator to study grid-integration of renewables and electric vehicles (2013) (3)
- MMV: Metamodeling Based Microprocessor Valiation Environment (2006) (3)
- Editorial: Cyber Security, IoT, Block Chains - Risks and Opportunities (2017) (3)
- Complexity of Scheduling in Synthesizing Hardware from Concurrent Action Oriented Specifications (2007) (3)
- Editorial: Science of the Big and Small and Embedded Computing Systems (2016) (3)
- DMAPT: Study of Data Mining and Machine Learning Techniques in Advanced Persistent Threat Attribution and Detection (2021) (3)
- LFSR based versatile divider architectures for BCH and RS error correction encoders (2019) (3)
- Model Checking Using Automata Theory (2000) (2)
- A behavioral type inference system for compositional system-on-chip design (2010) (2)
- Guest editorial: IEEE/ACM symposium on nanoscale architectures (NANOARCH07) (2009) (2)
- Electricity prices in day ahead energy markets (2009) (2)
- Power Reduction Using High-Level Clock-Gating (2012) (2)
- A Study of Inequality in the Ethereum Smart Contract Ecosystem (2019) (2)
- Translating Discrete Time SIMULINK to SIGNAL (2015) (2)
- Petri Net-based Thread Composition for Improved System Level Simulation (2004) (2)
- Programming Models for Multi-Core Embedded Software (2010) (2)
- Polychrony for Refinement-Based Design (2003) (2)
- Challenges of Rapidly Emerging Consumer Space Multiprocessors (2011) (2)
- Formal Refinement Checking in a System-level Design Methodology (2010) (2)
- Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots (2022) (2)
- A Trace Based Framework for Validation of SoC Designs with GALS Systems (2006) (2)
- Towards an Architecture-Centric Approach Dedicated to Model-Based Virtual Integration for Embedded Software Systems (2014) (2)
- Asynchronous hardware implementations for crypto primitives (2019) (2)
- Cyber Risk Assessment of Networked Cyber Assets using Probabilistic Model Checking (2019) (2)
- Modeling and Analyzing the Implementation of Latency-Insensitive Protocols Using the Polychrony Framework (2009) (2)
- SPAF : A System-level Power Analysis Framework (2007) (2)
- Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties (2021) (2)
- Android Malware Family Classification: What Works – API Calls, Permissions or API Packages? (2021) (2)
- Liquid Clocks - Refinement Types for Time-Dependent Stream Functions (2015) (2)
- Regression-Based Dynamic Power Estimation for FPGAs (2012) (2)
- Decentralized Device Authentication Model using the Trust Score and Blockchain Technology for Dynamic Networks (2020) (2)
- Detecting Insider Attacks on Databases using Blockchains (2017) (2)
- An algorithm for inferring master agent rules in an agent based robust Zone 3 relay architecture (2010) (2)
- Teaching game theory for computer engineering (2005) (2)
- A High Speed KECCAK Coprocessor for Partitioned NSP Architecture on FPGA Platform (2017) (2)
- A Formally Verified Peak-Power Reduction Technique for Hardware Synthesis from Concurrent Action-Oriented Specifications (2009) (2)
- Formal Foundations of Embedded Software and Component-Based Software Architectures (FESCA) Workshop (2004) (2)
- Behavioral type inference: part II - behavioral type inference for system design (2004) (2)
- PROGRESS : PROcess GRaph For Embedded Systems and Software : Combining Top-down and Bottom-up System Design Methodology (2003) (2)
- Guest Editors' Introduction: Special Section on System-Level Design and Validation of Heterogeneous Chip Multiprocessors (2013) (2)
- Understanding Money Trails of Suspicious Activities in a cryptocurrency-based Blockchain (2021) (2)
- Flexible Composite Galois Field GF((2^m)^2) Multiplier Designs (2017) (2)
- Type Inference for IP Composition (2007) (2)
- Using quantum model of computation for reliability evaluation of defect tolerant nano-architectures (2004) (2)
- Architectural, system level and protocol level techniques for power optimization for networked embedded systems (2005) (2)
- Extended abstract: a race-free hardware modeling language (2005) (2)
- C-Based Design of Heterogeneous Embedded Systems (2008) (2)
- Methods and Tools for Reliability Driven Defect-and Fault-tolerant Design of Nanosystems (2006) (2)
- Probabilistic Analysis of Self-Assembled Molecular Networks (2005) (2)
- Guest Editors' Introduction: Special Section on Science of Design for Safety Critical Systems (2011) (2)
- Efficient System Level Co-Design Environment using Split Level Programming (2001) (2)
- A Comprehensive API Call Analysis for Detecting Windows-Based Ransomware (2022) (2)
- Model-Based Integration for Automotive Control Software (2015) (2)
- Building India’s First Cyber-Security Test-Bed for CI (2020) (1)
- Formal Engineering Research using Methods, Abstractions and Transformations (2004) (1)
- Editorial: Security of Mobile Devices (2017) (1)
- Verification of unit and dimensional consistencies in polychronous specifications (2014) (1)
- Optimum location of master agents in an agent based zone 3 protection scheme designed for robustness against hidden failure induced trips (2012) (1)
- Editorial: Regular, Special, and Related Issues (2015) (1)
- Design Issues for Networked Embedded Systems (2005) (1)
- Automated Extraction of Multi-Threaded Graph Models for Formal Verification of System Level Models (2003) (1)
- Dynamic power management of devices with multiple power saving states (2003) (1)
- Security of Healthcare Data Using Blockchains: A Survey (2021) (1)
- System Level Simulation Guided Approach for Clock-Gating (2012) (1)
- Verity: Blockchains to Detect Insider Attacks in DBMS (2019) (1)
- PANEL: Should the space of implementation possibilities be determined by the abilities of high-level synthesis and validation? (2003) (1)
- Expressing the Behavior of Three Very Different Concurrent Systems by Using Natural Extensions of Separation Logic (2009) (1)
- Strengthened State Transitions for Complete Invariant Verification in Practical Depth-Induction (2008) (1)
- Editorial: Industry 4.0 - A Confluence of Embedded Artificial Intelligence, Machine Learning, Robotics and Security (2018) (1)
- Bluespec ESL and its Co-simulation with SystemC DE (2008) (1)
- Honeypot Deployment Experience at IIT Kanpur (2020) (1)
- Topology Validator - Defense Against Topology Poisoning Attack in SDN (2021) (1)
- DOTMUG: A Threat Model for Target Specific APT Attacks–Misusing Google Teachable Machine (2022) (1)
- Programming models for multi-core embedded systems (2010) (1)
- Malware Analysis Using Image Classification Techniques (2020) (1)
- Model-checking based Verification for Hardware Designs specified using Bluespec System (2007) (1)
- Guest editorial: Special issue on models and methodologies for co-design of embedded systems (2005) (1)
- A Model-Based Approach to System Specification for Distributed Real-time and Embedded Systems * (2004) (1)
- Editorial: Schizoid Design for Critical Embedded Systems (2015) (1)
- Reputation-based PoS for the Restriction of Illicit Activities on Blockchain: Algorand Usecase (2021) (1)
- Behavioral Hierarchy with Hierarchical FSMs (HFSMs) (2008) (1)
- A framework for analyzing and optimizing renewable energy portfolios (2015) (1)
- Guest Editors' Introduction: Multicore SoC Validation with Transaction-Level Models (2011) (1)
- Predictive Modeling of Electricity Trading Prices and the Impact of Increasing Solar Energy Penetration (2019) (1)
- Behavioral Type Inference (2004) (1)
- An automata theoretic framework for detecting schedulability attacks on cyber-physical systems (2018) (1)
- Low power hardware implementations for network packet processing elements (2018) (1)
- A Metamodeling based Framework for Architectural Modeling and Simulator Generation (2007) (1)
- Polychrony for refinement-based design [high-level synthesis] (2003) (1)
- Risk Management of Cascading Failure in Composite Reliability of a Deregulated Power System with Microgrids (2013) (1)
- Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features (2021) (1)
- VT Matrix Multiply Design for MEMOCODE '07 (2007) (1)
- Building Industrial Scale Cyber Security Experimentation Testbeds for Critical Infrastructures (2020) (1)
- Truly heterogeneous modeling with systemC (2004) (1)
- An Introductory Survey of Networked Embedded Systems (2005) (1)
- APECS code synthesis: Extending ocarina for multi-threaded code synthesis from AADL models for Safety Critical applications (2014) (1)
- A Brief History of Multiprocessors and EDA (2011) (1)
- PeerClear: Peer-to-Peer Bot-net Detection (2019) (1)
- Modeling and Control of Standalone Direct-Driven PMSG WECS for Grid Compatibility at Varying Wind Speeds (2015) (1)
- An Automated Reliability Enhancement Tool for Defect- Tolerance (2004) (1)
- Editorial: Trust and Security Must Become a Primary Design Concern in Embedded Computing (2018) (1)
- PREFACE (1995) (1)
- CatchAll: A Robust Multivariate Intrusion Detection System for Cyber-Physical Systems using Low Rank Matrix (2021) (1)
- Intrusion Detection & Prevention in Programmable Logic Controllers: A Model-driven Approach (2020) (1)
- Reliability Evaluation of Multiplexing Based Defect- Tolerant Majority Circuits (2004) (1)
- Design and analysis of defect- and fault-tolerant nano-computing systems (2007) (1)
- Simulation Semantics for Heterogeneous Behavioral Hierarchy (2008) (0)
- Techniques for Power-aware Synthesis from Concurrent Action Oriented Specifications (2006) (0)
- RBMon: Real Time System Behavior Monitoring Tool (2022) (0)
- Editorial: Embedded systems - more than methodology (2014) (0)
- Static Ransomware Analysis Using Machine Learning and Deep Learning Models (2020) (0)
- I ntrospective-SystemC : Reflection and Introspection in System Level Design (2005) (0)
- Verifying Peak Power Optimizations Using SPIN Model Checker (2010) (0)
- DARK-KERNEL: Design and Implementation of a Kernel Level Active Darknet Sensor (2022) (0)
- Guest Editors' Introduction to the Special Section on Programming Architectures for Embedded Systems (2008) (0)
- A Formal Approach to the Provably Correct Synthesis of Mission Critical Embedded Software for Multi Core Embedded Platforms (2014) (0)
- Structural component composition for system-level models (2004) (0)
- Editorial: Embedded Computing and Society (2020) (0)
- Peak Power Optimizations (2010) (0)
- RemOD: Operational Drift-Adaptive Intrusion Detection (2022) (0)
- Part I - Nano-computing at the physical layer: preface (2004) (0)
- Evaluating the grid impact of plug-in electric vehicles using dynamic commuting profiles (2013) (0)
- Mining Metadata from SystemC IP Library (2007) (0)
- I/O automata based verification of finite state distributed systems: complexity issues (1996) (0)
- Editorial: Oh Security—Where Art Thou? (2015) (0)
- Design space exploration for deterministic ethernet-based architecture of automotive systems (2016) (0)
- Editorial (2018) (0)
- Malware Detection in Word Documents Using Machine Learning (2020) (0)
- Panel Summaries (1998) (0)
- Proposal for the 2004 INRIA associated project-teams program Formal methods and models for compositional system-level design (2004) (0)
- Service-orientation for Dynamic Integration of Multiple Tools (2008) (0)
- Part III - Nano-scale quantum computing: preface (2004) (0)
- Understanding Rug Pulls: An In-Depth Behavioral Analysis of Fraudulent NFT Creators (2023) (0)
- Complexity Issues in Automata Theoretic Verification (2000) (0)
- Embedded Systems Specification and Modeling (2010) (0)
- Keynote Talk I (2006) (0)
- Unsupervised Learning Based Robust Multivariate Intrusion Detection System for Cyber-Physical Systems using Low Rank Matrix (2020) (0)
- Abstractions and Transformations Technical Report No : 2004-14 Comparing Reliability / Redundancy Trade-offs of Von Neumann Based Multiplexing Architectures (2004) (0)
- Testing the FormalCheck Query Library (2013) (0)
- Formal Hardware Verification of InfoSec Primitives (2019) (0)
- Chapter 6 Probabilistic Analysis of Self-Assembled Molecular Networks (2008) (0)
- TTPHunter: Automated Extraction of Actionable Intelligence as TTPs from Narrative Threat Reports (2023) (0)
- Editorial: Fence Itself Grazing the Field - Security from the Sentries (2016) (0)
- Abstraction of polychronous dataflow specifications into mode-automata (2013) (0)
- CatchAll (2021) (0)
- Industry Strength Tool and Technology for Automated Synthesis of Safety-Critical Applications from Formal Specifications (2015) (0)
- Early Detection of Ransomware Activity based on Hardware Performance Counters (2023) (0)
- Abstraction Guided Semi-formal Verification by Ankur Nimish Parikh (2007) (0)
- BlockPaaS: Blockchain Platform as a Service (2023) (0)
- Part 11 - Behavioral type inference for system design (2004) (0)
- Editorial (2020) (0)
- Editorial: Early Career Researchers in Embedded Computing (2018) (0)
- Session details: Session 6B: Convergence of abstractions in high-level synthesis (2001) (0)
- Implementation-oriented Simulation-oriented Implementation-oriented Design with Race-free Hardware Semantics (0)
- Formal models & verification [Session 1] (2014) (0)
- Adaptive Probability-Based Power Management Strategies (Tech Report# UCI-ICS-01-58) (0)
- Editorial: Diversity Galore & A Call for Resilient, Sustainable and Secure System Design (2014) (0)
- Preface to collected papers of FESCA 2005 (2005) (0)
- Interoperability between two Models of Computation : Co-simulating with SystemC DE and Bluespec ESL (2006) (0)
- Editorial: Continuing the Course (2017) (0)
- Optimization of Latency Insensitive Systems Through Back Pressure Minimization (2015) (0)
- Reliability/redundancy trade-off evaluation for multiplexed architectures used to implement quantum dot based computing (2004) (0)
- Architectural Selection Using High Level Synthesis (2012) (0)
- Techniques and Tools for Trustworthy Composition of Pre-Designed Embedded Software Components (2012) (0)
- EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector (2022) (0)
- Editorial (2017) (0)
- Design and Analysis of Fault-Tolerant Molecular Computing Systems (2008) (0)
- A Case Study in CORBA-based Event Management for Correlation Across Network Management Servers in a Centralized Network Operation (1999) (0)
- Editorial: Embedded, Cyber-Physical, Hybrid… (2014) (0)
- Editorial: Need for Artifact Verified Articles in ACM Transactions (2018) (0)
- CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical Systems (2018) (0)
- Editorial: Embedded Security Challenge: Cyber Security Contests in the Embedded Computing Domain (2019) (0)
- Validating Families of (2006) (0)
- Editorial: Security of Embedded Systems and Cyber Irons - Embedded Systems for Security (2016) (0)
- DNS based In-Browser Cryptojacking Detection (2022) (0)
- Low-Power Problem Formalization (2010) (0)
- Editorial (2018) (0)
- Session details: Generating efficient models for analog circuits (2005) (0)
- Preface and Introduction (2009) (0)
- Power Aware High Level Synthesis of Hardware Coprocessors (2010) (0)
- InviSeal: A Stealthy Dynamic Analysis Framework for Android Systems (2022) (0)
- ADVANCES IN DESIGN AND SPECIFICATION LANGUAGES FOR EMBEDDED SYSTEMS ADVANCES IN DESIGN AND SPECIFICATION LANGUAGES FOR EMBEDDED SYSTEMS Selected Contributions from FDL’06 (2006) (0)
- Part II - Defect tolerant nono-computing: preface (2004) (0)
- Chapter 7 MINING METADATA FROM SYSTEMC IP LIBRARY (0)
- Local Causal Reasoning of a Safety-Critical Subway System (2007) (0)
- Session details: Advances in optimization of mixed-signal circuits (2005) (0)
- Welcome Message from the Chairs (2014) (0)
- Editorial: Reflections on the History of Cyber-Physical versus Embedded Systems (2019) (0)
- Automated Windows behavioral tracing for malware analysis (2022) (0)
- Commissioning Random Matrix Theory and Synthetic Minority Oversampling Technique for Power System Faults Detection and Classification (2022) (0)
- Special Year on Logic and Algorithms Tutorial Notes: Complexity Issues in Automata-Theoretic Verification: The COSPAN Approach to Deal with These Issues(Tutorial Lectures by Robert Kurshan) (1997) (0)
- Editorial: Adversaries and Robustness (2019) (0)
- Part IV - Validation of nano-scale architectures: preface (2004) (0)
- Introspective-SystemC: Reflection and Introspection in System Level Design (2004) (0)
- Editorial: Human Factors in Embedded Computing (2019) (0)
- Early Stage Malware Classification using Behavior Analysis (2018) (0)
- High Level Simulation Directed RTL Power Estimation (2012) (0)
- Model-Checking to Exploit Sequential Clock-Gating (2012) (0)
- Heuristics for Power Savings (2010) (0)
- TECS Editorial (2020) (0)
- Design of Cyber Security for Critical Infrastructures: A Case for a Schizoid Design Approach (2015) (0)
- Analyzing Malicious Activities and Detecting Adversarial Behavior in Cryptocurrency based Permissionless Blockchains: An Ethereum Usecase (2022) (0)
- A Storage Efficient Blockchain Model for Constrained Applications (2021) (0)
- Translating Discrete Time SIMULINK to SIGNAL Traduction des temps discrets SIMULINK en SIGNAL (2015) (0)
- Supervised Machine Learning-Based DDoS Defense System for Software-Defined Network (2021) (0)
- Panel I: Nano-Computing: Do we need New Formal Approaches to Co-Design? (2006) (0)
- Dynamic Power Optimizations (2010) (0)
- A Semantics-Preserving Reduction of Code-Annotated Well-formed Free Choice Petri Nets (2004) (0)
- Organizers and Program Committee Members (2006) (0)
- Poly hrony for re nement-based designJean (2010) (0)
- TECS Editorial: Rethinking and Re-evaluating in the Time of Crisis. (2020) (0)
- Compiling polychronous programs into conditional partial orders for ASIP synthesis (2014) (0)
- Verity: Blockchain Based Framework to Detect Insider Attacks in DBMS (2020) (0)
- Complexity Analysis of Scheduling in CAOS-Based Synthesis (2010) (0)
- Buffer Overflow Attack and Prevention for an FPGA-Based Soft-Processor System (2019) (0)
- Automated Flag Detection and Participant Performance Evaluation for Pwnable CTF (2021) (0)
- Editorial: Embedded everywhere for everyone (2014) (0)
- Panel: Nano-computing - do we need new formal approaches ? (2006) (0)
- Security of Healthcare Data Using Blockchains (2021) (0)
- Indian Institute of Technology Kanpur India Final Report for AOARD Grant “ CORESAFE : A Formal Approach against Code Replacement Attacks on Cyber Physical Systems ” (2018) (0)
- AndroOBFS: Time-tagged Obfuscated Android Malware Dataset with Family Information (2022) (0)
- A FRAMEWORK FOR ANALYZING COMBINED LOAD-CARRYING-CAPACITY OF PLUG-IN ELECTRIC VEHICLES AND SOLAR GENERATORS (2013) (0)
This paper list is powered by the following services:
Other Resources About Sandeep Shukla
What Schools Are Affiliated With Sandeep Shukla?
Sandeep Shukla is affiliated with the following schools: