关注
Sunandan Adhikary
Sunandan Adhikary
在 kgpian.iitkgp.ac.in 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Skip to secure: Securing cyber-physical control loops with intentionally skipped executions
S Adhikary, I Koley, SK Ghosh, S Ghosh, S Dey, D Mukhopadhyay
Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 81-86, 2020
112020
Catch me if you learn: Real-time attack detection and mitigation in learning enabled cps
I Koley, S Adhikary, S Dey
2021 IEEE Real-Time Systems Symposium (RTSS), 136-148, 2021
72021
Targeted attack synthesis for smart grid vulnerability analysis
S Maiti, A Balabhaskara, S Adhikary, I Koley, S Dey
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
32023
SMT-based verification of safety-critical embedded control software
S Adhikary, A Gurung, J Thakkar, AB Da Costa, S Dey, A Hazra, ...
IEEE Embedded Systems Letters 13 (3), 138-141, 2020
22020
Resource Aware Synthesis of Automotive Security Primitives
S Dey, I Koley, S Adhikary
Machine Learning and Optimization Techniques for Automotive Cyber-Physical …, 2023
12023
A Framework for Evaluating Connected Vehicle Security against False Data Injection Attacks
I Koley, S Adhikary, R Rohit, S Dey
2022 25th Euromicro Conference on Digital System Design (DSD), 913-920, 2022
12022
A CAD framework for simulation of network level attack on platoons
I Koley, S Adhikary, R Rohit, S Dey
arXiv preprint arXiv:2205.00769, 2022
12022
An RL-based adaptive detection strategy to secure cyber-physical systems
I Koley, S Adhikary, S Dey
arXiv preprint arXiv:2103.02872, 2021
12021
A Learning Assisted Method for Uncovering Power Grid Generation and Distribution System Vulnerabilities
S Maiti, S Adhikary, I Koley, S Dey
arXiv preprint arXiv:2306.09057, 2023
2023
Concealing CAN Message Sequences to Prevent Schedule-based Bus-off Attacks
S Adhikary, I Koley, A Sain, S Saha, S Dey
arXiv preprint arXiv:2306.09206, 2023
2023
Work-in-Progress: Securing Safety-Critical Control Tasks with Attack-aware Multi-Rate Scheduling
A Sain, S Singh, S Adhikary, I Koley, S Dey
2023 IEEE 29th Real-Time and Embedded Technology and Applications Symposium …, 2023
2023
Adaptive CUSUM-Based Residue Analysis for Stealthy Attack Detection in Cyber-Physical Systems
A Bhattacharya, S Adhikary, I Koley, A Majumder, S Dey
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical …, 2023
2023
Optimizing RSU Placements for Securing Vehicle Platoon Against False Data Injection Attacks
A Roy, I Koley, S Adhikary, S Dey
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical …, 2023
2023
Design and Deployment of Resilient Control Execution Patterns: A Prediction, Mitigation Approach
I Koley, S Adhikary, A Sain, S Dey
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical …, 2023
2023
Work-in-Progress: Control Skipping Sequence Synthesis to Counter Schedule-based Attacks
S Adhikary, I Koley, S Maity, S Dey
2022 IEEE Real-Time Systems Symposium (RTSS), 491-494, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–15