Skip to secure: Securing cyber-physical control loops with intentionally skipped executions S Adhikary, I Koley, SK Ghosh, S Ghosh, S Dey, D Mukhopadhyay Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 81-86, 2020 | 11 | 2020 |
Formal synthesis of monitoring and detection systems for secure cps implementations I Koley, SK Ghosh, S Dey, D Mukhopadhyay, AK KN, SK Singh, L Lokesh, ... 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 314-317, 2020 | 11 | 2020 |
Mobile sink based data collection for energy efficient coordination in wireless sensor network using cooperative game model I Koley, T Samanta Telecommunication Systems 71, 377-396, 2019 | 11 | 2019 |
State estimation for attack detection in vehicle platoon using vanet and controller model P Kremer, I Koley, S Dey, S Park 2020 IEEE 23rd International Conference on Intelligent Transportation …, 2020 | 9 | 2020 |
Catch me if you learn: Real-time attack detection and mitigation in learning enabled cps I Koley, S Adhikary, S Dey 2021 IEEE Real-Time Systems Symposium (RTSS), 136-148, 2021 | 7 | 2021 |
Targeted attack synthesis for smart grid vulnerability analysis S Maiti, A Balabhaskara, S Adhikary, I Koley, S Dey Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 3 | 2023 |
CAD Support for Security and Robustness Analysis of Safety-critical Automotive Software I Koley, S Dey, D Mukhopadhyay, S Singh, L Lokesh, SV Ghotgalkar ACM Transactions on Cyber-Physical Systems 7 (1), 1-26, 2023 | 2 | 2023 |
Formal synthesis of monitoring and detection systems for secure CPS implementations. In 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE) I Koley, SK Ghosh, S Dey, D Mukhopadhyay, AK KN, SK Singh, L Lokesh, ... IEEE, 314ś317, 2020 | 2 | 2020 |
Resource Aware Synthesis of Automotive Security Primitives S Dey, I Koley, S Adhikary Machine Learning and Optimization Techniques for Automotive Cyber-Physical …, 2023 | 1 | 2023 |
Work-in-Progress: Control Skipping Sequence Synthesis to Counter Schedule-based Attacks S Adhikary, I Koley, S Maity, S Dey 2022 IEEE Real-Time Systems Symposium (RTSS), 491-494, 2022 | 1 | 2022 |
A Framework for Evaluating Connected Vehicle Security against False Data Injection Attacks I Koley, S Adhikary, R Rohit, S Dey 2022 25th Euromicro Conference on Digital System Design (DSD), 913-920, 2022 | 1 | 2022 |
A CAD framework for simulation of network level attack on platoons I Koley, S Adhikary, R Rohit, S Dey arXiv preprint arXiv:2205.00769, 2022 | 1 | 2022 |
An RL-based adaptive detection strategy to secure cyber-physical systems I Koley, S Adhikary, S Dey arXiv preprint arXiv:2103.02872, 2021 | 1 | 2021 |
MAARS: Multi-Rate Attack-Aware Randomized Scheduling for Securing Real-time Systems A Sain, S Adhikary, I Koley, S Dey arXiv preprint arXiv:2408.00341, 2024 | | 2024 |
Thinking Beyond Bus-off: Targeted Control Falsification in CAN I Koley, S Adhikary, S Dey 2024 ACM/IEEE 15th International Conference on Cyber-Physical Systems (ICCPS …, 2024 | | 2024 |
Adaptive Protection of Power Grids against Stealthy Load Alterations A Balabhaskara, S Adhikary, I Koley, S Dey, AR Hota 2024 ACM/IEEE 15th International Conference on Cyber-Physical Systems (ICCPS …, 2024 | | 2024 |
Machine Learning and Optimization Techniques for Automotive Cyber-Physical Systems VK Kukkala, S Pasricha Springer Nature, 2023 | | 2023 |
A Learning Assisted Method for Uncovering Power Grid Generation and Distribution System Vulnerabilities S Maiti, S Adhikary, I Koley, S Dey arXiv preprint arXiv:2306.09057, 2023 | | 2023 |
Concealing CAN Message Sequences to Prevent Schedule-based Bus-off Attacks S Adhikary, I Koley, A Sain, S Saha, S Dey arXiv preprint arXiv:2306.09206, 2023 | | 2023 |
Work-in-Progress: Securing Safety-Critical Control Tasks with Attack-aware Multi-Rate Scheduling A Sain, S Singh, S Adhikary, I Koley, S Dey 2023 IEEE 29th Real-Time and Embedded Technology and Applications Symposium …, 2023 | | 2023 |