default search action
Sunandan Adhikary
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c11]Ipsita Koley, Sunandan Adhikary, Soumyajit Dey:
Thinking Beyond Bus-off: Targeted Control Falsification in CAN. ICCPS 2024: 33-44 - [c10]Anjana Balabhaskara, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey, Ashish R. Hota:
Adaptive Protection of Power Grids against Stealthy Load Alterations. ICCPS 2024: 285-286 - [i7]Arkaprava Sain, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey:
MAARS: Multi-Rate Attack-Aware Randomized Scheduling for Securing Real-time Systems. CoRR abs/2408.00341 (2024) - 2023
- [c9]Suman Maiti, Anjana Balabhaskara, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey:
Targeted Attack Synthesis for Smart Grid Vulnerability Analysis. CCS 2023: 2576-2590 - [c8]Ipsita Koley, Sunandan Adhikary, Arkaprava Sain, Soumyajit Dey:
Design and Deployment of Resilient Control Execution Patterns: A Prediction, Mitigation Approach. ICCPS 2023: 166-176 - [c7]Anik Roy, Ipsita Koley, Sunandan Adhikary, Soumyajit Dey:
Optimizing RSU Placements for Securing Vehicle Platoon Against False Data Injection Attacks. ICCPS 2023: 251-252 - [c6]Akash Bhattacharya, Sunandan Adhikary, Ipsita Koley, Anirban Majumder, Soumyajit Dey:
Adaptive CUSUM-Based Residue Analysis for Stealthy Attack Detection in Cyber-Physical Systems. ICCPS 2023: 270-271 - [c5]Arkaprava Sain, Suraj Singh, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey:
Work-in-Progress: Securing Safety-Critical Control Tasks with Attack-aware Multi-Rate Scheduling. RTAS 2023: 345-348 - [i6]Suman Maiti, Anjana B, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey:
A Learning Assisted Method for Uncovering Power Grid Generation and Distribution System Vulnerabilities. CoRR abs/2306.09057 (2023) - [i5]Sunandan Adhikary, Ipsita Koley, Arkaprava Sain, Soumyadeep das, Shuvam Saha, Soumyajit Dey:
Concealing CAN Message Sequences to Prevent Schedule-based Bus-off Attacks. CoRR abs/2306.09206 (2023) - 2022
- [c4]Ipsita Koley, Sunandan Adhikary, Rohit Rohit, Soumyajit Dey:
A Framework for Evaluating Connected Vehicle Security against False Data Injection Attacks. DSD 2022: 913-920 - [c3]Sunandan Adhikary, Ipsita Koley, Srijeeta Maity, Soumyajit Dey:
Work-in-Progress: Control Skipping Sequence Synthesis to Counter Schedule-based Attacks. RTSS 2022: 491-494 - [i4]Ipsita Koley, Sunandan Adhikary, Rohit Rohit, Soumyajit Dey:
A CAD Framework for Simulation of Network Level Attack on Platoons. CoRR abs/2205.00769 (2022) - [i3]Ipsita Koley, Sunandan Adhikary, Soumyajit Dey:
Exploring The Resilience of Control Execution Skips against False Data Injection Attacks. CoRR abs/2207.08005 (2022) - 2021
- [j1]Sunandan Adhikary, Amit Gurung, Jay Thakkar, Antonio Anastasio Bruto da Costa, Soumyajit Dey, Aritra Hazra, Pallab Dasgupta:
SMT-Based Verification of Safety-Critical Embedded Control Software. IEEE Embed. Syst. Lett. 13(3): 138-141 (2021) - [c2]Ipsita Koley, Sunandan Adhikary, Soumyajit Dey:
Catch Me If You Learn: Real-Time Attack Detection and Mitigation in Learning Enabled CPS. RTSS 2021: 136-148 - [i2]Ipsita Koley, Sunandan Adhikary, Soumyajit Dey:
An RL-Based Adaptive Detection Strategy to Secure Cyber-Physical Systems. CoRR abs/2103.02872 (2021) - 2020
- [c1]Sunandan Adhikary, Ipsita Koley, Saurav Kumar Ghosh, Sumana Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay:
Skip to Secure: Securing Cyber-Physical Control Loops with Intentionally Skipped Executions. CPSIOTSEC@CCS 2020: 81-86 - [i1]Sunandan Adhikary, Ipsita Koley, Sumana Ghosh, Saurav Kumar Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay:
Skip to Secure: Securing Cyber-physical Control Loops with Intentionally Skipped Executions. CoRR abs/2007.08121 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-09 01:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint