Ipsita Koley

Orcid: 0000-0001-9033-3295

According to our database1, Ipsita Koley authored at least 21 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MAARS: Multi-Rate Attack-Aware Randomized Scheduling for Securing Real-time Systems.
CoRR, 2024

Thinking Beyond Bus-off: Targeted Control Falsification in CAN.
Proceedings of the 15th ACM/IEEE International Conference on Cyber-Physical Systems, 2024

Adaptive Protection of Power Grids against Stealthy Load Alterations.
Proceedings of the 15th ACM/IEEE International Conference on Cyber-Physical Systems, 2024

2023
CAD Support for Security and Robustness Analysis of Safety-critical Automotive Software.
ACM Trans. Cyber Phys. Syst., January, 2023

Concealing CAN Message Sequences to Prevent Schedule-based Bus-off Attacks.
CoRR, 2023

A Learning Assisted Method for Uncovering Power Grid Generation and Distribution System Vulnerabilities.
CoRR, 2023

Work-in-Progress: Securing Safety-Critical Control Tasks with Attack-aware Multi-Rate Scheduling.
Proceedings of the 29th IEEE Real-Time and Embedded Technology and Applications Symposium, 2023

Optimizing RSU Placements for Securing Vehicle Platoon Against False Data Injection Attacks.
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems, 2023

Design and Deployment of Resilient Control Execution Patterns: A Prediction, Mitigation Approach.
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems, 2023

Adaptive CUSUM-Based Residue Analysis for Stealthy Attack Detection in Cyber-Physical Systems.
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems, 2023

Targeted Attack Synthesis for Smart Grid Vulnerability Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Exploring The Resilience of Control Execution Skips against False Data Injection Attacks.
CoRR, 2022

A CAD Framework for Simulation of Network Level Attack on Platoons.
CoRR, 2022

Work-in-Progress: Control Skipping Sequence Synthesis to Counter Schedule-based Attacks.
Proceedings of the IEEE Real-Time Systems Symposium, 2022

A Framework for Evaluating Connected Vehicle Security against False Data Injection Attacks.
Proceedings of the 25th Euromicro Conference on Digital System Design, 2022

2021
An RL-Based Adaptive Detection Strategy to Secure Cyber-Physical Systems.
CoRR, 2021

Catch Me If You Learn: Real-Time Attack Detection and Mitigation in Learning Enabled CPS.
Proceedings of the 42nd IEEE Real-Time Systems Symposium, 2021

2020
State Estimation for Attack Detection in Vehicle Platoon using VANET and Controller Model.
Proceedings of the 23rd IEEE International Conference on Intelligent Transportation Systems, 2020

Formal Synthesis of Monitoring and Detection Systems for Secure CPS Implementations.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

Skip to Secure: Securing Cyber-Physical Control Loops with Intentionally Skipped Executions.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

2019
Mobile sink based data collection for energy efficient coordination in wireless sensor network using cooperative game model.
Telecommun. Syst., 2019


  Loading...