DYNACON NEST Publications and Preprints
Preprints
R. Alisic, J. Kim, and H. Sandberg,
“Anomaly Detection with LWE Encrypted Control,”
Feb. 14, 2025, arXiv:2502.10283.
[http://doi.org/10.48550/arXiv.2502.10283]
Journal Articles
M. Borhani, G. S. Gaba, J. Basaez, I. Avgouleas, and A. Gurtov,
“A critical analysis of the industrial device scanners’
potentials, risks, and preventives,” Journal of
Industrial Information Integration, vol. 41, p. 100623,
Sep. 2024. [https://doi.org/10.1016/j.jii.2024.100623]
Conference Articles
T. Nauta, H. Sandberg, and M. Maggio,
“Stealthy Computational Delay Attacks on Control Systems,”
in Proceedings of the ACM/IEEE 16th International Conference on
Cyber-Physical Systems (with CPS-IoT Week 2025), in ICCPS ’25.
New York, NY, USA: Association for Computing Machinery,
May 2025, pp. 1–11. [https://doi.org/10.1145/3716550.3722013]
E. Breukelman and H. Sandberg,
“Unknown Input Observers Breaking Confidentiality of Controller
States,” in 2024 IEEE 63rd Conference on Decision and Control (CDC),
Dec. 2024, pp. 2373–2378. [https://doi.org/10.1109/CDC56724.2024.10886707]
E. Larsson-Kapp, V. Kniivilä, Z. Wang, M. Wzorek, A. Lemetti, and A. Gurtov,
“Trust-Based Collision Avoidance for Unmanned Aircraft Systems,”
in 2024 IEEE International Conference on Aerospace and Signal Processing (INCAS),
Nov. 2024, pp. 1–6. [https://doi.org/10.1109/INCAS63820.2024.10798560]
A. Attin, S. Bonnedahl, Z. Wang, M. Wzorek, A. Lemetti, and A. Gurtov,
“Secure Remote ID and Detect-and-Avoid in Unmanned Aerial Systems: Modeling
The Maximum Safe Speed,” in 2024 IEEE International Conference on Aerospace and
Signal Processing (INCAS), Nov. 2024, pp. 1–6. [https://doi.org/10.1109/INCAS63820.2024.10798556]
Technical Report
|