DYNACON NEST Publications and Preprints

Preprints

  1. R. Alisic, J. Kim, and H. Sandberg, “Anomaly Detection with LWE Encrypted Control,” Feb. 14, 2025, arXiv:2502.10283. [http://doi.org/10.48550/arXiv.2502.10283]

Journal Articles

  1. M. Borhani, G. S. Gaba, J. Basaez, I. Avgouleas, and A. Gurtov, “A critical analysis of the industrial device scanners’ potentials, risks, and preventives,” Journal of Industrial Information Integration, vol. 41, p. 100623, Sep. 2024. [https://doi.org/10.1016/j.jii.2024.100623]

Conference Articles

  1. T. Nauta, H. Sandberg, and M. Maggio, “Stealthy Computational Delay Attacks on Control Systems,” in Proceedings of the ACM/IEEE 16th International Conference on Cyber-Physical Systems (with CPS-IoT Week 2025), in ICCPS ’25. New York, NY, USA: Association for Computing Machinery, May 2025, pp. 1–11. [https://doi.org/10.1145/3716550.3722013]

  2. E. Breukelman and H. Sandberg, “Unknown Input Observers Breaking Confidentiality of Controller States,” in 2024 IEEE 63rd Conference on Decision and Control (CDC), Dec. 2024, pp. 2373–2378. [https://doi.org/10.1109/CDC56724.2024.10886707]

  3. E. Larsson-Kapp, V. Kniivilä, Z. Wang, M. Wzorek, A. Lemetti, and A. Gurtov, “Trust-Based Collision Avoidance for Unmanned Aircraft Systems,” in 2024 IEEE International Conference on Aerospace and Signal Processing (INCAS), Nov. 2024, pp. 1–6. [https://doi.org/10.1109/INCAS63820.2024.10798560]

  4. A. Attin, S. Bonnedahl, Z. Wang, M. Wzorek, A. Lemetti, and A. Gurtov, “Secure Remote ID and Detect-and-Avoid in Unmanned Aerial Systems: Modeling The Maximum Safe Speed,” in 2024 IEEE International Conference on Aerospace and Signal Processing (INCAS), Nov. 2024, pp. 1–6. [https://doi.org/10.1109/INCAS63820.2024.10798556]

Technical Report