André Teixeira

Orcid: 0000-0001-5491-4068

Affiliations:
  • Uppsala University, Sweden


According to our database1, André Teixeira authored at least 76 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Quickest detection of deception attacks on cyber-physical systems with a parsimonious watermarking policy.
Autom., September, 2023

An Online Kullback-Leibler Divergence-Based Stealthy Attack Against Cyber-Physical Systems.
IEEE Trans. Autom. Control., June, 2023

Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures.
J. Inf. Secur. Appl., June, 2023

Sequential Detection of Replay Attacks.
IEEE Trans. Autom. Control., March, 2023

Quickest physical watermarking-based detection of measurement replacement attacks in networked control systems.
Eur. J. Control, 2023

Data-Driven Identification of Attack-free Sensors in Networked Control Systems.
CoRR, 2023

Security Allocation in Networked Control Systems under Stealthy Attacks.
CoRR, 2023

Optimal Detector Placement in Networked Control Systems under Cyber-attacks with Applications to Power Networks.
CoRR, 2023

Risk-based Security Measure Allocation Against Injection Attacks on Actuators.
CoRR, 2023

Feedback Path Delay Attacks and Detection.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

Robust Sequential Detection of Non-stealthy Sensor Deception Attacks in an Artificial Pancreas System.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

On the Trade-Offs Between Accuracy, Privacy, and Resilience in Average Consensus Algorithms.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

Secure State Estimation with Asynchronous Measurements against Malicious Measurement-Data and Time-Stamp Manipulation.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

2022
Privacy and Security in Network Controlled Systems via Dynamic Masking.
CoRR, 2022

A Single-Adversary-Single-Detector Zero-Sum Game in Networked Control Systems.
CoRR, 2022

A Zero-Sum Game Framework for Optimal Sensor Placement in Uncertain Networked Control Systems under Cyber-Attacks.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

Structural analyses of a parsimonious watermarking policy for data deception attack detection in networked control systems.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

Risk assessment and optimal allocation of security measures under stealthy false data injection attacks.
Proceedings of the IEEE Conference on Control Technology and Applications, 2022

Detection of Bias Injection Attacks on the Glucose Sensor in the Artificial Pancreas Under Meal Disturbance.
Proceedings of the American Control Conference, 2022

Sequential Detection of Replay Attacks with a Parsimonious Watermarking Policy.
Proceedings of the American Control Conference, 2022

Risk-averse controller design against data injection attacks on actuators for uncertain control systems.
Proceedings of the American Control Conference, 2022

2021
Privatized Distributed Anomaly Detection for Large-Scale Nonlinear Uncertain Systems.
IEEE Trans. Autom. Control., 2021

A Switching Multiplicative Watermarking Scheme for Detection of Stealthy Cyber-Attacks.
IEEE Trans. Autom. Control., 2021

Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates.
Cybersecur., 2021

Risk Assessment of Stealthy Attacks on Uncertain Control Systems.
CoRR, 2021

A Game-theoretic Approach to Covert Communications in the Presence of Multiple Colluding Wardens.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Deception Attack Detection using Reduced Watermarking.
Proceedings of the 2021 European Control Conference, 2021

Design of multiplicative watermarking against covert attacks.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

Stealthy Cyber-Attack Design Using Dynamic Programming.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

2020
Actuator Security Indices Based on Perfect Undetectability: Computation, Robustness, and Sensor Placement.
IEEE Trans. Autom. Control., 2020

Privacy-preserving Continuous Tumour Relapse Monitoring Using In-body Radio Signals.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Computer-aided curriculum analysis and design: existing challenges and open research directions.
Proceedings of the IEEE Frontiers in Education Conference, 2020

2019
Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation.
IEEE Trans. Smart Grid, 2019

Effects of Jamming Attacks on a Control System With Energy Harvesting.
IEEE Control. Syst. Lett., 2019

Data Injection Attacks against Feedforward Controllers.
Proceedings of the 17th European Control Conference, 2019

A Tutorial Introduction to Security and Privacy for Cyber-Physical Systems.
Proceedings of the 17th European Control Conference, 2019

Optimal stealthy attacks on actuators for strictly proper systems.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

On the Confidentiality of Linear Anomaly Detector States.
Proceedings of the 2019 American Control Conference, 2019

2018
Distributed Sensor and Actuator Reconfiguration for Fault-Tolerant Networked Control Systems.
IEEE Trans. Control. Netw. Syst., 2018

Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures.
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018

Detection of Sensor Data Injection Attacks with Multiplicative Watermarking.
Proceedings of the 16th European Control Conference, 2018

2017
Estimation With Strategic Sensors.
IEEE Trans. Autom. Control., 2017

Co-simulation for cyber security analysis: Data attacks against energy management system.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

Bayesian Network Models in Cyber Security: A Systematic Review.
Proceedings of the Secure IT Systems, 2017

Data attacks on power system state estimation: Limited adversarial knowledge vs. limited attack resources.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Detection and isolation of routing attacks through sensor watermarking.
Proceedings of the 2017 American Control Conference, 2017

2016
Combined data integrity and availability attacks on state estimation in cyber-physical power grids.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Cybersecurity as a <i>Politikum</i>: implications of security discourses for infrastructures.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

Cyber-Physical-Security Framework for Building Energy Management System.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications.
Proceedings of the Critical Information Infrastructures Security, 2016

From control system security indices to attack identifiability.
Proceedings of the 2016 Science of Security for Cyber-Physical Systems Workshop, 2016

Fault Detection and Diagnosis for Compliance Monitoring in International Supply Chains.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Optimal Parameter Selection for the Alternating Direction Method of Multipliers (ADMM): Quadratic Problems.
IEEE Trans. Autom. Control., 2015

A secure control framework for resource-limited adversaries.
Autom., 2015

Voltage control for interconnected microgrids under adversarial actions.
Proceedings of the 20th IEEE Conference on Emerging Technologies & Factory Automation, 2015

Strategic stealthy attacks: The output-to-output ℓ2-gain.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

2014
Distributed Fault Detection and Isolation Resilient to Network Model Uncertainties.
IEEE Trans. Cybern., 2014

A down-sampled controller to reduce network usage with guaranteed closed-loop performance.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

Security of smart distribution grids: Data integrity attacks on integrated volt/VAR control and countermeasures.
Proceedings of the American Control Conference, 2014

Gaussian cheap talk game with quadratic cost functions: When herding between strategic senders is a virtue.
Proceedings of the American Control Conference, 2014

The ADMM algorithm for distributed averaging: Convergence rates and optimal parameter selection.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

Distributed coordination of household electricity consumption.
Proceedings of the 2014 IEEE Conference on Control Applications, 2014

2013
Quantifying Cyber-Security for Networked Control Systems.
Proceedings of the Control of Cyber-Physical Systems, 2013

Optimal scaling of the ADMM algorithm for distributed quadratic programming.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

2012
Fault Detection and Mitigation in Kirchhoff Networks.
IEEE Signal Process. Lett., 2012

Agents misbehaving in a network: a vice or a virtue?
IEEE Netw., 2012

Cyber-security of SCADA systems.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

Attack models and scenarios for networked control systems.
Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS, 2012

Optimal power flow: Closing the loop over corrupted data.
Proceedings of the American Control Conference, 2012

Distributed Fault Detection and Isolation with imprecise network models.
Proceedings of the American Control Conference, 2012

Revealing stealthy attacks in control systems.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Distributed fault detection for interconnected second-order systems.
Autom., 2011

Dynamical system decomposition using dissipation inequalities.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

2010
A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator
CoRR, 2010

Cyber security analysis of state estimators in electric power systems.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

Networked control systems under cyber attacks with applications to power networks.
Proceedings of the American Control Conference, 2010


  Loading...