Stefano Panzieri

Orcid: 0000-0002-6042-5479

According to our database1, Stefano Panzieri authored at least 124 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Negativizability: A useful property for distributed state estimation and control in Cyber-Physical Systems.
Autom., November, 2023

Multirate Interlaced Kalman Filter.
Proceedings of the 31st Mediterranean Conference on Control and Automatio, 2023

Modeling and Assessing the Impacts of Cyber Threats on Interdependent Critical Infrastructures.
Proceedings of the Critical Infrastructure Protection XVII, 2023

A Game of Age of Incorrect Information Against an Adversary Injecting False Data.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Enhancing Industrial Cyber-Physical Systems Security with Smart Probing Approach.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Stability Analysis for Multirate Interlaced Kalman Filter.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

Resilient Consensus Based on Evidence Theory and Weight Correction.
Proceedings of the American Control Conference, 2023

2022
Private Consensus using Chaotic Oscillator-Based Encryption.
Proceedings of the 30th Mediterranean Conference on Control and Automation, 2022

Distributed and Asynchronous Secure State Reconstruction for Cyber-Physical Systems.
Proceedings of the 30th Mediterranean Conference on Control and Automation, 2022

Distributed Asynchronous Projection onto the Intersection of Convex Sets.
Proceedings of the 30th Mediterranean Conference on Control and Automation, 2022

A Secure Communication Protocol with Application to Networked Kalman Filtering.
Proceedings of the American Control Conference, 2022

2021
Anomaly-Based Intrusion Detection System for Cyber-Physical System Security.
Proceedings of the 29th Mediterranean Conference on Control and Automation, 2021

Blockchain application in simulated environment for Cyber-Physical Systems Security.
Proceedings of the 19th IEEE International Conference on Industrial Informatics, 2021

2020
Modeling Telecommunications Infrastructures Using the CISIApro 2.0 Simulator.
Proceedings of the Critical Infrastructure Protection XIV, 2020

2019
Network Structural Vulnerability: A Multiobjective Attacker Perspective.
IEEE Trans. Syst. Man Cybern. Syst., 2019

From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment.
IEEE Syst. J., 2019

Gossip algorithm for multi-agent systems via random walk.
Syst. Control. Lett., 2019

An opacity approach for security exposure of IoT components in critical infrastructures.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

Securing connection between IT and OT: the Fog Intrusion Detection System prospective.
Proceedings of the 2nd Workshop on Metrology for Industry 4.0 and IoT MetroInd4.0&IoT 2019, 2019

Assessing Node Criticality in Dynamical Distributed Systems.
Proceedings of the 17th European Control Conference, 2019

2018
Smart Behavioural Filter for Industrial Internet of Things - A Security Extension for PLC.
Mob. Networks Appl., 2018

Finding critical nodes in infrastructure networks.
Int. J. Crit. Infrastructure Prot., 2018

Integrated protection of industrial control systems from cyber-attacks: the ATENA approach.
Int. J. Crit. Infrastructure Prot., 2018

Exploiting System Model for Securing CPS: the Anomaly Based IDS Perspective.
Proceedings of the 23rd IEEE International Conference on Emerging Technologies and Factory Automation, 2018

Discovering Vulnerabilities in Heterogeneous Interconnected Systems.
Proceedings of the Critical Information Infrastructures Security, 2018

2017
Fault Diagnosis and Network Anomaly Detection in Water Infrastructures.
IEEE Des. Test, 2017

Distributed Data Fusion for Situational Awareness in Critical Infrastructures with Link Failures.
Proceedings of the Critical Infrastructure Protection XI, 2017

Faulty or Malicious Anchor Detection Criteria for Distance-Based Localization.
Proceedings of the Critical Information Infrastructures Security, 2017

2016
Localization of networks with presence and distance constraints based on 1-hop and 2-hop mass-spring optimization.
ICT Express, 2016

Critical node detection based on attacker preferences.
Proceedings of the 24th Mediterranean Conference on Control and Automation, 2016

Smart Behavioural Filter for SCADA Network.
Proceedings of the Industrial Networks and Intelligent Systems, 2016

Enhancing Decision Support with Interdependency Modeling.
Proceedings of the Critical Infrastructure Protection X, 2016

Improved multi-criteria distribution network reconfiguration with information fusion.
Proceedings of the 19th International Conference on Information Fusion, 2016

Managing decisions for smart grid using interdependency modeling.
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2016

Network composition for optimal disturbance rejection.
Proceedings of the 2016 American Control Conference, 2016

2015
Algorithms and Tools for Risk/Impact Evaluation in Critical Infrastructures.
Proceedings of the Intelligent Monitoring, 2015

Sensor Networks Localization: Extending Trilateration via Shadow Edges.
IEEE Trans. Autom. Control., 2015

Urban traffic flow forecasting through statistical and neural network bagging ensemble hybrid modeling.
Neurocomputing, 2015

The Baxter Easyhand: A robot hand that costs $150 US in parts.
Proceedings of the 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2015

Improving network security monitoring for industrial control systems.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Situational Awareness Using Distributed Data Fusion with Evidence Discounting.
Proceedings of the Critical Infrastructure Protection IX, 2015

Assessing Cyber Risk Using the CISIApro Simulator.
Proceedings of the Critical Infrastructure Protection IX, 2015

A graph-based evidence theory for assessing risk.
Proceedings of the 18th International Conference on Information Fusion, 2015

Identifying Critical Infrastructure Clusters via Spectral Analysis.
Proceedings of the Critical Information Infrastructures Security, 2015

Noisy localization over unit disk graphs: The shadow edge approach.
Proceedings of the American Control Conference, 2015

2014
Discrete-time linear systems with fuzzy dynamics.
J. Intell. Fuzzy Syst., 2014

Taxonomy of SCADA systems security testbeds.
Int. J. Crit. Infrastructures, 2014

An amendment to "Distributed synchronization under uncertainty: A fuzzy approach".
Fuzzy Sets Syst., 2014

A joint routing and localization algorithm for emergency scenario.
Ad Hoc Networks, 2014

A model for robust distributed hierarchical electric power grid state estimation.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

Evidence Theory for Cyber-Physical Systems.
Proceedings of the Critical Infrastructure Protection VIII, 2014

Hybrid map building for personal indoor navigation systems.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2014

2013
Distributed Cooperative Localization.
J. Inf. Technol. Res., 2013

Distributed consensus under ambiguous information.
Int. J. Syst. Syst. Eng., 2013

Detection and impact of cyber attacks in a critical infrastructures scenario: the CockpitCI approach.
Int. J. Syst. Syst. Eng., 2013

Homeland situation awareness through mining and fusing heterogeneous information from intelligence databases and field sensors.
Int. J. Syst. Syst. Eng., 2013

Aware online interdependency modelling via evidence theory.
Int. J. Crit. Infrastructures, 2013

Exploiting routing information in Wireless Sensor Networks localization.
Proceedings of the 2nd IEEE Network Science Workshop, 2013

Design of a domain-independent training system based on a smart pedagogical agent.
Proceedings of the 2013 12th International Conference on Information Technology Based Higher Education and Training, 2013

Evidence theory for Smart Grid diagnostics.
Proceedings of the 4th IEEE PES Innovative Smart Grid Technologies Europe, 2013

Assessing the Impact of Cyber Attacks on Interdependent Physical Systems.
Proceedings of the Critical Infrastructure Protection VII, 2013

Network localization by Shadow Edges.
Proceedings of the 12th European Control Conference, 2013

Malicious false data injection in hierarchical electric power grid state estimation systems.
Proceedings of the Fourth International Conference on Future Energy Systems, 2013

Analysis of Severe Space Weather on Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2013

2012
A Networked Transferable Belief Model Approach for Distributed Data Aggregation.
IEEE Trans. Syst. Man Cybern. Part B, 2012

Reconstruction of Riser Profiles by an Underwater Robot Using Inertial Navigation.
J. Robotics, 2012

Distributed synchronization under uncertainty: A fuzzy approach.
Fuzzy Sets Syst., 2012

Influence of Topological Features on Spatially-Structured Evolutionary Algorithms Dynamics
CoRR, 2012

A REference implementation of interoperable indoor location & communication systems for First REsponders: The REFIRE project.
Proceedings of the IEEE International Symposium on Safety, Security, and Rescue Robotics, 2012

Consensus of agents with fuzzy state.
Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems (SCIS), 2012

Online distributed synchronizability check for networks of interconnected systems.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Virtual industrial training: Joining innovative interfaces with plant modeling.
Proceedings of the 2012 International Conference on Information Technology Based Higher Education and Training, 2012

A Networked Evidence Theory Framework for Critical Infrastructure Modeling.
Proceedings of the Critical Infrastructure Protection VI, 2012

An agile model for situation assessment: How to make Evidence Theory able to change idea about classifications.
Proceedings of the 15th International Conference on Information Fusion, 2012

Mixed Holistic Reductionistic Approach for Impact Assessment of Cyber Attacks.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

INFUSION: A system for situation and threat assessment in current and foreseen scenarios.
Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2012

Discrete-time LTI fuzzy systems: Stability and representation.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

2011
Fuzzy dynamic input-output inoperability model.
Int. J. Crit. Infrastructure Prot., 2011

On the Stability of Linear Discrete-Time Fuzzy Systems
CoRR, 2011

Fuzzy Consensus and Synchronization: Theory and Application to Critical Infrastructure Protection Problems
CoRR, 2011

Effect of topology on diversity of spatially-structured evolutionary algorithms.
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011

Fuzzy Input-Output Inoperability Model - (Short Paper).
Proceedings of the Critical Information Infrastructure Security, 2011

How to Perform Verification and Validation of Critical Infrastructure Modeling Tools.
Proceedings of the Critical Information Infrastructure Security, 2011

Countermeasures Selection via Evidence Theory - (Short Paper).
Proceedings of the Critical Information Infrastructure Security, 2011

Online Distributed Interdependency Estimation for critical infrastructures.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

A simultaneous routing and localization algorithm for wireless sensor networks in emergency scenario.
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011

2010
A fitness-sharing based genetic algorithm for collaborative multi-robot localization.
Intell. Serv. Robotics, 2010

Agent-based input-output interdependency model.
Int. J. Crit. Infrastructure Prot., 2010

MICIE: An Alerting Framework for Interdependent Critical Infrastructures.
Proceedings of the Towards a Service-Based Internet - Third European Conference, 2010

Online Distributed Interdependency Estimation with Partial Information Sharing.
Proceedings of the Complexity in Engineering, 2010


A networked transferable belief model approach for distributed data aggregation - Dynamic version.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

A networked transferable belief model approach for distributed data aggregation - Static version.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

2009
ISIM_GestureCapture: Java gesture recognition for natural interaction.
IxD&A, 2009

A spatially structured genetic algorithm for multi-robot localization.
Intell. Serv. Robotics, 2009

An Interlaced Extended Kalman Filter for sensor networks localisation.
Int. J. Sens. Networks, 2009

Modelling critical infrastructure via a mixed holistic reductionistic approach.
Int. J. Crit. Infrastructures, 2009

A fitness-sharing based genetic algorithm for collaborative Multi Robot Localization.
Proceedings of the 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009

On the distributed synchronization of on-line IIM interdependency models.
Proceedings of the 7th IEEE International Conference on Industrial Informatics, 2009

A Holistic-Reductionistic Approach for Modeling Interdependencies.
Proceedings of the Critical Infrastructure Protection III, 2009

Formation Control through Environment Pattern Recognition for a Multi-robot Architecture.
Proceedings of the 4th European Conference on Mobile Robots, 2009

2008
Failures propagation in critical interdependent infrastructures.
Int. J. Model. Identif. Control., 2008

Simultaneous localisation and mapping of a mobile robot via interlaced extended Kalman filter.
Int. J. Model. Identif. Control., 2008

Simulation of heterogeneous and interdependent critical infrastructures.
Int. J. Crit. Infrastructures, 2008

2007
A Spatially Structured Genetic Algorithm over Complex Networks for Mobile Robot Localisation.
Proceedings of the 2007 IEEE International Conference on Robotics and Automation, 2007

A Hybrid Active Global Localisation Algorithm for Mobile Robots.
Proceedings of the 2007 IEEE International Conference on Robotics and Automation, 2007

Case-Based Reasoning in Robot Indoor Navigation.
Proceedings of the Case-Based Reasoning Research and Development, 2007

2006
Monte Carlo Filter in Mobile Robotics Localization: A Clustered Evolutionary Point of View.
J. Intell. Robotic Syst., 2006

Automatic Systems for sensor fusion.
IxD&A, 2006

Multirobot Localisation Using Interlaced Extended Kalman Filter.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006

2005
Interlaced extended Kalman filter for real time navigation.
Proceedings of the 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2005

2004
RTLinux-Based Controller for the SuperMARIO Mobile Robot.
Proceedings of the Advances in Control of Articulated and Mobile Robots., 2004

1998
An Iterative Learning Controller for Nonholonomic Mobile Robots.
Int. J. Robotics Res., 1998

Application of Cyclic Control to a Two-link Flexible Arm.
Autom., 1998

Stable Inversion Control for Flexible Link Manipulators.
Proceedings of the IEEE International Conference on Robotics and Automation, 1998

1997
Cyclic control of robot arms.
Kybernetika, 1997

Repositioning control of a two-link flexible arm by learning.
Autom., 1997

Experiments on output tracking with internal stability by learning for a one-link flexible arm.
Autom., 1997

1996
An iterative learning controller for nonholonomic robots.
Proceedings of the 1996 IEEE International Conference on Robotics and Automation, 1996

End point trajectory control with internal stability of a flexible link by learning.
Proceedings of the 1996 IEEE International Conference on Robotics and Automation, 1996

1994
An iterative scheme for learning gravity compensation in flexible robot arms.
Autom., 1994

Experiments on Repositioning Control of Robots by Learning.
Proceedings of the 1994 International Conference on Robotics and Automation, 1994

1993
Point to Point Learning Control of a Two-Link Flexible Arm.
Proceedings of the Experimental Robotics III, 1993

Design and Implementation of a State Observer for a Flexible Robot.
Proceedings of the 1993 IEEE International Conference on Robotics and Automation, 1993


  Loading...