Latest publications
Recent publications by the Division of Network and Systems Engineering.
The latest publications from NSE
[1]
L. Varawala et al.,
"A generalised approach for efficient computation of look ahead security constrained optimal power flow,"
European Journal of Operational Research, 2023.
[2]
L. Varawala et al.,
"A pricing mechanism to jointly mitigate market power and environmental externalities in electricity markets,"
Energy Economics, vol. 121, pp. 106646-106646, 2023.
[3]
D. Weinberg et al.,
"A Review of Reinforcement Learning for Controlling Building Energy Systems From a Computer Science Perspective,"
Sustainable cities and society, vol. 89, 2023.
[4]
M. Spanghero and P. Papadimitratos,
"Detecting GNSS misbehavior leveraging secure heterogeneous time sources,"
in IEEE/ION Position, Location and Navigation Symposium (PLANS), Monterey, California, April 24-27, 2023, 2023.
[5]
Y. Xu et al.,
"Distributed Assignment With Load Balancing for DNN Inference at the Edge,"
IEEE Internet of Things Journal, vol. 10, no. 2, pp. 1053-1065, 2023.
[6]
E. Rencelj Ling and M. Ekstedt,
"Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data,"
SN Computer Science, vol. 4, no. 3, 2023.
[7]
H. Hellström, V. Fodor and C. Fischione,
"Federated Learning Over-the-Air by Retransmissions,"
IEEE Transactions on Wireless Communications, pp. 1-1, 2023.
[8]
H. Abeynanda et al.,
"On the Primal Feasibility in Dual Decomposition Methods Under Additive and Bounded Errors,"
IEEE Transactions on Signal Processing, vol. 71, pp. 655-669, 2023.
[9]
F. Tutuncuoglu, S. Josilo and G. Dán,
"Online Learning for Rate-Adaptive Task Offloading Under Latency Constraints in Serverless Edge Computing,"
IEEE/ACM Transactions on Networking, vol. 31, no. 2, pp. 695-709, 2023.
[10]
F. Heiding et al.,
"Penetration testing of connected households,"
Computers & security (Print), vol. 126, 2023.
[11]
F. Heiding, S. Katsikeas and R. Lagerström,
"Research communities in cyber security vulnerability assessments : A comprehensive literature review,"
Computer Science Review, vol. 48, 2023.
[12]
R. M. Tsoupidi et al.,
"Securing Optimized Code Against Power Side Channels,"
in 36th IEEE Computer Security Foundations Symposium, 2023.
[13]
K. Oztoprak, Y. K. Tuncel and I. Butun,
"Technological Transformation of Telco Operators towards Seamless IoT Edge-Cloud Continuum,"
Sensors, vol. 23, no. 2, pp. 1004, 2023.
[14]
M. Seidi et al.,
"A Novel Demixing Algorithm for Joint Target Detection and Impulsive Noise Suppression,"
IEEE Communications Letters, vol. 26, no. 11, pp. 2750-2754, 2022.
[15]
L. Varawala et al.,
"A Scalable Formulation for Look-Ahead Security-Constrained Optimal Power Flow,"
IEEE Transactions on Control of Network Systems, vol. 9, no. 1, pp. 138-150, 2022.
[16]
K. Hammar and R. Stadler,
"A System for Interactive Examination of Learned Security Policies,"
in Proceedings of the IEEE/IFIP Network Operations and Management Symposium 2022 : Network and Service Management in the Era of Cloudification, Softwarization and Artificial Intelligence, NOMS 2022, 2022.
[17]
Y. Kim and G. Dán,
"An Active Learning Approach to Dynamic Alert Prioritization for Real-time Situational Awareness,"
in 2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2022, pp. 154-162.
[18]
G. P. Koudouridis, Q. He and G. Dán,
"An architecture and performance evaluation framework for artificial intelligence solutions in beyond 5G radio access networks,"
EURASIP Journal on Wireless Communications and Networking, vol. 2022, no. 1, 2022.
[19]
K. Hammar and R. Stadler,
"An Online Framework for Adapting Security Policies in Dynamic IT Environments,"
in 2022 18Th International Conference On Network And Service Management (CNSM 2022) : INTELLIGENT MANAGEMENT OF DISRUPTIVE NETWORK TECHNOLOGIES AND SERVICES, 2022.
[20]
E. Poorhadi, E. Troubitsyna and G. Dán,
"Analysing the Impact of Security Attacks on Safety Using SysML and Event-B,"
in MODEL-BASED SAFETY AND ASSESSMENT, IMBSA 2022, 2022, pp. 170-185.
[21]
V. Engström et al.,
"Automated Security Assessments of Amazon Web Service Environments,"
ACM Transactions on Privacy and Security, vol. 26, no. 2, pp. 1-31, 2022.
[22]
L. Islami, S. Fischer-Huebner and P. Papadimitratos,
"Capturing drivers' privacy preferences for intelligent transportation systems : An intercultural perspective,"
Computers & security (Print), vol. 123, pp. 102913, 2022.
[23]
R. Du, T. O. Timoudas and C. Fischione,
"Comparing Backscatter Communication and Energy Harvesting in Massive IoT Networks,"
IEEE Transactions on Wireless Communications, vol. 21, no. 1, pp. 429-443, 2022.
[24]
P. Fahlander et al.,
"Containment Strategy Formalism in a Probabilistic Threat Modelling Framework,"
in Proceedings of the 8th international conference on information systems security and privacy (ICISSP), 2022, pp. 108-120.
[25]
W. Xiong et al.,
"Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix,"
Software and Systems Modeling, vol. 21, no. 1, pp. 157-177, 2022.
[26]
J. Nyberg, P. Johnson and A. Mehes,
"Cyber threat response using reinforcement learning in graph-based attack simulations,"
in Proceedings of the IEEE/IFIP Network Operations and Management Symposium 2022 : Network and Service Management in the Era of Cloudification, Softwarization and Artificial Intelligence, NOMS 2022, 2022.
[27]
K. Tan et al.,
"Decentralized Convex Optimization for Joint Task Offloading and Resource Allocation of Vehicular Edge Computing Systems,"
IEEE Transactions on Vehicular Technology, pp. 1-15, 2022.
[28]
J. B. Rydell, O. Otterlind and I. Butun,
"Delay Considerations for Reliable Communications in LoRaWAN,"
in Proceedings - IEEE Consumer Communications and Networking Conference, CCNC, 2022.
[29]
E. Shereen, R. Ramakrishna and G. Dán,
"Detection and Localization of PMU Time Synchronization Attacks via Graph Signal Processing,"
IEEE Transactions on Smart Grid, vol. 13, no. 4, pp. 3241-3254, 2022.
[30]
O. Kraft et al.,
"Development and Implementation of a Holistic Flexibility Market Architecture,"
in 2022 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2022, 2022.
[31]
M. Cucuzzella et al.,
"Distributed Control of DC Grids : Integrating Prosumers' Motives,"
IEEE Transactions on Power Systems, vol. 37, no. 4, pp. 3299-3310, 2022.
[32]
S. S. Saha et al.,
"Distribution Systems AC State Estimation via Sparse AMI Data Using Graph Signal Processing,"
IEEE Transactions on Smart Grid, vol. 13, no. 5, pp. 3636-3649, 2022.
[33]
F. S. Samani and R. Stadler,
"Dynamically meeting performance objectives for multiple services on a service mesh,"
in 2022 18TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM 2022) : INTELLIGENT MANAGEMENT OF DISRUPTIVE NETWORK TECHNOLOGIES AND SERVICES, 2022, pp. 219-225.
[34]
A. Mohamed et al.,
"Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks,"
Sensors, vol. 22, no. 9, pp. 3498, 2022.
[35]
E. Rencelj Ling and M. Ekstedt,
"Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities,"
in Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, 2022, pp. 96-107.
[36]
S. Kant et al.,
"EVM Mitigation with PAPR and ACLR Constraints in Large-Scale MIMO-OFDM Using TOP-ADMM,"
IEEE Transactions on Wireless Communications, pp. 1-1, 2022.
[37]
S. Kant et al.,
"Federated Learning Using Three-Operator ADMM,"
IEEE Journal on Selected Topics in Signal Processing, pp. 1-16, 2022.
[38]
H. Sasahara et al.,
"Green Routing Game : Strategic Logistical Planning using Mixed Fleets of ICEVs and EVs,"
in 2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, pp. 6358-6363.
[39]
K. Hammar and R. Stadler,
"Intrusion Prevention Through Optimal Stopping,"
IEEE Transactions on Network and Service Management, vol. 19, no. 3, pp. 2333-2348, 2022.
[40]
S. Josilo and G. Dán,
"Joint Wireless and Edge Computing Resource Management With Dynamic Network Slice Selection,"
IEEE/ACM Transactions on Networking, vol. 30, no. 4, pp. 1865-1878, 2022.
[41]
D. P. Sousa et al.,
"Leakage Detection In Water Distribution Networks : Efficient Training By Data Clustering,"
in IWA World Water Congress & Exhibition, Sep. 2022, 2022.
[42]
M. Khelifi and I. Butun,
"Localization in Unprecedentedly Crowded Airspace for UAVs and SUAVs,"
IEEE Access, vol. 10, pp. 65206-65220, 2022.
[43]
P. Park, P. Di Marco and C. Fischione,
"Optimized Over-the-Air Computation for Wireless Control Systems,"
IEEE Communications Letters, vol. 26, no. 2, pp. 424-428, 2022.
[44]
J. Kang et al.,
"Optimized Switching Between Sensing and Communication for mmWave MU-MISO Systems,"
in 2022 Ieee International Conference On Communications Workshops (Icc Workshops), 2022, pp. 498-503.
[45]
M. Zeng and V. Fodor,
"Parallel Processing at the Edge in Dense Wireless Networks,"
IEEE Open Journal of the Communications Society, vol. 3, pp. 1-14, 2022.
[46]
E. Süren et al.,
"PatrIoT : practical and agile threat research for IoT,"
International Journal of Information Security, 2022.
[47]
K. Zhang, E. G. Larsson and P. Papadimitratos,
"Protecting GNSS Open Service Navigation Message Authentication Against Distance-Decreasing Attacks,"
IEEE Transactions on Aerospace and Electronic Systems, vol. 58, no. 2, pp. 1224-1240, 2022.
[48]
E. Rencelj Ling et al.,
"Securing Communication and Identifying Threats in RTUs : A Vulnerability Analysis,"
in ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022.
[49]
J. E. Urrea Cabus, I. Butun and R. Lagerström,
"Security Considerations for Remote Terminal Units,"
in 2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC), May 25-26 2022, Novi Sad, Serbia, 2022.
[50]
W. Widel, P. Mukherjee and M. Ekstedt,
"Security Countermeasures Selection Using the Meta Attack Language and Probabilistic Attack Graphs,"
IEEE Access, vol. 10, pp. 89645-89662, 2022.