Popular Science Videos and Talks
Selected Talks
CDC 2023 Workshop on “Control, Game, and Learning Theory for Security and Privacy” (link). Title of the talk: “Risk Management and Game Theory for Securing Control Systems” (slides)
DISC Summer School 2022. “Security Metrics for Control Systems” (slides)
Research Seminar at the UU/IT Cyber Security Arena, Dec. 08, 2020.
Guest speaker at Riskförmidag I Uppsala 2020, organised by Riskkolegiet, Dec. 03, 2020. “Cybersecurity in Industrial Control Systems” (slides)
Invited Plenary Talk at SysTol 2019 (4th International Conference on Control and Fault-Tolerant Systems), Sep. 18–20, 2019. (slides)
Publications
Google Scholar page
ORCID: 0000-0001-5491-4068
Book Chapters
[BC4] | R. M. G. Ferrari and A. M. H. Teixeira, “Detection of cyber-attacks: A multiplicative watermarking scheme,” in Safety, Security and Privacy for Cyber-Physical Systems, R. M. Ferrari and A. M. H. Teixeira, Eds. Cham: Springer International Publishing, 2021. (pdf) |
[BC3] | A. M. H. Teixeira, “Security metrics for control systems,” in Safety, Security and Privacy for Cyber-Physical Systems, R. M. Ferrari and A. M. H. Teixeira, Eds. Cham: Springer International Publishing, 2021. (pdf) |
[BC2] | R. M. G. Ferrari and A. M. H. Teixeira, “Introduction to the book,” in Safety, Security and Privacy for Cyber-Physical Systems, R. M. Ferrari and A. M. H. Teixeira, Eds. Cham: Springer International Publishing, 2021. |
[BC1] | A. M. H. Teixeira, Friederich Kupzog, H. Sandberg, and K. H. Johansson. “Cyber-Secure and Resilient Architectures for Industrial Control Systems”. In Florian Skopik and Paul Smith, editors, Smart Grid Security Innovative Solutions for a Modernized Grid. Elsevier Science Publishing Co Inc, 2015. |
|
Journal Papers
[SJ3] | F. E. Tosun, A. M. H. Teixeira, J. Dong, A. Ahlén, S. Dey. “Kullback-Liebler Divergence-Based ObserverDesign Against Sensor Bias Injection Attacks”. Submitted, 2024. |
[SJ2] | A. J. Gallo, S. C. Anand, A. M. H. Teixeira, R. M. G. Ferrari. “Switching Multiplicative Watermark design against Covert Attack”. Submitted, 2024. |
[SJ1] | A. T. Nguyen, A. M. H. Teixeira, A. Medvedev. “Security Allocation in Networked Control Systems under Stealthy Attacks”. Submitted, 2023. (arXiv)
|
[J25] | F. E. Tosun, A. M. H. Teixeira, M. Abdalmoaty, A. Ahlén, S. Dey. “Quickest Detection of Bias Injection Attacks on the Glucose Sensor in the Artificial Pancreas Under Meal Disturbances”. Journal of Process Control, vol. 153, no. 103162, March 2024. (DOI, Open Access) |
[J24] | S. C. Anand, A. M. H. Teixeira, A. Ahlén. “Risk Assessment of Stealthy Attacks on Uncertain Control Systems”. IEEE Transactions in Automatic Control, vol. 69, no. 5, pp. 3214-3221, May 2024. (DOI) (arXiv) |
[J23] | S. C. Anand, A. M. H. Teixeira. “Risk-based Security Measure Allocation Against Actuator Attacks”. IEEE Open Journal of Control Systems, vol. 2, pp. 297-309, August 2023. (arXiv) (DOI, Open Access) |
[J22] | A. Naha, A. M. H. Teixeira, A. Ahlén, S. Dey. “Quickest Detection of Deception Attacks on Cyber-Physical Systems with a Parsimonious Watermarking Policy”. Automatica, vol. 155, no. 111147, September 2023. (DOI) (arXiv) |
[J21] | S. Chockalingam, W. Pieters, A. Teixeira, P. van Gelder. “Probability Elicitation for Bayesian Networks to Distinguish between Intentional Attacks and Accidental Technical Failures”. Journal of Information Security and Applications, 2023. (Open Access) |
[J20] | A. Naha, A. M. H. Teixeira, A. Ahlén, S. Dey. “Quickest Physical Watermarking-Based Detection of Measurement Replacement Attacks in Networked Control Systems”. European Journal of Control, vol. 71, no. 100804, May 2023. (DOI, Open Access) |
[J19] | Q. Zhang, K. Liu, A. M. H. Teixeira, Y. Li, S. Chai, and Y. Xia. “An Online Kullback-Leibler Divergence-Based Stealthy Attack against Cyber-Physical Systems”. IEEE Transactions in Automatic Control, vol. 68, no. 6, pp. 3672-3679, June 2023, (pdf) (DOI) |
[J18] | A. Naha, A. M. H. Teixeira, A. Ahlén, S. Dey. “Sequential detection of replay attacks”. IEEE Transactions on Automatic Control, vol. 68, no. 3, pp. 1941-1948, March 2023, (DOI) (pdf) |
[J17] | S. Chockalingam, W. Pieters, A. Teixeira, P. van Gelder. “Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates”. Cybersecurity, vol. 4, no. 29, 2021. (DOI, Open Access) |
[J16] | V. Rostampour, R. M. G. Ferrari, A. M. H. Teixeira, T. Keviczky. “Privatized Distributed Anomaly Detection for Large-Scale Nonlinear Uncertain Systems”. IEEE Transactions on Automatic Control, vol. 66, no. 11, pp. 5299-5313, Nov. 2021. (DOI) |
[J15] | R. Ferrari, A. M. H. Teixeira. “A Switching Multiplicative Watermarking Scheme for Detection of Stealthy Cyber-Attacks”. IEEE Transactions on Automatic Control, vol. 66, no. 6, pp. 2558-2573, June 2021. DOI: 10.1109/TAC.2020.3013850 (pdf) |
[J14] | J. Milosevic, A. M. H. Teixeira, H. Sandberg, K. H. Johansson. “Actuator Security Indices Based on Perfect Undetectability: Computation, Robustness, and Sensor Placement”. IEEE Transactions on Automatic Control, vol. 65, no. 9, pp. 3816–3831, 2020. (arxiv) |
[J13] | S. Knorn, A. M. H. Teixeira. “Effects of Jamming Attacks on a Control System With Energy Harvesting”. IEEE Control Systems Letters, vol. 3, no. 4, pp. 829–834, 2019. DOI: 10.1109/LCSYS.2019.2919426 (pdf) |
[J12] | J. Milosevic, A. M. H. Teixeira, T. Tanaka, K. H. Johansson, H. Sandberg. “Security Measure Allocation for Industrial Control Systems: Exploiting Systematic Search Techniques and Submodularity”. International Journal of Robust and Nonlinear Control 3(1):4278-4302, Jul. 2020. (DOI) |
[J11] | K. Pan, A. M. H. Teixeira, M. Cvetkovic, and P. Palensky. “Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation”. IEEE Transactions on Smart Grids 10(3):3044-3056, May 2019. (DOI) (pdf) |
[J10] | A. M. H. Teixeira, J. Araújo, H. Sandberg, and K. H. Johansson. “Distributed sensor and actuator reconfiguration for fault-tolerant networked control systems”. IEEE Transactions on Control of Network Systems 5(4):1517-1528, Dec. 2018. (DOI) |
[J9] | F. Farokhi, A. M. H. Teixeira, C. Langbort. “Estimation with Strategic Sensors”. IEEE Transactions on Automatic Control, vol. 62, no. 1, pp. 724-739, Feb. 2017. (arXiv) |
[J8] | A. M. H. Teixeira, E. Ghadimi, I. Shames, H. Sandberg, and M. Johansson. “The ADMM Algorithm for Distributed Quadratic Problems: Parameter Selection and Constraint Preconditioning.”. IEEE Transactions on Signal Processing, 64(2):290–305, 2016. (arXiv) |
[J7] | A. M. H. Teixeira, K. C. Sou, H. Sandberg, and K. H. Johansson. “Secure Control Systems: A Quantitative Risk Management Approach”. IEEE Control System Magazine, vol. 35, no. 1, pp. 24-25, Feb. 2015. (DOI) |
[J6] | E. Ghadimi, A. M. H. Teixeira, I. Shames, and M. Johansson. “Optimal parameter selection for the alternating direction method of multipliers (ADMM): quadratic problems”. IEEE Transactions on Automatic Control, vol. 60, no. 3, pp. 644-658, Mar. 2015. (DOI). (arXiv) |
[J5] | A. M. H. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson. “A Secure Control Framework for Resource-Limited Adversaries”. Automatica, vol. 51, pp. 135-148, Jan. 2015. (DOI) (arXiv) |
[J4] | A. M. H. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson. “Distributed Fault Detection and Isolation Resilient to Network Model Uncertainties”. IEEE Transactions on Cybernetics: Special Issue on “Resilient Control Architectures and Systems”, vol. 44, no. 11, pp. 2024-2037, Nov. 2014. (DOI) |
[J3] | I. Shames, A. M. H. Teixeira, H. Sandberg, and K. H. Johansson. “Fault Detection and Mitigation in Kirchhoff Networks”. IEEE Signal Processing Letters, vol. 19, no. 11, pp. 749-752, Nov. 2012. (pdf) |
[J2] | I. Shames, A. M. H. Teixeira, H. Sandberg, and K. H. Johansson. “Agents Misbehaving in a Network: a Vice or a Virtue?”. IEEE Network Magazine, vol. 26, no. 3, pp. 35-40, May - June, 2012. (pdf) |
[J1] | I. Shames, A. M. H. Teixeira, H. Sandberg, and K. H. Johansson, “Distributed Fault Detection for Interconnected Systems”. Automatica, vol. 47, no. 12, pp. 2757-2764, 2011. (pdf)
|
Conference Papers
[C71] | A. T. Nguyen, A. Hertzberg, A. M. H. Teixeira. “Centrality-based Security Allocation in Networked Control Systems”. The 19th International Conference on Critical Information Infrastructures Security, Rome, Italy, 2024. (Accepted). |
[C70] | S. C. Anand, M. S. Chong, A. M. H. Teixeira. “Data-Driven Identification of Attack-free Sensors in Networked Control Systems”. Symposium on Systems Theory in Data and Optimization, 2024. (Accepted) |
[C69] | R. Seifullaev, A. M. H. Teixeira, A. Ahlén. “Event-triggered control of nonlinear systems under deception and Denial-of-Service attacks”. IEEE Conference on Decisions and Control (CDC), 2024. (Accepted) |
[C68] | S. C. Anand, C. Grussler, A. M. H. Teixeira. “Scalable metrics to quantify security of large-scale systems”. IEEE Conference on Decisions and Control (CDC), 2024. (Accepted) |
[C67] | Z. Sun, A. M. H. Teixeira, S. Toor. “GNN-IDS: Graph Neural Network based Intrusion Detection System”. In Proc. The International Conference on Availability, Reliability and Security (ARES) 2024. |
[C66] | D. Arnström, A. M. H. Teixeira. “Stealthy Deactivation of Safety Filters”. In Proc. European Control Conference 2024. |
[C65] | T. Wigren, A. M. H. Teixeira. “Delay Attack and Detection in Feedback Linearized Control Systems”. In Proc. European Control Conference 2024. |
[C64] | F. E. Tosun, A. M. H. Teixeira, A. Ahlén, S. Dey. “Kullback-Leibler Divergence-Based Detector Design Against Bias Injection Attacks in an Artificial Pancreas System”. In Proc. 12th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes (SafeProcess), Ferarra, Italy, 2024. |
[C63] | G. Ramos, A. M. H. Teixeira, S. Pequito. “On the trade-offs between accuracy, privacy, and resilience in average consensus algorithms”. In Proc. IEEE Conference on Decisions and Control (CDC), 2023. |
[C62] | F. E. Tosun, A. M. H. Teixeira. “Robust Sequential Detection of Non-stealthy Sensor Deception Attacks in an Artificial Pancreas System”. In Proc. IEEE Conference on Decisions and Control (CDC), 2023. |
[C61] | Z. Li, A. T. Nguyen, A. M. H. Teixeira, Y. Mo, K. H. Johansson. “Secure State Estimation with Asynchronous Measurements against Malicious Measurement-data and Time-stamp Manipulation”. In Proc. IEEE Conference on Decisions and Control (CDC), 2023. (arXiv) |
[C60] | T. Wigren, A. M. H. Teixeira. “Feedback Path Delay Attacks and Detection”. In Proc. IEEE Conference on Decisions and Control (CDC), 2023. |
[C59] | M. Abdalmoaty, S. C. Anand, A. M. H. Teixeira. “Privacy and Security in Network Controlled Systems via Dynamic Masking ”. In Proc. IFAC World Congress 2023. (arXiv) |
[C58] | A. T. Nguyen, S. C. Anand, A. M. H. Teixeira, A. Medvedev. “Optimal Detector Placement in Networked Control Systems under Cyber-attacks with Applications to Power Networks”. In Proc. IFAC World Congress 2023. (arXiv) |
[C57] | T. Wigren, A. M. H. Teixeira. “On-line Identification of Delay Attacks in Networked Servo Control”. In Proc. IFAC World Congress 2023. |
[C56] | A. Naha, A. M. H. Teixeira, A. Ahlén, S. Dey. “Structural analyses of a parsimonious watermarking policy for data deception attack detection in networked control systems”. In Proc. IEEE Conference on Decisions and Control (CDC), 2022. (pdf) |
[C55] | A. T. Nguyen, S. C. Anand, A. M. H. Teixeira. “A Zero-Sum Game Framework for Optimal Sensor Placement in Uncertain Networked Control Systems under Cyber-Attacks”. In Proc. IEEE Conference on Decisions and Control (CDC), 2022. (arXiv) (pdf) |
[C54] | S. C. Anand, A. M. H. Teixeira, A. Ahlén. “Risk assessment and optimal allocation of security measures under stealthy false data injection attacks”. In Proc. Conference on Control Technology and Applications (CCTA), 2022. (pdf) |
[C53] | A. T. Nguyen, A. M. H. Teixeira, A. Medvedev. “A Single-Adversary-Single-Detector Zero-Sum Game in Networked Control Systems”. In Proc. IFAC Conference on Networked Systems (NecSys), 2022. (arXiv) (pdf) |
[C52] | F. E. Tosun, A. M. H. Teixeira, A. Ahlén, S. Dey. “Detection of Bias Injection Attacks on the Glucose Sensor in the Artificial Pancreas Under Meal Disturbance”. In Proc. American Control Conference, 2022. (pdf) |
[C51] | A. Naha, A. M. H. Teixeira, A. Ahlén, S. Dey. “Sequential Detection of Replay Attacks with a Parsimonious Watermarking Policy”. In Proc. American Control Conference, 2022. (pdf) |
[C50] | S. C. Anand, A. M. H. Teixeira. “Risk-averse controller design against data injection attacks on actuators for uncertain control systems”. In Proc. American Control Conference, 2022. (pdf) |
[C49] | A. J. Gallo, S. C. Anand, A. M. H. Teixeira, R. M. G. Ferrari. “Design of multiplicative watermarking against covert attacks”. In Proc. IEEE Conf. on Decisions and Control, Austin, Texas, USA, 2021. (arXiv) |
[C48] | S. C. Anand, A. M. H. Teixeira. “Stealthy Cyber-Attack Design Using Dynamic Programming”. In Proc. IEEE Conf. on Decisions and Control, Austin, Texas, USA, 2021. (arXiv) |
[C47] | A. Naha, A. M. H. Teixeira, A. Ahlén, S. Dey. “Deception Attack Detection Using Reduced Watermarking”. In Proc. European Control Conference, Rotterdam, The Netherlands, June 2021. (pdf) |
[C46] | A. Arghavani, A. M. H. Teixeira, A. Ahlén, S. Dey. “A Game-theoretic Approach to Covert Communications in the Presence of Multiple Colluding Wardens”. In Proc. IEEE Wireless Communications and Networking Conference, Nanjing, China, Mar. 2021. (pdf) |
[C45] | S.C. Anand and A. M. H. Teixeira. “Joint controller and detector design against data injection attacks on actuators”. In Proc. IFAC World Congress, Berlin, Germany, Jul. 2020. (pdf) |
[C44] | S. Hylamia, W. Yan, A. M. H. Teixeira, N.B. Asan, M. Perez, R. Augustine and T. Voigt. “Privacy-preserving Continuous Tumour Relapse Monitoring Using In-body Radio Signals”. In IEEE Workshop on the Internet of Safe Things (SafeThings). San Francisco, May 2020. (pdf) |
[C43] | A. M. H. Teixeira. “Optimal stealthy attacks on actuators for strictly proper systems”. In Proc. Conf. Decision and Control (CDC), Nice, France, 2019. (pdf) |
[C42] | M. S. Chong, H. Sandberg, and A. M. H. Teixeira. “A Tutorial Introduction to Security and Privacy for Cyber-Physical Systems”. In Proc. European Control Conference, Napoles, Italy, 2019. (pdf) |
[C41] | A. M. H. Teixeira. “Data Injection Attacks against Feedforward Controllers”. In Proc. European Control Conference, Napoles, Italy, 2019. (pdf) |
[C40] | D. Umsonst, E. Nekouei, A. M. H. Teixeira, H. Sandberg. “On the Confidentiality of Linear Anomaly Detector States”. In Proc. American Control Conference, Philadelphia, PA, USA, 2019. (pdf) |
[C39] | A. M. H. Teixeira, R. Ferrari. “Detection of Sensor Data Injection Attacks with Multiplicative Watermarking”. In Proc. European Control Conference, Cyprus, 2018. (pdf) |
[C38] | V. Rostampour, R. M.G. Ferrari, A. M. H. Teixeira, T. Keviczky. “Differentially-Private Distributed Fault Diagnosis for Large-Scale Nonlinear Uncertain Systems”. In Proc. 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, Poland, 2018. Finalist for the Paul M. Frank Award DOI: 10.1016/j.ifacol.2018.09.703 (pdf) |
[C37] | S. Chockalingam, W. Pieters, A. M. H. Teixeira, N. Khakzad, and P. van Gelder. “Combining Bayesian Networks and Fishbone Diagrams to Distinguish between Intentional Attacks and Accidental Technical Failures”. In Proc. 5th Int. Workshop on Graphical Models for Security, Oxford, UK, 2018. |
[C36] | R. Ferrari, A. M. H. Teixeira. “Detection and Isolation of Replay Attacks through Sensor Watermarking”. In Proc. 20th IFAC World Congress, Toulouse, France, 2017. DOI: 10.1016/j.ifacol.2017.08.1502 |
[C35] | M. Ma, A. M. H. Teixeira, J. van den Berg, and P. Palensky. “Voltage Control in Distributed Generation under Measurement Falsification Attacks”. In Proce. 20th IFAC World Congress, Toulouse, France, 2017. DOI: 10.1016/j.ifacol.2017.08.1562 |
[C34] | R. Ferrari, A. M. H. Teixeira. “Detection and Isolation of Routing Attacks through Sensor Watermarking”. In Proc. American Control Conference, Seattle, WA, USA, 2017. DOI: 10.23919/ACC.2017.7963800 |
[C33] | S. Chockalingam, W. Pieters, A. M. H. Teixeira, and P. van Gelder. “Bayesian Network Models in Cyber Security: A Systematic Review”. In Proc. Nordic Conference on Secure IT Systems (NordSec), Tartu, Estonia, 2017. |
[C32] | K. Pan, A. M. H. Teixeira, M. Cvetkovic, and P. Palensky. “Data attacks on power system state estimation: Limited adversarial knowledge vs. limited attack resources”. In Proc. 43rd Annual Conf. IEEE Industrial Electronics Society (IECON), Beijing, China, 2017. |
[C31] | K. Pan, A. M. H. Teixeira, C. Lopez, and P. Palensky. “Co-simulation for cyber security analysis: Data attacks against Energy Management System”. In Proc. 8th IEEE Int. Conf. on Smart Grid Communications (SmartGridComm), Dresden, Germany, 2017. |
[C30] | K. Pan, A. M. H. Teixeira, M. Cvetkovic, and P. Palensky. “Combined data integrity and availability attacks on state estimation in cyber-physical power grids”. In Proc. 7th IEEE Int. Conf. on Smart Grid Communications (SmartGridComm), Sydney, Australia, 2016. |
[C29] | L. Fichtner, W. Pieters, and A. M. H. Teixeira. “Cybersecurity as a Politikum: implications of security discourses for infrastructures”. In Proc. 2016 New Security Paradigms Workshop (NSPW’16), Granby, CO, USA, 2016. |
[C28] | S. Chockalingam, D. Hadziosmanovic, W. Pieters, A. M. H. Teixeira, and P. van Gelder. “Integrated safety and security risk assessment methods: a survey of key characteristics and applications”. In Proc. 11th International Conference on Critical Information Infrastructures Security (CRITIS), Paris, France, 2016. Finalist for the CIPRNET Young CRITIS Award (CYCA) - 2016. |
[C27] | Y. Wang, Y. Tian, A. M. H. Teixeira, J. Hulstijn, and Y.H. Tan. “Fault detection and diagnosis for compliance monitoring in international supply chains”. In Proc. 22nd Americas Conference On Information Systems (AMCIS), San Diego, CA, USA, 2016. |
[C26] | H. Sandberg and A. M. H. Teixeira. “From control system security indices to attack identifiability”. In Proc. 2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS), Vienna, Austria, 2016. |
[C25] | K. Paridari, A. E. D. Mady, S. La Porta, R. Chabukswar, J. Blanco, A. M. H. Teixeira, H. Sandberg, and M. Boubekeur. “Cyber-physical-security Framework for building energy management system”. In Proc. of the ACMIEEE 7th International Conference on Cyber-Physical Systems (ICCPS), Vienna, Austria, 2016 |
[C24] | A. M. H. Teixeira, H. Sandberg, and K. H. Johansson. “Strategic Stealthy Attacks: the output-to-output l2-gain”. In Proc. 54th IEEE Conference on Decision and Control, Osaka, Japan, 2015. DOI: 10.1109/CDC.2015.7402605 |
[C23] | A. M. H. Teixeira, K. Paridari, H. Sandberg, and K. H. Johansson. “Voltage control for interconnected microgrids under adversarial actions”. In Proc. 20th IEEE International Conference on Emerging Technologies and Factory Automation, Luxembourg, 2015. Special session on “Secure and Resilient Industrial Automation and Control Systems”. |
[C22] | E. Ghadimi, A. M. H. Teixeira, M. Rabbat, and M. Johansson. “The ADMM algorithm for distributed averaging: convergence rates and optimal parameter selection”. In Proc. 48th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 2014. |
[C21] | M. Juelsgaard, A. M. H. Teixeira, M. Johansson, R. Wisniewski, J. Bendtsen. “Distributed Coordination of Household Electricity Consumption”. In Proc. IEEE Conference on Control Applications, NiceAntibes, France, Oct. 2014. Best Student-Paper Award. (pdf) |
[C20] | J. Araújo, A. M. H. Teixeira, E. Henriksson, K. H. Johansson. “A down-sampled controller to reduce network usage with guaranteed closed-loop performance”. In Proc. 53rd IEEE Conference on Decision and Control, Los Angeles, CA, 2014. |
[C19] | A. M. H. Teixeira, G. Dán, H. Sandberg, R. Berthier, R. Bobba, A. Valdes. “Security of Smart Distribution Grids: Data Integrity Attacks on Integrated Volt/VAR Control and Countermeasures”. In Proc. American Control Conference, Portland, OR, 2014. (pdf) |
[C18] | F. Farokhi, A. M. H. Teixeira, C. Langbort, “Gaussian Cheap Talk Game with Quadratic Cost Functions: When Herding Between Strategic Senders is a Virtue”. In Proc. American Control Conference, Portland, OR, 2014. (arXiv) |
[C17] | A. M. H. Teixeira, K. C. Sou, H. Sandberg, and K. H. Johansson. “Quantifying Cyber-Security for Networked Control Systems” in Control of Cyber-Physical Systems, pp. 123-142, Springer International Publishing, 2013. (pdf) (slides) |
[C16] | A. M. H. Teixeira, E. Ghadimi, I. Shames, H. Sandberg, and M. Johansson. “Optimal scaling of the ADMM algorithm for distributed quadratic programming”. In Proc. 52nd IEEE Conference on Decision and Control, Florence, Italy, 2013. (arXiv) |
[C15] | A. M. H. Teixeira, J. Araújo, H. Sandberg, and K. H. Johansson. “Distributed actuator reconfiguration in networked control systems”. In Proc. 4th IFAC Workshop on Distributed Estimation and Control in Networked Systems (NecSys), Koblenz, Germany, 2013. |
[C14] | A. M. H. Teixeira, D. Pérez, H. Sandberg, and K. H. Johansson. “Attack models and scenarios for networked control systems”. In Proc. 1st International Conference on High Confidence Networked Systems, CPSWeek 2012, Beijing, China, 2012. Listed as “Notable Computing Books and Articles of 2012” by ACM (pdf), (slides) |
[C13] | A. M. H. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, “Revealing Stealthy Attacks in Control Systems”. In Proc. 50th Annual Allerton Conference on Communication, Control, and Computing, Allerton, IL, USA, 2012. (pdf), (slides) |
[C12] | I. Shames, A. M. H. Teixeira, H. Sandberg, and K. H. Johansson. “Distributed Fault Detection and Isolation with Imprecise Network Models”. In Proc. American Control Conference, Montreal, Canada, 2012. (pdf), (slides) |
[C11] | E. Ghadimi, A. M. H. Teixeira, I. Shames, and M. Johansson. “On the Optimal Step-size Selection for the Alternating Direction Method of Multipliers”. In Proc. 3rd IFAC Workshop on Distributed Estimation and Control in Networked Systems (NecSys), Santa Barbara, CA, USA, 2012. Best Student Paper Award Finalist (pdf) |
[C10] | A. M. H. Teixeira, H. Sandberg, G. Dán, and K. H. Johansson. “Optimal Power Flow: Closing the Loop over Corrupted Data”. In Proc. American Control Conference, Montreal, Canada, 2012. (pdf), (slides) |
[C9] | G. Andersson, P. Esfahani, M. Vrakopoulou, K. Margellos, J. Lygeros, A. M. H. Teixeira, G. Dán, H. Sandberg, K. H. Johansson. “Cyber-security of SCADA systems”. Innovative Smart Grid Technologies (ISGT), IEEE PES, Washington DC, 2012. (pdf) |
[C8] | A. M. H. Teixeira, G. Dán, H. Sandberg, and K. H. Johansson. “Cyber security study of a SCADA energy management system: stealthy deception attacks on the state estimator”. IFAC WC, Milan, Italy, 2011. (pdf), (slides) |
[C7] | J. Anderson, A. M. H. Teixeira, H. Sandberg and A. Papachristodoulou. “Dynamical System Decomposition Using Dissipation Inequalities”. In Proc. 50th IEEE Conference on Decision and Control and European Control Conference, Orlando, FL, 2011. (pdf) |
[C6] | J. Lycke, K. Hansson, A. Khakulov, E. Ringh, F. Svensson, I. Tjernberg, A. Alam, J. Araujo, F.Farokhi, E. Gadhimi, A. M. H. Teixeira, D. V. Dimarogonas, M. Larsson, J. Lindberg, and K. H.Johansson. “Toward an indoor testbed for mobile networked control systems”. In Proc. of the First Workshop on Research, Development and Education on Unmanned Aerial Systems, Seville, Spain, 2011. |
[C5] | A. M. H. Teixeira, S. Amin, H. Sandberg, K. H. Johansson, and S. Sastry. “Cyber security analysis of state estimators in electric power systems”. In Proceedings of the 49th IEEE Conference on Decisions and Control, Atlanta, GA, USA, 2010. (pdf), (slides) |
[C4] | I. Shames, A. M. H. Teixeira, H. Sandberg, and K. H. Johansson. “Distributed leader selection without direct inter-agent communication”. In Proc. 1st IFAC Workshop on Distributed Estimation and Control in Networked Systems (NECSYS), Annecy, France, 2010. (pdf) |
[C3] | I. Shames, A. M. H. Teixeira, H. Sandberg, and K. H. Johansson. “Distributed fault detection for interconnected second-order systems with applications to power networks”. First Workshop on Secure Control Systems, Stockholm, Sweden, 2010. (pdf) |
[C2] | H. Sandberg, A. M. H. Teixeira, and K. H. Johansson. “On security indices for state estimators in power networks”. First Workshop on Secure Control Systems, Stockholm, Sweden, 2010. (pdf) |
[C1] | A. M. H. Teixeira, H. Sandberg, and K. H. Johansson. “Networked control systems under cyber attacks with applications to power networks”. In Proceedings of the American Control Conference, Baltimore, MD, USA, 2010. (pdf), (slides) |
|
Pedagogical Conference Papers
[PC3] | A. M. H. Teixeira, A. O. P. D. C. Guerra, S. Knorn, K.Staffas, D. Varagnolo. “Computer-aided curriculum analysis and design: existing challenges and open research directions”. 2020 IEEE Frontiers in Education Conference (FIE), Uppsala, Sweden, 2020. |
[PC2] | K. Staffas, S. Knorn, A. O. P. D. C. Guerra, D. Varagnolo, A. M. H. Teixeira. “Using different taxonomies to formulate learning outcomes to innovate engineering curriculum towards PBL: perspectives from engineering educators”. In 8th International Research Symposium on PBL, Aalborg, Denmark, 2020. |
[PC1] | E. Fjällström, K. Atta, S. Knorn, F. Sandin, G. Sas, K. Staffas, A. M. H. Teixeira, and D. Varagnolo. “Creating a quantitative basis for course and program development in higher education - a report from field tests”. In Proc. 7th Development Conf. for Swedish Engineering Education, Luleå, Sweden, 2019. |
|
Thesis
[T2] | A. M. H. Teixeira. “Toward Cyber-Secure and Resilient Networked Control Systems”. Doctoral thesis, KTH Royal Institute of Technology, Stockholm, Sweden, November 2014. (pdf) |
[T1] | A. M. H. Teixeira. “Toward Secure and Reliable Networked Control Systems”. Licentiate thesis, KTH Royal Institute of Technology, Stockholm, Sweden, December 2011. (pdf)
|
|