
2021 Fourth International Conference on Connected
and Autonomous Driving (MetroCAD), pages 62–70.
IEEE.
Kumar, N., Lolla, V. N., Keogh, E. J., Lonardi, S., and
Ratanamahatana, C. (2005). Time-series bitmaps: a
practical visualization tool for working with large time
series databases. In SDM.
Laplante, P. A. et al. (2004). Real-time systems design and
analysis. Wiley New York.
Lee, H., Yoon, J., Jang, M.-S., and Park, K.-J. (2021).
A robot operating system framework for secure uav
communications. Sensors, 21(4):1369.
Lhee, K.-s. and Chapin, S. J. (2002). Type-assisted dynamic
buffer overflow detection. In USENIX Security Sym-
posium, pages 81–88.
Meier, L., Honegger, D., and Pollefeys, M. (2015). Px4:
A node-based multithreaded open source robotics
framework for deeply embedded platforms. In 2015
IEEE International Conference on Robotics and Au-
tomation (ICRA), pages 6235–6240.
Nemcovsky, Y., Jacoby, M., Bronstein, A. M., and Baskin,
C. (2022). Physical passive patch adversarial attacks
on visual odometry systems. In Proceedings of the
Asian Conference on Computer Vision, pages 1795–
1811.
Nourian, A. and Madnick, S. (2018). A systems theoretic
approach to the security threats in cyber physical sys-
tems applied to stuxnet. IEEE Transactions on De-
pendable and Secure Computing, 15(1):2–13.
Pan, K., Teixeira, A., L
´
opez, C. D., and Palensky, P. (2017).
Co-simulation for cyber security analysis: Data at-
tacks against energy management system. In 2017
IEEE International Conference on Smart Grid Com-
munications (SmartGridComm), pages 253–258.
Pang, G., Shen, C., Jin, H., and Hengel, A. v. d. (2019).
Deep weakly-supervised anomaly detection. arXiv
preprint arXiv:1910.13601.
Papp, D., Ma, Z., and Buttyan, L. (2015). Embedded sys-
tems security: Threats, vulnerabilities, and attack tax-
onomy. In 2015 13th Annual Conference on Privacy,
Security and Trust (PST), pages 145–152. IEEE.
Parkinson, S., Ward, P., Wilson, K., and Miller, J. (2017).
Cyber threats facing autonomous and connected vehi-
cles: Future challenges. IEEE transactions on intelli-
gent transportation systems, 18(11):2898–2915.
Quigley, M., Conley, K., Gerkey, B., Faust, J., Foote, T.,
Leibs, J., Wheeler, R., Ng, A. Y., et al. (2009). Ros: an
open-source robot operating system. In ICRA work-
shop on open source software, volume 3, page 5.
Kobe, Japan.
Sargent, R. G. (2010). Verification and validation of sim-
ulation models. In Proceedings of the 2010 winter
simulation conference, pages 166–183. IEEE.
Schoeberl, M., Hochberger, C., Uhrig, S., Brehm, J., and Pi-
onteck, T. (2019). Architecture of computing systems
– arcs 2019. In Lecture Notes in Computer Science.
Shah, S., Dey, D., Lovett, C., and Kapoor, A. (2017). Air-
sim: High-fidelity visual and physical simulation for
autonomous vehicles. In Field and Service Robotics.
Thing, V. and Wu, J. (2016). Autonomous vehicle security:
A taxonomy of attacks and defences.
Tippenhauer, N. O., P
¨
opper, C., Rasmussen, K., and Cap-
kun, S. (2011). On the requirements for successful
gps spoofing attacks. In Proceedings of the 18th ACM
Conference on Computer and Communications Secu-
rity, pages 75–86.
Varga, A. (2001). Discrete event simulation system. In
Proc. of the European Simulation Multiconference
(ESM’2001), pages 1–7.
Wang, C., Wu, K., Zhou, T., Yu, G., and Cai, Z. (2021).
Tsagen: synthetic time series generation for kpi
anomaly detection. IEEE Transactions on Network
and Service Management, 19(1):130–145.
Wei, L., Kumar, N., Lolla, V. N., Keogh, E. J., Lonardi,
S., and Ratanamahatana, C. (2005). Assumption-free
anomaly detection in time series. In International
Conference on Statistical and Scientific Database
Management.
Wouters, L., Creff, S., Effa, E., and Koudri, A. (2017).
Collaborative systems engineering: Issues and chal-
lenges.
Wu, R. and Keogh, E. (2021). Current time series anomaly
detection benchmarks are flawed and are creating the
illusion of progress. IEEE Transactions on Knowledge
and Data Engineering.
Xu, Hongzuo. DeepOD: Python Deep Outlier/Anomaly De-
tection.
SIMULTECH 2025 - 15th International Conference on Simulation and Modeling Methodologies, Technologies and Applications
38