liu.seSearch for publications in DiVA
Change search
Link to record
Permanent link

Direct link
Publications (10 of 41) Show all publications
Rosén, A., Singh Gaba, G. & Gurtov, A. (2025). A Strategic Roadmap For Phased Zero Trust Architecture Implementation In Organizations. In: 2025 IEEE Conference on Communications and Network Security (CNS): . Paper presented at IEEE Conference on Communications and Network Security (CNS), Avignon, France, 08-11 September, 2025 (pp. 1-6). Avignon, France: IEEE
Open this publication in new window or tab >>A Strategic Roadmap For Phased Zero Trust Architecture Implementation In Organizations
2025 (English)In: 2025 IEEE Conference on Communications and Network Security (CNS), Avignon, France: IEEE, 2025, p. 1-6Conference paper, Published paper (Refereed)
Abstract [en]

Traditional perimeter-based security models, which implicitly trust internal networks, are vulnerable to modern cyber threats such as ransomware and credential misuse, allowing lateral movement and large-scale breaches. Zero Trust Architecture (ZTA) mitigates these risks by enforcing continuous authentication and least-privilege access for all devices. However, organizations face challenges in adopting ZTA without disrupting operations or incurring high costs, and existing research lacks actionable guidance. Through extensive literature analysis, semi-structured interviews with diverse organizational staff, and evaluation of Zero Trust maturity across seven pillars, this article proposes a practical, phased roadmap tailored to the needs of an organization. The approach prioritizes operational continuity and minimizes implementation barriers, enabling robust and sustainable cybersecurity.

Place, publisher, year, edition, pages
Avignon, France: IEEE, 2025
Keywords
Micro-Segmentation, Network Security, Operational Continuity, Phased Implementation, Zero Trust Architecture (ZTA)
National Category
Computer Systems
Identifiers
urn:nbn:se:liu:diva-219042 (URN)10.1109/CNS66487.2025.11194934 (DOI)9798331538569 (ISBN)9798331538576 (ISBN)
Conference
IEEE Conference on Communications and Network Security (CNS), Avignon, France, 08-11 September, 2025
Available from: 2025-10-27 Created: 2025-10-27 Last updated: 2025-10-30
Singh Gaba, G., Sari, A., Butun, I., Singh, P., Gurtov, A. & Liyanage, M. (2025). A Survey on Security and Privacy of Industry 4.0 and Beyond: Technical Aspects, Use Cases, Challenges, and Research Directions. IEEE Open Journal of the Communications Society, 6, 8865-8929
Open this publication in new window or tab >>A Survey on Security and Privacy of Industry 4.0 and Beyond: Technical Aspects, Use Cases, Challenges, and Research Directions
Show others...
2025 (English)In: IEEE Open Journal of the Communications Society, E-ISSN 2644-125X, Vol. 6, p. 8865-8929Article, review/survey (Refereed) Published
Abstract [en]

Industry 4.0 and 5.0 offer a promising framework for connecting electro-mechanical systems to cyberspace, enabling real-time access, telecontrol, human-machine collaboration, and intelligent automation of industrial operations. While horizontal and vertical interoperability serve as critical enablers of this ecosystem, heterogeneity among entities and the lack of standardized governance in interoperability allow cybercriminals to exploit structural vulnerabilities. These weaknesses and unknown bugs provide avenues for cyber-attackers to breach systems, conduct espionage, sabotage assets, and extort organizations, threatening IT and OT infrastructures, finances, reputations, and even human lives. This survey paper discusses cybersecurity and privacy threats within the Industry 4.0 and 5.0 ecosystems, their potential impact on industrial processes and peripherals, and the security challenges associated with the transition from Industry 4.0 to 5.0. To identify research gaps and vulnerabilities, we examine the architecture and components of diverse industrial frameworks and establish functional mappings using IIRA and RAMI models. Following a comprehensive threat modeling approach, we present a layered taxonomy of cyber-threats, classified based on their nature, behavior, and execution characteristics. To assist network administrators and security professionals, we propose a threat prioritization framework based on likelihood, detectability, impact severity, and operational consequences. Furthermore, we outline perspective-based cybersecurity challenges that expose deficiencies in current protective measures. As countermeasures, we advocate for AI-driven, blockchain-enabled, edge-computing-based, and privacy-preserving security solutions to defend against threats and mitigate potential damages. We also elaborate on key standardization initiatives, nation-specific privacy regulations, and ongoing research efforts focused on safeguarding the security and privacy of Industry 4.0 and beyond. The paper concludes by summarizing key lessons learned, identifying unresolved research questions, and suggesting future directions for a secure and resilient Industry 5.0 paradigm.

Place, publisher, year, edition, pages
IEEE Communications Society, 2025
Keywords
Cybersecurity, cyber-physical systems (CPS), Industry 4.0, industrial Internet, privacy
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-219282 (URN)10.1109/ojcoms.2025.3616289 (DOI)001604873900001 ()2-s2.0-105018097890 (Scopus ID)
Funder
Academy of Finland, 318927ELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications, A4The Swedish Foundation for International Cooperation in Research and Higher Education (STINT), IB2019-8185
Note

Funding Agencies|Swedish Foundation for International Cooperation in Research and Higher Education (STINT) through the Initiation Grants Program [IB2019-8185]; Science Foundation Ireland through the CONNECT Phase 2 [13/RC/2077_P2]; Academy of Finland through the 6Genesis Project [318927]; CENIIT Project [17.01]; European Cooperation in Science and Technology [10.13039/501100000921]; COST Action CA22104 - Behavioral Next Generation in Wireless Networks for Cyber Security (BEiNG-WISE); Excellence Center at Linkping-Lund in IT under Project A4

Available from: 2025-11-04 Created: 2025-11-04 Last updated: 2025-12-07
Martintoni, D., Senni, V., Singh Gaba, G. & Gurtov, A. (2025). On the Role of SecRAM Catalogues in ATM Cyber Risk Assessment and Improvement Opportunities. In: 2025 Integrated Communications, Navigation and Surveillance Conference (ICNS): . Paper presented at The 25th Integrated Communications, Navigation and Surveillance Conference (ICNS), EuroControl, Belgium, 08-10 April, 2025. Belgium: Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>On the Role of SecRAM Catalogues in ATM Cyber Risk Assessment and Improvement Opportunities
2025 (English)In: 2025 Integrated Communications, Navigation and Surveillance Conference (ICNS), Belgium: Institute of Electrical and Electronics Engineers (IEEE) , 2025Conference paper, Published paper (Refereed)
Abstract [en]

Current Air Traffic Management (ATM) systems are undergoing significant evolution due to increased traffic volumes, the introduction of diverse airborne systems such as Unmanned Aerial Vehicles (UAVs), technological advancements, and the potential to optimize operations through data-driven approaches. These advancements offer benefits in terms of efficiency, safety, and sustainability, but they also expose the systems to heightened cybersecurity risks. This paper analyzes the Security Risk Assessment Methodology (SecRAM) proposed by SESAR, focusing specifically on its use of complementary catalogs of threats and vulnerabilities. By validating the SecRAM approach in a contemporary ATM scenario, this paper identifies gaps in the framework that could be addressed to better meet the security needs of a modern and complex ATM ecosystem. Finally, this work proposes a set of enhancements to the SecRAM catalogs that will enable security professionals to design and develop secure and resilient modern ATM environments.

Place, publisher, year, edition, pages
Belgium: Institute of Electrical and Electronics Engineers (IEEE), 2025
Series
Integrated Communications, Navigation and Surveillance Conference, ICNS, ISSN 2155-4943, E-ISSN 2155-4951
Keywords
ATM, FCI, risk-assessment, security, SecRAM
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:liu:diva-213530 (URN)10.1109/ICNS65417.2025.10976972 (DOI)001516425900133 ()2-s2.0-105005194320 (Scopus ID)9798331534738 (ISBN)9798331534745 (ISBN)
Conference
The 25th Integrated Communications, Navigation and Surveillance Conference (ICNS), EuroControl, Belgium, 08-10 April, 2025
Funder
EU, Horizon Europe, 101114635
Note

Funding Agencies|SESAR Joint Undertaking under the EU's Horizon Europe programme [101114635]

Available from: 2025-05-12 Created: 2025-05-12 Last updated: 2025-08-29Bibliographically approved
Borhani, M., Avgouleas, I., Liyanage, M. & Gurtov, A. (2025). Secure Scalable VPLS: A Lagrangian Relaxation Approach to Tunnel Relaying Optimization. IEEE Transactions on Networking
Open this publication in new window or tab >>Secure Scalable VPLS: A Lagrangian Relaxation Approach to Tunnel Relaying Optimization
2025 (English)In: IEEE Transactions on Networking, E-ISSN 2998-4157Article in journal (Refereed) Epub ahead of print
Abstract [en]

Virtual Private LAN Service (VPLS) is commonly used for secure multi-point communication across geographically scattered industrial sites, simulating a unified LAN broadcast domain for Industrial IoT (IIoT)-type devices. This configuration demands a fully-connected overlay network with encrypted Host Identity Protocol (HIP)/IPsec tunnels exhibiting quadratic scalability to the number of tunnels and a significant increase in forwarding table entries. Herein, we introduce Tunnel Relay Nodes (TRNs) as selected routers that maintain full-mesh connectivity. This approach allows non-TRN routers, or Provider Equipment (PEs) acting as spoke PEs, to connect via a TRN. We explore the challenges of using TRNs in secure HIP-based VPLS (HIPLS) networks, including (i) placing reliable TRNs within provider networks and (ii) scheduling TRNs to minimize their activation/deactivation costs as well as the connection cost among PEs. We then demonstrate how (i) can be addressed in polynomial time using a modified general median problem approach. Additionally, we formulate (ii) as a Mixed Integer Linear Programming (MILP) scheduling problem and prove its NP-completeness. Furthermore, we introduce an algorithm based on Lagrangian relaxation to address the intractability in large-scale deployments. This algorithm offers fast, near-optimal solutions while simultaneously balancing solution quality and execution time. Our simulations on three real-world network topologies with real network demands show a 92% average reduction in forwarding table entries on PE. Compared to existing solutions, our method reduces the number of tunnels established by up to 95%, at the expense of a 1.39-fold increase in tunnel path length.

Place, publisher, year, edition, pages
IEEE, 2025
Keywords
Industrial Internet of Things; Hip; Scalability; Relays; Costs; Virtual private networks; Local area networks; Peer-to-peer computing; Computer crime; Routing protocols; IIoT; VPLS; HIPLS; network design; optimization
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-219328 (URN)10.1109/ton.2025.3617789 (DOI)001610960000001 ()2-s2.0-105020935510 (Scopus ID)
Funder
CUGS (National Graduate School in Computer Science)ELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications, A.4 Project
Note

Funding Agencies|Graduate School in Computer Science (CUGS); Excellence Center at Linkoping-Lund in Information Technology (ELLIIT) A.4 Project

Available from: 2025-11-07 Created: 2025-11-07 Last updated: 2025-11-27
Boonsong, S., Hagl, M., Stelkens-Kobsch, T. H., Ruediger, T., Gurtov, A. & Singh Gaba, G. (2025). Validation Exercise: Strengthening Cybersecurity Awareness in Air Traffic Control through Simulation-Based Training. In: : . Paper presented at SESAR Innovation Days (SID). Belgium
Open this publication in new window or tab >>Validation Exercise: Strengthening Cybersecurity Awareness in Air Traffic Control through Simulation-Based Training
Show others...
2025 (English)Conference paper, Poster (with or without abstract) (Refereed)
Abstract [en]

This exercise validated an enhanced Attack Simulator that strengthens ATCOs cybersecurity awareness and response to ADS-B threats through realistic, simulation-based training. The research assessed the Attack Simulator's effectiveness in improving ATCOs' cyberattack recognition/response and to evaluate behavioural and performance changes pre-and post-knowledge transfer.

Place, publisher, year, edition, pages
Belgium: , 2025
Keywords
Aviation, Cybersecurity
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-219562 (URN)10.13140/RG.2.2.20341.23524 (DOI)
Conference
SESAR Innovation Days (SID)
Available from: 2025-11-18 Created: 2025-11-18 Last updated: 2025-11-18
Khan, S., Wang, Y., Singh Gaba, G., Gurtov, A. & Kumar, P. (2024). A Secure Framework For Controller Pilot Data Link Communications in Aviation Network. In: 2024 AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC): . Paper presented at AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC), 29 Sept-3 Oct 2024, San Diego, CA, USA. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>A Secure Framework For Controller Pilot Data Link Communications in Aviation Network
Show others...
2024 (English)In: 2024 AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC), Institute of Electrical and Electronics Engineers (IEEE), 2024Conference paper, Published paper (Refereed)
Abstract [en]

Controller Pilot Data Link Communications (CPDLC) enhances air traffic communication by replacing traditional voice transmissions with digital messages over Very High Frequency (VHF) radio systems. This transition improves communication resilience by providing clear, text-based instructions that reduce misunderstandings and increase bandwidth efficiency by enabling more data to be transmitted simultaneously. It benefits congested airspace by reducing radio frequency congestion and minimizing communication errors. However, due to the plain-text nature of its messages, CPDLC faces significant security challenges, making it vulnerable to cyber-attacks such as eavesdropping, modification, injection, and man-in-the-middle (MITM) attacks. This vulnerability allows motivated attackers to intercept CPDLC messages using inexpensive devices like Software-Defined Radio (SDR), HACKRF-one, and an antenna. Such breaches can lead to fatal safety incidents, severely impacting passengers and the aviation industry. To address this, we proposed a robust security framework for securing CPDLC communication by implementing critical measures, including mutual authentication, secure key establishment, and handover. The proposed framework has been tested on hardware to verify its effectiveness in practical scenarios, ensuring it aligns with existing CPDLC standards and integrates seamlessly into current systems without impacting operational efficiency. Our findings indicate that the proposed security framework enhances CPDLC's defenses against potential cyber threats while maintaining system performance, making it feasible to protect global air traffic communications.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
IEEE/AIAA Digital Avionics Systems Conference, ISSN 2155-7195, E-ISSN 2155-7209
Keywords
Aviation, CPDLC, Handover, Security, VHF
National Category
Communication Systems
Identifiers
urn:nbn:se:liu:diva-209995 (URN)10.1109/DASC62030.2024.10749527 (DOI)001453360400202 ()2-s2.0-85211215823 (Scopus ID)9798350349610 (ISBN)9798350349627 (ISBN)
Conference
AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC), 29 Sept-3 Oct 2024, San Diego, CA, USA
Funder
EU, Horizon Europe, 101114635
Note

Funding Agencies|SESAR Joint Undertaking [101114635]

Available from: 2024-11-22 Created: 2024-11-22 Last updated: 2025-08-29Bibliographically approved
Zineddine, A., Chakir, O., Sadqi, Y., Maleh, Y., Singh Gaba, G., Gurtov, A. & Dev, K. (2024). A systematic review of cybersecurity assessment methods for HTTPS. Computers & electrical engineering, 115, Article ID 109137.
Open this publication in new window or tab >>A systematic review of cybersecurity assessment methods for HTTPS
Show others...
2024 (English)In: Computers & electrical engineering, ISSN 0045-7906, E-ISSN 1879-0755, Vol. 115, article id 109137Article, review/survey (Refereed) Published
Abstract [en]

Cybersecurity assessments are critical for ensuring that security measures in organizational infrastructures, systems, and applications meet necessary requirements. Given the significant HTTPS vulnerabilities exposed in recent years, assessing HTTPS deployments is increasingly important. However, there has been no systematic literature review (SLR) comparing different cybersecurity assessment methods specifically for HTTPS deployment security issues. This study aims to address this gap by identifying, analyzing, and comparing various HTTPS deployment assessment methods documented in scientific literature. Our approach involved a structured research methodology with specific inclusion and exclusion criteria for selecting relevant methods. The review utilizes 16 comparison metrics, divided into two categories: critical security metrics, focusing on assessment metrics adopted and the number of vulnerabilities evaluated by each method, and additional metrics assessing the methods’ applicability and effectiveness in real-world scenarios. The findings indicate varied adoption rates of these metrics among the reviewed cybersecurity assessment methods, highlighting the absence of a standardized approach using common, well-defined security metrics for HTTPS deployment assessment. In contrast, merging all the comparison metrics outlined in this review would enable a more in-depth assessment of HTTPS deployment security issues, enhance the quality of reported results, and lead to the development of a more practical assessment method.

Place, publisher, year, edition, pages
Elsevier, 2024
Keywords
Cybersecurity assessment, HTTPS deployment, Vulnerabilities, Security metrics, Applicability
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:liu:diva-201159 (URN)10.1016/j.compeleceng.2024.109137 (DOI)001204147300001 ()2-s2.0-85185829023 (Scopus ID)
Available from: 2024-02-24 Created: 2024-02-24 Last updated: 2025-02-07Bibliographically approved
Avgouleas, I., Pappas, N. & Gurtov, A. (2024). A Wireless Caching Helper System Serving Heterogeneous Traffic with Secrecy Constraints. In: Proceedings - IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, ChileCon: . Paper presented at 2023 IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, ChileCon 2023, Hybrid, Valdivia, 5 December 2023 through 7 December 2023. IEEE
Open this publication in new window or tab >>A Wireless Caching Helper System Serving Heterogeneous Traffic with Secrecy Constraints
2024 (English)In: Proceedings - IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, ChileCon, IEEE, 2024Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we analyze the performance of a wireless caching system with heterogeneous traffic and relaying capabilities satisfying secrecy constraints for one of two receiving users. In this setup, the second user has no secrecy requirements and receives cacheable content either from the relay helper or the core network through a wireless base station. The wireless relay helper can assist both users since it is equipped with finite storage that is split into cacheable and non-cacheable storage. Concurrently, a passive eavesdropper tries to overhear transmissions to the user with secrecy requirements. Consequently, we examine how this relay’s storage split and the eavesdropper affect the performance of the average throughput and delay of the system as the transmission powers, the relay’s transmission probability, and the relay’s cache size vary. © 2023 IEEE.

Place, publisher, year, edition, pages
IEEE, 2024
Series
EEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, ISSN 2832-1529
Keywords
Caching system; Core networks; Delay; Heterogeneous traffic; Performance; Relaying; Secrecy; Wireless base stations; Wireless caching helper system; Wireless relays
National Category
Communication Systems
Identifiers
urn:nbn:se:liu:diva-202639 (URN)10.1109/CHILECON60335.2023.10418706 (DOI)2-s2.0-85189502898 (Scopus ID)9798350369533 (ISBN)
Conference
2023 IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, ChileCon 2023, Hybrid, Valdivia, 5 December 2023 through 7 December 2023
Note

Cited by: 0; Conference name: 2023 IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, ChileCon 2023; Conference date: 5 December 2023 through 7 December 2023; Conference code: 197291

Available from: 2024-04-17 Created: 2024-04-17 Last updated: 2024-08-08
Jensen, C., Karresand, M., Singh Gaba, G., Gurtov, A. & Öhrn, E. (2024). Are Swedish Passwords Tougher Than the Rest?. In: 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024 Proceedings: . Paper presented at 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024. Springer
Open this publication in new window or tab >>Are Swedish Passwords Tougher Than the Rest?
Show others...
2024 (English)In: 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024 Proceedings, Springer, 2024Conference paper, Published paper (Refereed)
Abstract [en]

In today’s digital world, passwords are the keys that unlock our online lives, keeping our social media, financial accounts, and streaming services secure. However, creating strong passwords that are easy to remember is hard. Often an individual’s language and cultural background influence password creation, which an attacker can exploit. This paper examines the importance of the User Context Bias (UCB) on Swedish passwords, versus international passwords stemming from multiple languages and cultures. This is done by employing four different password-cracking tools; Probabilistic Context Free Grammar (PCFG), Ordered Markov Enumerator (OMEN), Odinn, and Hashcat. The findings reveal that all the tools are able to crack a higher percentage of passwords when attacking those created by Swedish natives compared to their international counterparts. PCFG, in particular, is nearly twice as effective as the other tools against Swedish passwords after just 10,000 guesses, while OMEN is the best against Swedish passwords after 5 million guesses.

Place, publisher, year, edition, pages
Springer, 2024
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349
Series
Secure IT Systems, E-ISSN 1611-3349
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:liu:diva-211513 (URN)10.1007/978-3-031-79007-2_1 (DOI)001446544900001 ()2-s2.0-85218501734 (Scopus ID)9783031790065 (ISBN)9783031790072 (ISBN)
Conference
29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024
Available from: 2025-02-06 Created: 2025-02-06 Last updated: 2025-04-17
Khan, S., Singh Gaba, G., Boeira, F. & Gurtov, A. (2024). Formal Verification and Security Assessment of the Drone Remote Identification Protocol. In: : . Paper presented at 2nd International Conference on Unmanned Vehicle Systems-Oman (UVS), Muscat, Oman, 12-14 February. 2024.. Muscat, Oman: Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Formal Verification and Security Assessment of the Drone Remote Identification Protocol
2024 (English)Conference paper, Published paper (Refereed)
Abstract [en]

The worldwide implementation of Remote Identification (RID) regulations mandates unmanned aircraft systems (UAS), or drones, to openly transmit their identity and real-time location as plain text on the wireless channel. This mandate serves the purpose of accounting for and monitoring drone operations effectively. However, the current RID standard's plain-text transmission exposes it to cyberattacks, including eavesdropping, injection, and impersonation. The Drone Remote Identification Protocol (DRIP) has been proposed to enhance the security of RID. The DRIP ensures information secrecy and confidentiality by using unique session keys while guaranteeing the authenticity of messages and entities through digital signatures. These security features of DRIP make it a preferable alternative to the existing RID standard. However, the lack of verification regarding its security claims raises concerns about its performance in hostile conditions. This paper comprehensively analyzes the DRIP protocol's security features using Tamarin Prover, a formal security verification tool. With its automated reasoning capabilities, Tamarin Prover accurately identifies potential security vulnerabilities within the DRIP protocol while thoroughly verifying its conformance to security properties. Our investigation demonstrates that the DRIP protocol is susceptible to replay attacks. We strongly recommend the inclusion of message freshness components, reducing the lifespan of DET broadcasts, and incorporating a not-after timestamp that is set only a few minutes ahead of the current time. These measures enhance the protocol's defence against replay attacks and ensure message authenticity and Integrity.

Place, publisher, year, edition, pages
Muscat, Oman: Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Cybersecurity, DRIP, Formal verification, Tamarin, UAS.
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:liu:diva-201795 (URN)10.1109/UVS59630.2024.10467159 (DOI)001192218700014 ()9798350372557 (ISBN)9798350372564 (ISBN)
Conference
2nd International Conference on Unmanned Vehicle Systems-Oman (UVS), Muscat, Oman, 12-14 February. 2024.
Note

Funding Agencies|Automation Program II, Trafikverket

Available from: 2024-03-22 Created: 2024-03-22 Last updated: 2024-08-01Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-9829-9287

Search in DiVA

Show all publications