<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.sutd.edu.sg/itrust/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/dnattest-digital-twin-based-non-intrusive-attestation-under-transient-uncertainty/</loc>
		<lastmod>2026-04-06T10:15:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/finding-causally-different-tests-for-an-industrial-control-system/</loc>
		<lastmod>2026-04-06T10:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/aicrit-a-unified-framework-for-real-time-anomaly-detection-in-water-treatment-plants/</loc>
		<lastmod>2026-04-06T10:16:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/detecting-hidden-attackers-in-photovoltaic-systems-using-machine-learning/</loc>
		<lastmod>2026-04-06T10:17:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/mitigating-adversarial-attacks-on-data-driven-invariant-checkers-for-cyber-physical-systems/</loc>
		<lastmod>2026-04-06T10:17:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/openplc61850-an-iec-61850-mms-compatible-open-source-plc-for-smart-grid-research/</loc>
		<lastmod>2026-04-06T10:19:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/protecting-the-integrity-of-ami-data-and-firmware-with-a-feather-light-blockchain-infrastructure/</loc>
		<lastmod>2026-04-06T10:19:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/securing-smart-grids-through-an-incentive-mechanism-for-blockchain-based-data-sharing/</loc>
		<lastmod>2026-04-06T10:19:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/transparent-electricity-pricing-with-privacy/</loc>
		<lastmod>2026-04-06T10:19:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-digital-twin-for-cyber-security-research-of-water-distribution-systems/</loc>
		<lastmod>2026-04-06T10:19:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-hybrid-physics-based-data-driven-framework-for-anomaly-detection-in-industrial-control-systems/</loc>
		<lastmod>2026-04-06T10:20:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/an-iec-61850-mms-traffic-parser-for-customizable-and-efficient-intrusion-detection/</loc>
		<lastmod>2026-04-06T10:20:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/attacklets-to-test-anomaly-detectors-for-critical-infrastructure/</loc>
		<lastmod>2026-04-06T10:20:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/attkfinder-discovering-attack-vectors-in-plc-programs-using-information-flow-analysis/</loc>
		<lastmod>2026-04-06T10:21:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/bank-of-models-sensor-attack-detection-and-isolation-in-industrial-control-systems/</loc>
		<lastmod>2026-04-06T10:21:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/code-integrity-attestation-for-plcs-using-black-box-neural-network-predictions/</loc>
		<lastmod>2026-04-06T10:22:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/cyber-attack-case-studies-on-dynamic-voltage-restorer-in-smart-grid/</loc>
		<lastmod>2026-04-06T10:22:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/deriving-invariant-checkers-for-critical-infrastructure-using-axiomatic-design-principles/</loc>
		<lastmod>2026-04-06T10:22:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/design-knowledge-in-learning-plant-dynamics-for-detecting-process-anomalies-in-water-treatment-plants/</loc>
		<lastmod>2026-04-06T10:23:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/identifying-privacy-weaknesses-from-multi-party-trigger-action-integration-platforms/</loc>
		<lastmod>2026-04-06T10:24:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/machine-learning-for-intrusion-detection-in-industrial-control-systems-challenges-and-lessons-from-experimental-evaluation/</loc>
		<lastmod>2026-04-06T10:24:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/pcat-plc-command-analysis-tool-for-automatic-incidence-response-in-water-treatment-plants/</loc>
		<lastmod>2026-04-06T10:24:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/scanning-the-cycle-timing-based-authentication-on-plcs/</loc>
		<lastmod>2026-04-06T10:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/semantic-fuzzing-based-empirical-analysis-of-voice-assistant-systems-of-asian-symbol-languages/</loc>
		<lastmod>2026-04-06T10:25:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/super-detector-an-ensemble-approach-for-anomaly-detection-in-industrial-control-systems/</loc>
		<lastmod>2026-04-06T10:26:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/robust-stabilization-of-a-class-of-nonlinear-systems-via-aperiodic-sensing-and-actuation/</loc>
		<lastmod>2026-04-06T10:26:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-multilayer-perceptron-model-for-anomaly-detection-in-water-treatment-plants/</loc>
		<lastmod>2026-04-06T10:26:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-sequential-algorithm-for-sampled-mixed-integer-optimization-problems/</loc>
		<lastmod>2026-04-06T10:26:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/active-fuzzing-for-testing-and-securing-cyber-physical-systems/</loc>
		<lastmod>2026-04-06T10:28:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/challenges-in-machine-learning-based-approaches-for-real-time-anomaly-detection-in-industrial-control-systems/</loc>
		<lastmod>2026-04-06T10:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/co-simulating-physical-processes-and-network-data-for-high-fidelity-cyber-security-experiments/</loc>
		<lastmod>2026-04-06T10:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/deep-autoencoders-as-anomaly-detectors-method-and-case-study-in-a-distributed-water-treatment-plant/</loc>
		<lastmod>2026-04-06T10:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/domain-based-fuzzing-for-supervised-learning-of-anomaly-detection-in-cyber-physical-systems/</loc>
		<lastmod>2026-04-06T10:30:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/false-data-injection-cyber-range-of-modernized-substation-system/</loc>
		<lastmod>2026-04-06T10:30:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/on-design-and-enhancement-of-smart-grid-honeypot-system-for-practical-collection-of-threat-intelligence/</loc>
		<lastmod>2026-04-06T10:30:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/on-exploiting-transaction-concurrency-to-speed-up-blockchains/</loc>
		<lastmod>2026-04-06T10:31:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/scalable-vpn-forwarded-honeypots-dataset-and-threat-intelligence-insights/</loc>
		<lastmod>2026-04-06T10:31:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/towards-systematically-deriving-defence-mechanisms-from-functional-requirements-of-cyber-physical-systems/</loc>
		<lastmod>2026-04-06T10:31:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/attacks-on-smart-grid-power-supply-interruption-and-malicious-power-generation/</loc>
		<lastmod>2026-04-07T08:50:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/validating-anomaly-detection-mechanisms-in-industrial-control-systems/</loc>
		<lastmod>2026-04-07T09:06:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-toolbox-for-assessing-the-impacts-of-cyber-physical-attacks-on-water-distribution-systems/</loc>
		<lastmod>2026-04-07T09:15:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/anomaly-detection-and-avoidance-in-cyber-physical-systems/</loc>
		<lastmod>2026-04-07T09:15:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/anomaly-detection-in-critical-infrastructure-using-probabilistic-neural-network/</loc>
		<lastmod>2026-04-07T09:15:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/collaborative-analysis-framework-of-safety-and-security-for-autonomous-vehicles/</loc>
		<lastmod>2026-04-07T09:18:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/ics-blockops-blockchain-for-operational-data-security-in-industrial-control-system/</loc>
		<lastmod>2026-04-07T09:19:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/learning-guided-network-fuzzing-for-testing-cyber-physical-system-defences/</loc>
		<lastmod>2026-04-07T09:26:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/probabilistically-robust-ac-optimal-power-flow/</loc>
		<lastmod>2026-04-07T09:26:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/prosumer-site-power-interruption-attacks-exploiting-the-reactive-power-control-feature-in-smart-inverters/</loc>
		<lastmod>2026-04-07T09:26:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/secret-group-key-generation-at-physical-layer-for-multi-antenna-mesh-topology/</loc>
		<lastmod>2026-04-07T09:26:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-contribution-of-axiomatic-design-principles-to-the-analysis-and-impact-of-attacks-on-critical-infrastructures/</loc>
		<lastmod>2026-04-07T09:29:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-deep-learning-approach-to-the-detection-and-localization-of-cyber-physical-attacks-on-water-distribution-systems/</loc>
		<lastmod>2026-04-07T09:29:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-review-on-safety-failures-security-attacks-and-available-countermeasures-for-autonomous-vehicle/</loc>
		<lastmod>2026-04-07T09:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/assessing-the-effectiveness-of-attack-detection-at-a-hackfest-on-industrial-control-systems/</loc>
		<lastmod>2026-04-07T09:29:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/design-and-assessment-of-an-orthogonal-defense-mechanism-for-a-water-treatment-facility/</loc>
		<lastmod>2026-04-07T09:29:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/designing-safe-and-secure-mixed-traffic-systems/</loc>
		<lastmod>2026-04-07T09:30:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/distributed-attack-detection-in-a-water-treatment-plant-method-and-case-study/</loc>
		<lastmod>2026-04-07T09:30:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/lightweight-and-practical-anonymous-authentication-protocol-for-rfid-systems-using-physically-unclonable-functions/</loc>
		<lastmod>2026-04-07T09:33:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/machine-learning-invariants-to-detect-anomalies-in-secure-water-treatment-swat/</loc>
		<lastmod>2026-04-07T09:33:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/n-baiot-network-based-detection-of-iot-botnet-attacks-using-deep-autoencoders/</loc>
		<lastmod>2026-04-07T09:33:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/optimal-placement-of-imperfect-water-quality-sensors-in-water-distribution-networks/</loc>
		<lastmod>2026-04-07T09:38:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/pressure-driven-modeling-of-cyber-physical-attacks-on-water-distribution-systems/</loc>
		<lastmod>2026-04-07T09:38:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/reconfigurable-security-edge-computing-based-framework-for-iot/</loc>
		<lastmod>2026-04-07T09:38:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/security-testbed-for-internet-of-things-devices/</loc>
		<lastmod>2026-04-07T09:38:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/the-battle-of-the-attack-detection-algorithms-disclosing-cyber-attacks-on-water-distribution-networks/</loc>
		<lastmod>2026-04-07T09:41:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-formal-specification-and-verification-framework-for-timed-security-protocols/</loc>
		<lastmod>2026-04-07T09:42:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/characterizing-cyber-pysical-attacks-on-water-distribution-systems/</loc>
		<lastmod>2026-04-07T09:46:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/collaborative-load-management-with-safety-assurance-in-smart-grids/</loc>
		<lastmod>2026-04-07T09:46:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/cyber-security-patrol-detecting-fake-and-vulnerable-wifi-enabled-printers/</loc>
		<lastmod>2026-04-07T09:46:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/detection-of-unauthorized-iot-devices-using-machine-learning-techniques/</loc>
		<lastmod>2026-04-07T09:46:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/exploiting-trust-degree-for-multiple-antenna-user-cooperation/</loc>
		<lastmod>2026-04-07T09:46:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/friends-or-foes-the-design-of-confidential-cooperative-communication-with-untrustworthy-relay/</loc>
		<lastmod>2026-04-07T09:46:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/interference-assisted-secret-key-generation-in-discrete-memoryless-wiretap-channel-with-public-feedback/</loc>
		<lastmod>2026-04-07T09:51:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/iotscanner-detecting-and-classifying-privacy-threats-in-iot-neighborhoods/</loc>
		<lastmod>2026-04-07T09:51:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/iotscanner-detecting-privacy-threats-in-iot-neighborhoods/</loc>
		<lastmod>2026-04-07T09:54:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/let-the-cat-out-of-the-bag-a-holistic-approach-towards-security-analysis-of-the-internet-of-things/</loc>
		<lastmod>2026-04-07T09:54:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/link-layer-device-type-classification-on-encrypted-wireless-traffic-with-cots-radios/</loc>
		<lastmod>2026-04-07T09:54:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/real-time-detection-of-cyber-physical-attacks-on-water-distribution-systems-using-deep-learning/</loc>
		<lastmod>2026-04-07T10:04:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/resilience-of-dos-attacks-in-designing-anonymous-user-authentication-protocol-for-wireless-sensor-networks/</loc>
		<lastmod>2026-04-07T10:04:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/resiot-reconfigurable-security-for-iot/</loc>
		<lastmod>2026-04-07T10:04:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/secure-communication-for-d2d-aided-fog-computing-architecture-challenges-and-solution/</loc>
		<lastmod>2026-04-07T10:04:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/siphon-towards-scalable-high-interaction-physical-honeypots/</loc>
		<lastmod>2026-04-07T10:04:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/advanced-security-testbed-framework-for-wearable-iot-devices/</loc>
		<lastmod>2026-04-07T10:08:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/argus-an-orthogonal-defense-framework/</loc>
		<lastmod>2026-04-07T10:08:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/automated-verification-of-timed-security-protocols-with-clock-drift/</loc>
		<lastmod>2026-04-07T10:10:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/best-antenna-placement-for-eavesdroppers-distributed-or-co-located/</loc>
		<lastmod>2026-04-07T10:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/confidential-cooperative-communication-with-trust-degree-of-potential-eavesdroppers/</loc>
		<lastmod>2026-04-07T10:11:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/deceptive-attack-and-defense-game-in-honeypot-enabled-networks-for-the-internet-of-things-2/</loc>
		<lastmod>2026-04-07T10:11:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/on-the-secrecy-capacity-region-of-the-2-user-z-interference-channel-with-unidirectional-transmitter-cooperation/</loc>
		<lastmod>2026-04-07T10:14:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/physical-layer-secret-key-generation-with-colluding-untrusted-relays/</loc>
		<lastmod>2026-04-07T10:14:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/poster-towards-exposing-internet-of-things-a-roadmap/</loc>
		<lastmod>2026-04-07T10:17:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/robust-network-synchronization-of-time-delayed-coupled-systems/</loc>
		<lastmod>2026-04-07T10:17:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/security-analysis-and-improvements-on-two-homomorphic-authentication-schemes-for-network-coding/</loc>
		<lastmod>2026-04-07T10:17:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/towards-learning-and-verifying-invariants-of-cyber-physical-systems-by-code-mutation/</loc>
		<lastmod>2026-04-07T10:18:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/transmission-strategy-against-opportunistic-attack-for-miso-secure-channels/</loc>
		<lastmod>2026-04-07T10:18:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/jamming-aided-secure-communication-in-massive-mimo-rician-channels/</loc>
		<lastmod>2026-04-07T10:21:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/noah-keyed-noise-flooding-for-wireless-confidentiality/</loc>
		<lastmod>2026-04-07T10:21:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/secret-group-key-generation-in-physical-layer-for-mesh-topology/</loc>
		<lastmod>2026-04-07T10:21:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/trust-degree-based-beamforming-for-miso-cooperative-communication-system/</loc>
		<lastmod>2026-04-07T10:24:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/verifying-parameterized-timed-security-protocols/</loc>
		<lastmod>2026-04-07T10:24:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/wireless-mimo-switching-with-trusted-and-untrusted-relays-degrees-of-freedom-perspective/</loc>
		<lastmod>2026-04-07T10:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/adaptive-defending-strategy-for-smart-grid-attacks/</loc>
		<lastmod>2026-04-07T10:25:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/on-block-security-of-regenerating-codes-at-the-mbr-point-for-distributed-storage-systems/</loc>
		<lastmod>2026-04-07T10:28:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/on-simple-multiple-access-networks/</loc>
		<lastmod>2026-04-07T10:28:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/physical-layer-secret-key-generation-with-untrusted-relays/</loc>
		<lastmod>2026-04-07T10:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/secure-communication-via-jamming-in-massive-mimo-rician-channels/</loc>
		<lastmod>2026-04-07T10:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/symbolic-analysis-of-an-electric-vehicle-charging-protocol/</loc>
		<lastmod>2026-04-07T10:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/tauth-verifying-timed-security-protocols/</loc>
		<lastmod>2026-04-07T10:31:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/integrating-autonomous-vehicle-safety-and-security-using-the-six-step-model/</loc>
		<lastmod>2026-04-07T10:33:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/from-design-to-invariants-detecting-attacks-on-cyber-physical-systems/</loc>
		<lastmod>2026-04-07T10:34:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/an-investigation-on-feasibility-and-security-for-cyber-attacks-on-generator-synchronization-process/</loc>
		<lastmod>2026-04-07T10:35:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/swat-a-water-treatment-testbed-for-research-and-training-on-ics-security/</loc>
		<lastmod>2026-04-14T07:21:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-comprehensive-dataset-from-a-smart-grid-testbed-for-machine-learning-based-cps-security-research/</loc>
		<lastmod>2026-04-17T03:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/automated-generation-of-configurable-high-fidelity-smart-grid-honeynet/</loc>
		<lastmod>2026-04-20T09:39:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/autopgt-llm-driven-automated-policy-generation-for-securing-industrial-control-systems/</loc>
		<lastmod>2026-04-20T09:42:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/adis-detecting-and-identifying-manipulated-plc-program-variables-using-state-aware-dependency-graph/</loc>
		<lastmod>2026-04-20T09:50:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/demo-smart-grid-cyber-twin-for-cybersecurity-exercise/</loc>
		<lastmod>2026-04-20T09:50:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/aiaf-an-automated-icp-based-attack-framework-for-industrial-control-systems/</loc>
		<lastmod>2026-04-20T09:53:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/beyond-anomaly-detection-securing-critical-infrastructure-using-plantshield/</loc>
		<lastmod>2026-04-20T09:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/proof-of-persistent-aliveness/</loc>
		<lastmod>2026-04-20T09:59:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/auto-sgcr-automated-generation-of-smart-grid-cyber-range-using-iec-61850-standard-models/</loc>
		<lastmod>2026-04-20T10:02:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/sni5gect-a-practical-approach-to-inject-anrchy-into-5g-nr/</loc>
		<lastmod>2026-04-21T07:03:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-smart-city-infrastructure-ontology-for-threats-cybercrime-and-digital-forensic-investigation/</loc>
		<lastmod>2026-04-21T07:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/graad-group-anonymous-and-accountable-d2d-communication-in-mobile-networks/</loc>
		<lastmod>2026-04-27T03:04:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/decision-tree-based-invariants-for-intrusion-detection-in-industrial-control-system/</loc>
		<lastmod>2026-04-27T07:20:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/authplc-authenticating-plc-communication-using-st-based-extended-cryptographic-library/</loc>
		<lastmod>2026-04-27T07:21:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/spying-by-spi-i-got-the-birds-eye/</loc>
		<lastmod>2026-04-27T07:22:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/evaluating-guru-transforming-cyber-physical-system-education/</loc>
		<lastmod>2026-04-27T07:23:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/adversarial-sample-generation-for-anomaly-detection-in-industrial-control-systems/</loc>
		<lastmod>2026-04-27T07:24:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/plantshield-an-automated-response-tool-for-critical-infrastructures/</loc>
		<lastmod>2026-04-27T07:25:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/an-end-to-end-bi-objective-approach-to-deep-graph-partitioning/</loc>
		<lastmod>2026-04-27T07:26:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/airbug-catcher-automated-wireless-reproduction-of-iot-bugs/</loc>
		<lastmod>2026-04-27T07:27:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/vaktble-a-benevolent-man-in-the-middle-bridge-to-guard-against-malevolent-ble-connections/</loc>
		<lastmod>2026-04-27T07:27:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/craas-cloud-based-smart-grid-cyber-range-for-scalable-cybersecurity-experiments-and-training/</loc>
		<lastmod>2026-04-27T07:30:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/u-fuzz-stateful-fuzzing-of-iot-protocols-on-cots-devices/</loc>
		<lastmod>2026-04-27T07:30:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/exposing-hidden-attackers-in-industrial-control-systems-using-micro-distortions/</loc>
		<lastmod>2026-04-27T07:33:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/adaptive-data-driven-lstm-model-for-sensor-drift-detection-in-water-utilities/</loc>
		<lastmod>2026-04-27T07:35:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/fusing-design-and-machine-learning-for-anomaly-detection-in-water-treatment-plants/</loc>
		<lastmod>2026-04-27T07:37:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/honeyjudge-a-plc-honeypot-identification-framework-based-on-device-memory-testing/</loc>
		<lastmod>2026-04-27T07:38:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/electrical-network-simulation-to-scada-front-end-a-case-study-in-power-grid-digital-twin-design/</loc>
		<lastmod>2026-04-27T07:38:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/on-design-and-implementation-of-real-time-high-fidelity-virtual-power-system-for-smart-grid-cyber-range/</loc>
		<lastmod>2026-04-27T07:39:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/substation-simulation-synchronization-a-first-step-towards-distributed-digital-twins/</loc>
		<lastmod>2026-04-27T07:40:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/the-design-and-implementation-of-a-cyber-exercise-on-epic-microgrid-testbed/</loc>
		<lastmod>2026-04-27T07:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/optimizing-lightweight-intermittent-message-authentication-for-programmable-logical-controller/</loc>
		<lastmod>2026-04-27T07:41:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/fieldfuzz-in-situ-blackbox-fuzzing-of-proprietary-industrial-automation-runtimes-via-the-network/</loc>
		<lastmod>2026-04-27T07:41:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/aicrit-a-design-enhanced-anomaly-detector-and-its-performance-assessment-in-a-water-treatment-plant/</loc>
		<lastmod>2026-04-27T07:42:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-hybrid-model-of-connectors-in-cyber-physical-systems-publication/</loc>
		<lastmod>2026-04-30T09:01:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/aligning-cyber-physical-system-safety-and-security/</loc>
		<lastmod>2026-04-30T09:02:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/framework-for-continuous-system-security-protection-in-swat/</loc>
		<lastmod>2026-04-30T12:02:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-physics-based-attack-detection-technique-in-cyber-physical-systems-a-model-predictive-control-co-design-approach/</loc>
		<lastmod>2026-04-30T12:03:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-real-time-response-mechanism-to-cyber-physical-attacks-on-water-distribution-systems/</loc>
		<lastmod>2026-04-30T12:04:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-systematic-framework-to-generate-invariant-rules-for-anomaly-detection-in-industrial-control-systems/</loc>
		<lastmod>2026-04-30T12:05:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-template-based-method-for-the-generation-of-attack-trees/</loc>
		<lastmod>2026-04-30T12:06:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/assessment-of-a-method-for-detecting-process/</loc>
		<lastmod>2026-04-30T12:07:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/aves-automated-vehicle-safety-and-security-analysis-framework/</loc>
		<lastmod>2026-04-30T12:08:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/cascading-failures-in-interconnected-power-to-water-networks/</loc>
		<lastmod>2026-04-30T12:09:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/challenges-in-secure-engineering-of-critical-infrastructure-systems/</loc>
		<lastmod>2026-04-30T12:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/cyber-attack-mitigation-for-stationary-battery-systems-using-physical-layer-security/</loc>
		<lastmod>2026-04-30T12:11:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/detection-of-threats-to-iot-devices-using-scalable-vpn-forwarded-honeypots/</loc>
		<lastmod>2026-04-30T12:11:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/hades-iot-a-practical-host-based-anomaly-detection-system-for-iot-devices/</loc>
		<lastmod>2026-04-30T12:12:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/incentives-in-ethereums-hybrid-casper-protocol/</loc>
		<lastmod>2026-04-30T12:13:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/oceanic-games-centralization-risks-and-incentives-in-blockchain-mining/</loc>
		<lastmod>2026-04-30T12:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/pit-a-probe-into-internet-of-things-by-comprehensive-security-analysis/</loc>
		<lastmod>2026-04-30T12:14:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/quantifying-the-robustness-of-network-controllability/</loc>
		<lastmod>2026-04-30T12:15:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/robust-stabilization-of-resource-limited-networked-control-systems-under-denial-of-service-attack/</loc>
		<lastmod>2026-04-30T12:15:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/using-datasets-from-industrial-control-systems-for-cyber-security-research-and-education/</loc>
		<lastmod>2026-04-30T12:21:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/weighted-voting-on-the-blockchain-improving-consensus-in-proof-of-stake-protocols/</loc>
		<lastmod>2026-04-30T12:21:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/an-approach-for-formal-analysis-of-the-security-of-a-water-treatment-testbed/</loc>
		<lastmod>2026-04-30T12:21:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/epic-an-electric-power-testbed-for-research-and-training-in-cyber-physical-systems-security/</loc>
		<lastmod>2026-04-30T12:23:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/integrated-safety-and-cybersecurity-risk-analysis-of-cooperative-intelligent-transport-systems/</loc>
		<lastmod>2026-04-30T12:23:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/learning-from-mutants-using-code-mutation-to-learn-and-monitor-cyber-physical-system-invariants/</loc>
		<lastmod>2026-04-30T12:24:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/modeling-cyber-physical-attacks-on-water-networks-with-epanetcpa/</loc>
		<lastmod>2026-04-30T12:24:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/modelling-safe-and-secure-cooperative-intelligent-transport-systems/</loc>
		<lastmod>2026-04-30T12:24:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/noiseprint-attack-detection-using-sensor-and-process-noise-fingerprint-in-cyber-physical-systems-2/</loc>
		<lastmod>2026-04-30T12:26:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/on-the-sequential-massart-algorithm-for-statistical-model-checking/</loc>
		<lastmod>2026-04-30T12:26:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/out-of-kilter-holistic-exploitation-of-denial-of-service-in-internet-of-things/</loc>
		<lastmod>2026-04-30T12:26:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/rethinking-blockchain-security-position-paper/</loc>
		<lastmod>2026-04-30T12:26:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/short-paper-on-practical-threat-scenario-testing-in-an-electric-power-ics-testbed/</loc>
		<lastmod>2026-04-30T12:26:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/smuf-state-machine-based-mutational-fuzzing-for-internet-of-things/</loc>
		<lastmod>2026-04-30T12:36:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/tabor-a-graphical-framework-for-anomaly-detection-in-industrial-control-systems/</loc>
		<lastmod>2026-04-30T12:36:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/taking-control-design-and-implementation-of-botnets-for-cyber-physical-attacks-with-cpsbot/</loc>
		<lastmod>2026-04-30T12:36:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/towards-more-reliable-bitcoin-timestamps/</loc>
		<lastmod>2026-04-30T12:36:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/us2-an-unified-safety-and-security-analysis-method-for-autonomous-vehicles/</loc>
		<lastmod>2026-04-30T12:36:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/wadac-privacy-preserving-anomaly-detectionand-attack-classificationon-wireless-traffic/</loc>
		<lastmod>2026-04-30T12:36:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-distributed-ellipsoid-algorithm-for-uncertain-convex-problems-a-randomized-approach/</loc>
		<lastmod>2026-04-30T12:36:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/access-control-in-water-distribution-networks-a-case-study/</loc>
		<lastmod>2026-04-30T12:36:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/importance-sampling-of-interval-markov-chains/</loc>
		<lastmod>2026-05-04T02:50:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/noise-matters-using-sensor-and-process-noise-fingerprint-to-detect-stealthy-cyber-attacks-and-authenticate-sensors-in-cps/</loc>
		<lastmod>2026-05-04T02:52:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/an-investigation-into-the-response-of-a-water-treatment-system-to-cyber-attacks/</loc>
		<lastmod>2026-05-04T02:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/an-investigation-into-the-response-of-a-water-treatment-system-to-cyber-attacks-2/</loc>
		<lastmod>2026-05-04T02:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/anomaly-detection-for-a-water-treatment-system-using-unsupervised-machine-learning/</loc>
		<lastmod>2026-05-04T02:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/anomaly-detection-in-cyber-physical-systems-using-recurrent-neural-networks/</loc>
		<lastmod>2026-05-04T02:59:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/effectiveness-of-association-rules-mining-for-invariants-generation-in-cyber-physical-systems/</loc>
		<lastmod>2026-05-04T03:01:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/gamifying-ics-security-training-and-research-design-implementation-and-results-of-s3/</loc>
		<lastmod>2026-05-04T03:02:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/hardware-identification-via-sensor-fingerprinting-in-a-cyber-physical-system/</loc>
		<lastmod>2026-05-04T03:02:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/how-to-align-the-safety-and-security-for-autonomous-vehicles/</loc>
		<lastmod>2026-05-04T03:02:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/integrating-autonomous-vehicle-safety-and-security-using-the-six-step-model-iso-26262-sae-j3061-and-sae-j3016/</loc>
		<lastmod>2026-05-04T03:03:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/integrating-design-and-data-centric-approaches-to-generate-invariants-for-distributed-attack-detection/</loc>
		<lastmod>2026-05-04T03:05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/integrating-six-step-model-with-information-flow-diagrams-for-comprehensive-analysis-of-cyber-physical-system-safety-and-security/</loc>
		<lastmod>2026-05-04T03:06:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/introducing-cyber-security-at-the-design-stage-of-public-infrastructures-a-procedure-and-case-study/</loc>
		<lastmod>2026-05-04T03:06:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/legacy-compliant-data-authentication-for-industrial-control-system-traffic/</loc>
		<lastmod>2026-05-04T03:13:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/model-based-attack-detection-scheme-for-smart-water-distribution-networks/</loc>
		<lastmod>2026-05-04T03:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/multistage-downstream-attack-detection-in-a-cyber-physical-system/</loc>
		<lastmod>2026-05-04T03:14:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/poster-profiliot-a-machines-learning-approach-for-iot-device-identification-based-on-network-traffic-analysis/</loc>
		<lastmod>2026-05-04T03:15:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/practical-evaluation-of-passive-cots-eavesdropping-in-802-11b-n-ac-wlan/</loc>
		<lastmod>2026-05-04T03:15:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/randomized-constraints-consensus-for-distributed-robust-linear-programming/</loc>
		<lastmod>2026-05-04T03:17:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/reachable-sets-of-hidden-cps-sensor-attacks-analysis-and-synthesis-tools/</loc>
		<lastmod>2026-05-04T03:17:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/secwater-a-multi-layer-security-framework-for-water-treatment-plants/</loc>
		<lastmod>2026-05-04T03:19:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/should-we-learn-probabilistic-models-for-model-checking-a-new-approach-and-an-empirical-study/</loc>
		<lastmod>2026-05-04T03:19:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/testing-the-effectiveness-of-attack-detection-mechanisms-in-industrial-control-systems/</loc>
		<lastmod>2026-05-04T03:19:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/towards-formal-security-analysis-of-industrial-control-systems/</loc>
		<lastmod>2026-05-04T03:20:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/wadi-a-water-distribution-testbed-for-research-in-the-design-of-secure-cyber-physical-systems/</loc>
		<lastmod>2026-05-04T03:21:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/waterjam-an-experimental-case-study-of-jamming-attacks-on-a-water-treatment-system/</loc>
		<lastmod>2026-05-04T03:21:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-dataset-to-support-research-in-the-design-of-secure-water-treatment-systems/</loc>
		<lastmod>2026-05-04T03:35:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-game-theoretic-model-for-enabling-honeypots-in-iot-networks/</loc>
		<lastmod>2026-05-04T03:36:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-six-step-model-for-safety-and-security-analysis-of-cyber-physical-systems/</loc>
		<lastmod>2026-05-04T03:41:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/an-experimental-investigation-into-detecting-cyber-attacks-on-a-water-treatment-system-using-process-invariants/</loc>
		<lastmod>2026-05-04T03:42:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/assessing-the-effect-of-cyber-physical-attacks-on-water-distribution-systems/</loc>
		<lastmod>2026-05-04T03:44:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/attack-detection-and-classi%ef%ac%81cation-in-cyber-physical-systems-using-a-machine-learning-approach/</loc>
		<lastmod>2026-05-04T03:45:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/attacking-fieldbus-communications-in-ics-applications-to-the-swat-testbed/</loc>
		<lastmod>2026-05-04T03:50:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/characterization-of-a-cusum-model-based-sensor-attack-detector/</loc>
		<lastmod>2026-05-04T03:50:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/cpdy-extending-the-dolev-yao-attacker-with-physical-layer-interactions/</loc>
		<lastmod>2026-05-04T03:50:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/cusum-and-x2-attack-detection-of-compromised-sensors/</loc>
		<lastmod>2026-05-04T03:51:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/detecting-multi-point-attacks-in-a-water-treatment-system-using-intermittent-control-actions/</loc>
		<lastmod>2026-05-04T03:51:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/data-driven-physical-modelling-for-intrusion-detection-in-cyber-physical-systems/</loc>
		<lastmod>2026-05-04T03:51:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/distributed-detection-of-single-stage-multipoint-cyber-attacks-in-a-water-treatment-plan/</loc>
		<lastmod>2026-05-04T05:18:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/generalised-attacker-and-attack-models-for-cyber-physical-systems/</loc>
		<lastmod>2026-05-04T05:18:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/generalized-attacker-and-attack-models-for-cyber-physical-systems/</loc>
		<lastmod>2026-05-04T05:18:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/limitations-of-state-estimation-based-cyber-attack-detection-schemes-in-industrial-control-systems/</loc>
		<lastmod>2026-05-04T05:19:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/limiting-the-impact-of-stealthy-attacks-on-industrial-control-systems/</loc>
		<lastmod>2026-05-04T05:19:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/model-based-security-analysis-of-a-water-treatment-system/</loc>
		<lastmod>2026-05-04T05:19:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/on-attacker-models-and-profiles-for-cyber-physical-systems/</loc>
		<lastmod>2026-05-04T05:19:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/using-process-invariants-to-detect-cyber-attacks-on-a-water-treatment-system/</loc>
		<lastmod>2026-05-04T05:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/stability-region-of-2-user-full-duplex-broadcast-channel-with-secrecy-constraint/</loc>
		<lastmod>2026-05-04T05:22:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/swat-secure-water-treatment-testbed-for-research-and-training-in-the-design-of-industrial-control-systems/</loc>
		<lastmod>2026-05-04T05:22:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/towards-concolic-testing-for-hybrid-systems/</loc>
		<lastmod>2026-05-04T05:23:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/towards-high-interaction-virutal-ics-honeypots-in-a-box/</loc>
		<lastmod>2026-05-04T05:23:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/simulation-of-cyber-physical-attacks-on-water-distribution-systems-with-epanet/</loc>
		<lastmod>2026-05-04T05:23:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/verifying-complex-systems-probabilistically-through-learning-abstraction-and-refinement/</loc>
		<lastmod>2026-05-04T05:27:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/achievable-ergodic-secrecy-rate-for-mimo-swipt-wiretap-channels/</loc>
		<lastmod>2026-05-04T05:27:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/an-agent-based-framework-for-simulating-and-analysing-attacks-on-cps/</loc>
		<lastmod>2026-05-04T05:27:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/false-data-injection-attacks-with-local-topology-information-against-linear-state-estimation/</loc>
		<lastmod>2026-05-04T05:27:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/optimizing-selection-of-competing-features-via-feedback-directed-evolutionary-algorithms/</loc>
		<lastmod>2026-05-04T05:27:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/reliable-and-privacy-preserving-secure-d2d-communication-in-lte-a/</loc>
		<lastmod>2026-05-04T05:27:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/secure-erasure-codes-with-partial-decodability/</loc>
		<lastmod>2026-05-04T05:30:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/weakly-secure-mds-codes-for-simple-multiple-access-networks/</loc>
		<lastmod>2026-05-04T05:33:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/a-hybrid-model-of-connectors-in-cyber-physical-systems/</loc>
		<lastmod>2026-05-04T05:33:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/device-to-device-communication-in-wireless-mobile-social-networks/</loc>
		<lastmod>2026-05-04T05:33:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/on-the-existence-of-mds-codes-over-small-fields-with-constrained-generator-matrices/</loc>
		<lastmod>2026-05-04T05:34:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/on-the-secrecy-outage-capacity-of-physical-layer-security-in-large-scale-mimo-relaying-systems-with-imperfect-csi/</loc>
		<lastmod>2026-05-04T05:35:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.sutd.edu.sg/itrust/publication-listing/practical-analysis-framework-for-software-based-attestation-scheme/</loc>
		<lastmod>2026-05-04T05:35:10+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->