Journal Articles
|
Vrachimis, Stelios G; Lifshitz, Ron; Eliades, Demetrios G; Polycarpou, Marios M; Ostfeld, Avi Active Contamination Detection in Water-Distribution Systems Journal Article Journal of Water Resources Planning and Management, 146 (4), pp. 04020014, 2020, ISSN: 0733-9496. BibTeX | Links: @article{Vrachimis2020,
title = {Active Contamination Detection in Water-Distribution Systems},
author = {Stelios G Vrachimis and Ron Lifshitz and Demetrios G Eliades and Marios M Polycarpou and Avi Ostfeld},
url = {http://ascelibrary.org/doi/10.1061/%28ASCE%29WR.1943-5452.0001176},
doi = {10.1061/(ASCE)WR.1943-5452.0001176},
issn = {0733-9496},
year = {2020},
date = {2020-04-01},
journal = {Journal of Water Resources Planning and Management},
volume = {146},
number = {4},
pages = {04020014},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
Tzagkarakis, George; Charalampidis, Pavlos; Roubakis, Stylianos; Makrogiannakis, Antonis; Tsakalides, Panagiotis Quantifying the Computational Efficiency of Compressive Sensing in Smart Water Network Infrastructures Journal Article Sensors, 20 (11), 2020, ISSN: 1424-8220. BibTeX | Links: @article{Tzagkarakis2020,
title = {Quantifying the Computational Efficiency of Compressive Sensing in Smart Water Network Infrastructures},
author = {George Tzagkarakis and Pavlos Charalampidis and Stylianos Roubakis and Antonis Makrogiannakis and Panagiotis Tsakalides},
url = {https://www.mdpi.com/1424-8220/20/11/3299},
doi = {10.3390/s20113299},
issn = {1424-8220},
year = {2020},
date = {2020-01-01},
journal = {Sensors},
volume = {20},
number = {11},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
Vrachimis, Stelios G; Timotheou, Stelios; Eliades, Demetrios G; Polycarpou, Marios M Iterative Hydraulic Interval State Estimation for Water Distribution Networks Journal Article Journal of Water Resources Planning and Management, 145 (1), pp. 04018087, 2019, ISSN: 0733-9496. BibTeX | Links: @article{Vrachimis2019,
title = {Iterative Hydraulic Interval State Estimation for Water Distribution Networks},
author = {Stelios G Vrachimis and Stelios Timotheou and Demetrios G Eliades and Marios M Polycarpou},
url = {http://ascelibrary.org/doi/10.1061/%28ASCE%29WR.1943-5452.0001011},
doi = {10.1061/(ASCE)WR.1943-5452.0001011},
issn = {0733-9496},
year = {2019},
date = {2019-01-01},
journal = {Journal of Water Resources Planning and Management},
volume = {145},
number = {1},
pages = {04018087},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
Tzagkarakis, George; Nolan, John P; Tsakalides, Panagiotis Compressive Sensing Using Symmetric Alpha-Stable Distributions for Robust Sparse Signal Reconstruction Journal Article IEEE Transactions on Signal Processing, 67 (3), pp. 808-820, 2019. BibTeX | Links: @article{Tzagkarakis2019,
title = {Compressive Sensing Using Symmetric Alpha-Stable Distributions for Robust Sparse Signal Reconstruction},
author = {George Tzagkarakis and John P Nolan and Panagiotis Tsakalides},
doi = {10.1109/TSP.2018.2887400},
year = {2019},
date = {2019-01-01},
journal = {IEEE Transactions on Signal Processing},
volume = {67},
number = {3},
pages = {808-820},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
Inproceedings
|
Bountrogiannis, Konstantinos; Tzagkarakis, George; Tsakalides, Panagiotis Data-driven Kernel-based Probabilistic SAX for Time Series Dimensionality Reduction Inproceedings 2020 28th European Signal Processing Conference (EUSIPCO), pp. 2343-2347, 2021. BibTeX | Links: @inproceedings{Boutrogiannis2021,
title = {Data-driven Kernel-based Probabilistic SAX for Time Series Dimensionality Reduction},
author = {Konstantinos Bountrogiannis and George Tzagkarakis and Panagiotis Tsakalides},
doi = {10.23919/Eusipco47968.2020.9287311},
year = {2021},
date = {2021-01-01},
booktitle = {2020 28th European Signal Processing Conference (EUSIPCO)},
pages = {2343-2347},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
Bountrogiannis, Konstantinos; Tzagkarakis, George; Tsakalides, Panagiotis Anomaly Detection for Symbolic Time Series Representations of Reduced Dimensionality Inproceedings 2020 28th European Signal Processing Conference (EUSIPCO), pp. 2398-2402, 2021. BibTeX | Links: @inproceedings{Bountrogiannis2021a,
title = {Anomaly Detection for Symbolic Time Series Representations of Reduced Dimensionality},
author = {Konstantinos Bountrogiannis and George Tzagkarakis and Panagiotis Tsakalides},
doi = {10.23919/Eusipco47968.2020.9287474},
year = {2021},
date = {2021-01-01},
booktitle = {2020 28th European Signal Processing Conference (EUSIPCO)},
pages = {2398-2402},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
Roubakis, S; Tzagkarakis, G; Tsakalides, P Real-Time Prototyping of Matlab-Java Code Integration for Water Sensor Networks Applications Inproceedings 2019 27th European Signal Processing Conference (EUSIPCO), pp. 1-5, 2019. BibTeX | Links: @inproceedings{Roubakis2019,
title = {Real-Time Prototyping of Matlab-Java Code Integration for Water Sensor Networks Applications},
author = {S Roubakis and G Tzagkarakis and P Tsakalides},
doi = {10.23919/EUSIPCO.2019.8902633},
year = {2019},
date = {2019-01-01},
booktitle = {2019 27th European Signal Processing Conference (EUSIPCO)},
pages = {1-5},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
Zervou, Michaela Areti; Tzagkarakis, George; Tsakalides, Panagiotis Automated Screening of Dyslexia via Dynamical Recurrence Analysis of Wearable Sensor Data Inproceedings 2019 IEEE 19th International Conference on Bioinformatics and Bioengineering (BIBE), pp. 770-774, 2019. BibTeX | Links: @inproceedings{Zervou2019,
title = {Automated Screening of Dyslexia via Dynamical Recurrence Analysis of Wearable Sensor Data},
author = {Michaela Areti Zervou and George Tzagkarakis and Panagiotis Tsakalides},
doi = {10.1109/BIBE.2019.00144},
year = {2019},
date = {2019-01-01},
booktitle = {2019 IEEE 19th International Conference on Bioinformatics and Bioengineering (BIBE)},
pages = {770-774},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
Zervou, M -A; Tzagkarakis, G; Panousopoulou, A; Tsakalides, P A Self-Tuned Architecture for Human Activity Recognition Based on a Dynamical Recurrence Analysis of Wearable Sensor Data Inproceedings 2019 27th European Signal Processing Conference (EUSIPCO), pp. 1-5, 2019. BibTeX | Links: @inproceedings{Zervou2019a,
title = {A Self-Tuned Architecture for Human Activity Recognition Based on a Dynamical Recurrence Analysis of Wearable Sensor Data},
author = {M -A Zervou and G Tzagkarakis and A Panousopoulou and P Tsakalides},
doi = {10.23919/EUSIPCO.2019.8902969},
year = {2019},
date = {2019-01-01},
booktitle = {2019 27th European Signal Processing Conference (EUSIPCO)},
pages = {1-5},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
Vrachimis, Stelios G; Kyriakou, Marios S; Eliades, Demetrios G; Polycarpou, Marios M LeakDB: A benchmark dataset for leakage diagnosis in water distribution networks Inproceedings Proc. of WDSA/CCWI, Ontario, Canada, 2018. Abstract | BibTeX | Links: @inproceedings{Vrachimis2018,
title = {LeakDB: A benchmark dataset for leakage diagnosis in water distribution networks},
author = {Stelios G. Vrachimis and Marios S. Kyriakou and Demetrios G. Eliades and Marios M. Polycarpou},
url = {https://zenodo.org/record/1313116#.W5rCrvZ9i00},
year = {2018},
date = {2018-08-22},
booktitle = {Proc. of WDSA/CCWI},
address = {Ontario, Canada},
abstract = {The increase of streaming data from water utilities is enabling the development of real-time anomaly
and fault detection algorithms that can detect events, such as pipe bursts and leakages. Currently,
there is not a widely accessible dataset of real or realistic leakage scenarios, which could be used as
a common benchmark to compare different algorithms, as well as to support research reproducibility.
In this work we propose the design of a realistic leakage dataset, the Leakage Diagnosis Benchmark
(LeakDB). The dataset is comprised of a large number of artificially created but realistic leakage
scenarios, on different water distribution networks, under varying conditions. Additionally, a scoring
algorithm was developed in MATLAB to evaluate the results of different algorithms using various
metrics. The usage of the LeakDB dataset, is demonstrated by scoring four detection algorithms. The
dataset is stored on an open research data repository, and will be updated in the future with new
simulation scenarios. The source code of the toolkit that generates the leakage benchmark dataset,
as well as the detection algorithms used, are released as open source},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
The increase of streaming data from water utilities is enabling the development of real-time anomaly
and fault detection algorithms that can detect events, such as pipe bursts and leakages. Currently,
there is not a widely accessible dataset of real or realistic leakage scenarios, which could be used as
a common benchmark to compare different algorithms, as well as to support research reproducibility.
In this work we propose the design of a realistic leakage dataset, the Leakage Diagnosis Benchmark
(LeakDB). The dataset is comprised of a large number of artificially created but realistic leakage
scenarios, on different water distribution networks, under varying conditions. Additionally, a scoring
algorithm was developed in MATLAB to evaluate the results of different algorithms using various
metrics. The usage of the LeakDB dataset, is demonstrated by scoring four detection algorithms. The
dataset is stored on an open research data repository, and will be updated in the future with new
simulation scenarios. The source code of the toolkit that generates the leakage benchmark dataset,
as well as the detection algorithms used, are released as open source |
Vrachimis, Stelios G; Eliades, Demetrios G; Polycarpou, Marios M Leak Detection in Water Distribution Systems Using Hydraulic Interval State Estimation Inproceedings 2018 IEEE Conference on Control Technology and Applications (CCTA), pp. 565–570, IEEE, 2018, ISBN: 978-1-5386-7698-1. BibTeX | Links: @inproceedings{Vrachimis2018c,
title = {Leak Detection in Water Distribution Systems Using Hydraulic Interval State Estimation},
author = {Stelios G Vrachimis and Demetrios G Eliades and Marios M Polycarpou},
url = {https://ieeexplore.ieee.org/document/8511516/},
doi = {10.1109/CCTA.2018.8511516},
isbn = {978-1-5386-7698-1},
year = {2018},
date = {2018-08-01},
booktitle = {2018 IEEE Conference on Control Technology and Applications (CCTA)},
pages = {565--570},
publisher = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
Nicolaou, Nicolas; Eliades, Demetrios G; Panayiotou, Christos; Polycarpou, Marios M Reducing Vulnerability to Cyber-physical Attacks in Water Distribution Networks Inproceedings Proc. International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater), pp. 16–19, Porto, Portugal, 2018. Abstract | BibTeX | Links: @inproceedings{Nicolaou2018b,
title = {Reducing Vulnerability to Cyber-physical Attacks in Water Distribution Networks},
author = {Nicolas Nicolaou and Demetrios G. Eliades and Christos Panayiotou and Marios M. Polycarpou},
url = {https://zenodo.org/record/1250406#.W5rBGvZ9i00},
doi = {https://doi.org/10.1109/CySWater.2018.00011},
year = {2018},
date = {2018-03-16},
booktitle = {Proc. International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater)},
journal = {Transactions of Secure Systems},
pages = {16--19},
address = {Porto, Portugal},
abstract = {Cyber-Physical Systems (CPS), such as Water Distribution Networks (WDNs), deploy digital devices to monitor and control the behavior of physical processes. These digital devices, however, are susceptible to cyber and physical attacks, that may alter their functionality, and therefore the integrity of their measurements/actions. In practice, industrial control systems utilize simple control laws, which rely on various sensor measurements and algorithms which are expected to operate normally. To reduce the impact of a potential failure, operators may deploy redundant components; this however may not be useful, e.g., when a cyber attack at a PLC component occurs. In this work, we address the problem of reducing vulnerability to cyber-physical attacks in water distribution networks. This is achieved by augmenting the graph which describes the information flow from sensors to actuators, by adding new connections and algorithms, to increase the number of redundant cyber components. These, in turn, increase the cyber-physical security level, which is defined in the present paper as the number of malicious attacks a CPS may sustain before becoming unable to satisfy the control requirements. A proof-of-concept of the approach is demonstrated over a simple WDN, with intuition on how this can be used to increase the cyber-physical security level of the system.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Cyber-Physical Systems (CPS), such as Water Distribution Networks (WDNs), deploy digital devices to monitor and control the behavior of physical processes. These digital devices, however, are susceptible to cyber and physical attacks, that may alter their functionality, and therefore the integrity of their measurements/actions. In practice, industrial control systems utilize simple control laws, which rely on various sensor measurements and algorithms which are expected to operate normally. To reduce the impact of a potential failure, operators may deploy redundant components; this however may not be useful, e.g., when a cyber attack at a PLC component occurs. In this work, we address the problem of reducing vulnerability to cyber-physical attacks in water distribution networks. This is achieved by augmenting the graph which describes the information flow from sensors to actuators, by adding new connections and algorithms, to increase the number of redundant cyber components. These, in turn, increase the cyber-physical security level, which is defined in the present paper as the number of malicious attacks a CPS may sustain before becoming unable to satisfy the control requirements. A proof-of-concept of the approach is demonstrated over a simple WDN, with intuition on how this can be used to increase the cyber-physical security level of the system. |