1. Blasch, E., Ravela, S., Aved, A. (eds.): Handbook of Dynamic Data Driven Applications Systems. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-95504-9
2. Cao, Y., et al.: Adversarial sensor attack on LiDAR-based perception in autonomous driving. In: Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS 2019), London, UK (November 2019)
3. Combita, L.F., Giraldo, J.A., Cardenas, A.A., Quijano, N.: DDDAS for attack detection and isolation of control systems. In: Blasch, E., Ravela, S., Aved, A. (eds.) Handbook of Dynamic Data Driven Applications Systems, pp. 407–422. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-95504-9_17
4. Davidson, D., Wu, H., Jellinek, R., Ristenpart, T., Singh, V.: Controlling UAVs with sensor input spoofing attacks. In: Proceedings of the 10th USENIX Conference on Offensive Technologies, WOOT 2016, pp. 221–231. USENIX Association, Berkeley (2016)
5. Humphreys, T.E., Ledvina, B.M., Psiaki, M.L., O’Hanlon, B.W., Kintner, P.M.: Assessing the spoofing threat: development of a portable GPS civilian spoofer. In: Radionavigation Laboratory Conference Proceedings (2008)