Back

Dipl.-Ing. Dr. Henri Ruotsalainen

  • Researcher
  • Department of Computer Science and Security
Location: B - Campus-Platz 1
P: +43/2742/313 228 692

Study programmes

  • IT Security (BA)
  • Information Security (MA)

Departments

  • Computer Science and Security

Projects

Download CV

Publications

Kuchar, K., Holasova, E., Pospisil, O., Ruotsalainen, H., Fujdiak, R., & Wagner, A. (2023). Hunting Network Anomalies in a Railway Axle Counter System. Sensors, 23(6), 3122. https://doi.org/10.3390/s23063122
Kondapuram, A. R., Treytl, A., Ruotsalainen, H., & Sauter, T. (2023). Metadata Enhanced Security Watermarks for Sensor Data Protection. 2023 IEEE Applied Sensing Conference (APSCON), 1–3. https://doi.org/10.1109/APSCON56343.2023.10101177
Huber, E., Treytl, A., Sauter, T., Ruotsalainen, H., Pospisil, B., Kieseberg, P., & Seeböck, W. (2023). Wie Smart Home Geräte zur Eintrittsfalle für Kriminelle werden können. Fachtagung Kriminologische Zentralstelle (KrimG), 131–148.
Treytl, A., Kondapuram, A. R., Sauter, T., & Ruotsalainen, H. (2022). Comprehensive Analysis of Supply Voltage Watermarking for Protection of Sensor Systems. 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), 1–8. https://doi.org/10.1109/ETFA52439.2022.9921737
Ruotsalainen, H. (2022). Reactive Jamming Detection for LoRaWAN Based on Meta-Data Differencing. Proceedings of the 17th International Conference on Availability, Reliability and Security, 1–8. https://doi.org/10.1145/3538969.3543805
Ruotsalainen, H. (2022, April 28). Smart Home Automation, Today&Tomorrow. Expertenmeeting - IEA Annex 56 "IoT und Digitalisierung für Wärmepumpen".
Ruotsalainen, H., Shen, G., Zhang, J., & Fujdiak, R. (2022). LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review. Sensors, 22(9), 3127. https://doi.org/10.3390/s22093127
Ruotsalainen, H., Treytl, A., & Sauter, T. (2021). Watermarking Based Sensor Attack Detection in Home Automation Systems. 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ), 1–8. https://doi.org/10/gnt2wj
Pospisil, O., Fujdiak, R., Mikhaylov, K., Ruotsalainen, H., & Misurec, J. (2021). Testbed for LoRaWAN Security: Design and Validation through Man-in-the-Middle Attacks Study. Applied Sciences, 11(16), 7642. https://doi.org/https://doi.org/10.3390/app11167642
Ruotsalainen, H., Zhang, J., & Grebeniuk, S. (2019). Experimental Investigation on Wireless Key Generation for Low Power Wide Area Networks. IEEE Internet of Things Journal. https://doi.org/10/ggxwns
Ruotsalainen, H. (2018, November 16). How to secure IoT on the wireless physical layer. IT-SECX, St. Pölten, Austria. https://itsecx.fhstp.ac.at/content/download/166239/file/04_Henri-Ruotsalainen_FH-St.-P%C3%B6lten.pdf
Ruotsalainen, H., & Grebeniuk, S. (2018). Towards Wireless Secret key Agreement with LoRa Physical Layer. Proceedings of the 13th International Conference on Availability, Reliability and Security. ARES 2018, Hamburg, Deutschland. https://doi.org/10/gh3732
Ruotsalainen, H. (2017, October 11). Identifying Attacks in Electrical Sub-Station Networks. IT-SECX, St. Pölten, Austria. https://itsecx.fhstp.ac.at/wp-content/uploads/2017/11/03_Routsalainen_ITSecx2017.pdf
Hodo, E., Grebeniuk, S., Ruotsalainen, H., & Tavolato, P. (2017). Anomaly Detection for Simulated IEC-60870-5-104 Trafiic. ARES - S-CI 2017: S-CI II - Critical Infrastructure Systems CyberSecurity Tools. https://doi.org/10/gh372t
Leder, N., Pichler, B., Faseth, T., Ruotsalainen, H., & Arthaber, H. (2016). Hierarchical-Table-Based Model for All-Digital RF Transmitters. IEEE Transactions on Microwave Theory and Techniques, 99. https://doi.org/10/f9t8nr