Dipl.-Ing. Dr. Henri Ruotsalainen

  • Researcher
  • Department of Computer Science and Security
Location: B - Campus-Platz 1
P: +43/2742/313 228 692

Study programmes

  • IT Security (BA)
  • Information Security (MA)


  • Computer Science and Security


Download CV


Kuchar, K., Holasova, E., Pospisil, O., Ruotsalainen, H., Fujdiak, R., & Wagner, A. (2023). Hunting Network Anomalies in a Railway Axle Counter System. Sensors, 23(6), 3122.
Kondapuram, A. R., Treytl, A., Ruotsalainen, H., & Sauter, T. (2023). Metadata Enhanced Security Watermarks for Sensor Data Protection. 2023 IEEE Applied Sensing Conference (APSCON), 1–3.
Huber, E., Treytl, A., Sauter, T., Ruotsalainen, H., Pospisil, B., Kieseberg, P., & Seeböck, W. (2023). Wie Smart Home Geräte zur Eintrittsfalle für Kriminelle werden können. Fachtagung Kriminologische Zentralstelle (KrimG), 131–148.
Treytl, A., Kondapuram, A. R., Sauter, T., & Ruotsalainen, H. (2022). Comprehensive Analysis of Supply Voltage Watermarking for Protection of Sensor Systems. 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), 1–8.
Ruotsalainen, H. (2022). Reactive Jamming Detection for LoRaWAN Based on Meta-Data Differencing. Proceedings of the 17th International Conference on Availability, Reliability and Security, 1–8.
Ruotsalainen, H. (2022, April 28). Smart Home Automation, Today&Tomorrow. Expertenmeeting - IEA Annex 56 "IoT und Digitalisierung für Wärmepumpen".
Ruotsalainen, H., Shen, G., Zhang, J., & Fujdiak, R. (2022). LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review. Sensors, 22(9), 3127.
Ruotsalainen, H., Treytl, A., & Sauter, T. (2021). Watermarking Based Sensor Attack Detection in Home Automation Systems. 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ), 1–8.
Pospisil, O., Fujdiak, R., Mikhaylov, K., Ruotsalainen, H., & Misurec, J. (2021). Testbed for LoRaWAN Security: Design and Validation through Man-in-the-Middle Attacks Study. Applied Sciences, 11(16), 7642.
Ruotsalainen, H., Zhang, J., & Grebeniuk, S. (2019). Experimental Investigation on Wireless Key Generation for Low Power Wide Area Networks. IEEE Internet of Things Journal.
Ruotsalainen, H. (2018, November 16). How to secure IoT on the wireless physical layer. IT-SECX, St. Pölten, Austria.
Ruotsalainen, H., & Grebeniuk, S. (2018). Towards Wireless Secret key Agreement with LoRa Physical Layer. Proceedings of the 13th International Conference on Availability, Reliability and Security. ARES 2018, Hamburg, Deutschland.
Ruotsalainen, H. (2017, October 11). Identifying Attacks in Electrical Sub-Station Networks. IT-SECX, St. Pölten, Austria.
Hodo, E., Grebeniuk, S., Ruotsalainen, H., & Tavolato, P. (2017). Anomaly Detection for Simulated IEC-60870-5-104 Trafiic. ARES - S-CI 2017: S-CI II - Critical Infrastructure Systems CyberSecurity Tools.
Leder, N., Pichler, B., Faseth, T., Ruotsalainen, H., & Arthaber, H. (2016). Hierarchical-Table-Based Model for All-Digital RF Transmitters. IEEE Transactions on Microwave Theory and Techniques, 99.