{"id":"https://openalex.org/W7084143923","doi":"https://doi.org/10.1109/case58245.2025.11164143","title":"Time-Constrained Intelligent Adversaries for Automation Vulnerability Testing: A Multi-Robot Patrol Case Study","display_name":"Time-Constrained Intelligent Adversaries for Automation Vulnerability Testing: A Multi-Robot Patrol Case Study","publication_year":2025,"publication_date":"2025-08-17","ids":{"openalex":"https://openalex.org/W7084143923","doi":"https://doi.org/10.1109/case58245.2025.11164143"},"language":"en","primary_location":{"id":"doi:10.1109/case58245.2025.11164143","is_oa":false,"landing_page_url":"https://doi.org/10.1109/case58245.2025.11164143","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 21st International Conference on Automation Science and Engineering (CASE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research-information.bris.ac.uk/files/469373455/CASE_paper.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"James C. Ward","orcid":null},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"James C. Ward","raw_affiliation_strings":["University of Bristol,School of Engineering Mathematics and Technology"],"affiliations":[{"raw_affiliation_string":"University of Bristol,School of Engineering Mathematics and Technology","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Alex Bott","orcid":null},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Alex Bott","raw_affiliation_strings":["University of Bristol,School of Engineering Mathematics and Technology"],"affiliations":[{"raw_affiliation_string":"University of Bristol,School of Engineering Mathematics and Technology","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Connor York","orcid":null},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Connor York","raw_affiliation_strings":["University of Bristol,School of Engineering Mathematics and Technology"],"affiliations":[{"raw_affiliation_string":"University of Bristol,School of Engineering Mathematics and Technology","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"last","author":{"id":null,"display_name":"Edmund R. Hunt","orcid":null},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Edmund R. Hunt","raw_affiliation_strings":["University of Bristol,School of Engineering Mathematics and Technology"],"affiliations":[{"raw_affiliation_string":"University of Bristol,School of Engineering Mathematics and Technology","institution_ids":["https://openalex.org/I36234482"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I36234482"],"apc_list":null,"apc_paid":null,"fwci":1.4196,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88372061,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"3385","last_page":"3392"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T14353","display_name":"Wireless Sensor Networks for Data Analysis","score":0.125,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14353","display_name":"Wireless Sensor Networks for Data Analysis","score":0.125,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13511","display_name":"Geodetic Measurements and Engineering Structures","score":0.08760000020265579,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13085","display_name":"Education, Psychology, and Social Research","score":0.02419999986886978,"subfield":{"id":"https://openalex.org/subfields/3304","display_name":"Education"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7013999819755554},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.682200014591217},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.5627999901771545},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5415999889373779},{"id":"https://openalex.org/keywords/robot","display_name":"Robot","score":0.47839999198913574},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.35199999809265137},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.34439998865127563}],"concepts":[{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7013999819755554},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.682200014591217},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6492999792098999},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.642300009727478},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.5627999901771545},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5415999889373779},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.47839999198913574},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.35199999809265137},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.34439998865127563},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.3398999869823456},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.3181000053882599},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2872999906539917},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2842999994754791},{"id":"https://openalex.org/C2776544517","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Unexpected events","level":2,"score":0.26980000734329224},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2574999928474426},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.2556000053882599}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/case58245.2025.11164143","is_oa":false,"landing_page_url":"https://doi.org/10.1109/case58245.2025.11164143","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 21st International Conference on Automation Science and Engineering (CASE)","raw_type":"proceedings-article"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/34005341-c513-40ca-9747-76c83da17be9","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/34005341-c513-40ca-9747-76c83da17be9","pdf_url":"https://research-information.bris.ac.uk/files/469373455/CASE_paper.pdf","source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ward, J C, Bott, A, York, C J & Hunt, E R 2025, Time-Constrained Intelligent Adversaries for Automation Vulnerability Testing : A Multi-Robot Patrol Case Study. in 2025 IEEE 21st International Conference on Automation Science and Engineering (CASE). IEEE International Conference on Automation Science and Engineering (CASE), vol. 2025, Institute of Electrical and Electronics Engineers (IEEE), pp. 3385-3392. https://doi.org/10.1109/CASE58245.2025.11164143","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/34005341-c513-40ca-9747-76c83da17be9","is_oa":true,"landing_page_url":"https://hdl.handle.net/1983/34005341-c513-40ca-9747-76c83da17be9","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ward, J C, Bott, A, York, C J & Hunt, E R 2025, Time-Constrained Intelligent Adversaries for Automation Vulnerability Testing : A Multi-Robot Patrol Case Study. in 2025 IEEE 21st International Conference on Automation Science and Engineering (CASE). IEEE International Conference on Automation Science and Engineering (CASE), vol. 2025, Institute of Electrical and Electronics Engineers (IEEE), pp. 3385-3392. https://doi.org/10.1109/CASE58245.2025.11164143","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/34005341-c513-40ca-9747-76c83da17be9","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/34005341-c513-40ca-9747-76c83da17be9","pdf_url":"https://research-information.bris.ac.uk/files/469373455/CASE_paper.pdf","source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ward, J C, Bott, A, York, C J & Hunt, E R 2025, Time-Constrained Intelligent Adversaries for Automation Vulnerability Testing : A Multi-Robot Patrol Case Study. in 2025 IEEE 21st International Conference on Automation Science and Engineering (CASE). IEEE International Conference on Automation Science and Engineering (CASE), vol. 2025, Institute of Electrical and Electronics Engineers (IEEE), pp. 3385-3392. https://doi.org/10.1109/CASE58245.2025.11164143","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7084143923.pdf","grobid_xml":"https://content.openalex.org/works/W7084143923.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1929098649","https://openalex.org/W2047632181","https://openalex.org/W2084243923","https://openalex.org/W2114582139","https://openalex.org/W2125298348","https://openalex.org/W2411650265","https://openalex.org/W2489221610","https://openalex.org/W2557709865","https://openalex.org/W2563105201","https://openalex.org/W2747851981","https://openalex.org/W2845465605","https://openalex.org/W2895830121","https://openalex.org/W2913788502","https://openalex.org/W2917884480","https://openalex.org/W2946892555","https://openalex.org/W2982172847","https://openalex.org/W3023749047","https://openalex.org/W3096120809","https://openalex.org/W3109907338","https://openalex.org/W3130631955","https://openalex.org/W3170635652","https://openalex.org/W4206138072","https://openalex.org/W4232693667","https://openalex.org/W4289444512","https://openalex.org/W4312703642","https://openalex.org/W4379622817","https://openalex.org/W4383108588","https://openalex.org/W4383109336","https://openalex.org/W4408477457","https://openalex.org/W4410357474"],"related_works":[],"abstract_inverted_index":{"Simulating":[0],"hostile":[1],"attacks":[2],"of":[3,31,69],"physical":[4],"autonomous":[5],"systems":[6],"can":[7],"be":[8],"a":[9,36,55,59,64,70,74,96],"useful":[10],"tool":[11],"to":[12,16,48,50,54],"examine":[13,26,101],"their":[14],"robustness":[15],"attack":[17],"and":[18,100],"inform":[19],"vulnerability-aware":[20],"design.":[21,84],"In":[22],"this":[23,27],"work,":[24],"we":[25],"through":[28],"the":[29],"lens":[30],"multi-robot":[32,108],"patrol,":[33],"by":[34],"presenting":[35],"machine":[37],"learning-based":[38],"adversary":[39],"model":[40,65,90],"that":[41,87],"observes":[42],"robot":[43],"patrol":[44,71,82,109],"behavior":[45],"in":[46],"order":[47],"attempt":[49],"gain":[51],"undetected":[52],"access":[53],"secure":[56],"environment":[57],"within":[58],"limited":[60],"time":[61],"duration.":[62],"Such":[63],"allows":[66],"for":[67],"evaluation":[68],"system":[72],"against":[73,104],"realistic":[75],"potential":[76],"adversary,":[77],"offering":[78],"insight":[79],"into":[80],"future":[81],"strategy":[83],"We":[85],"show":[86],"our":[88],"new":[89],"outperforms":[91],"existing":[92],"baselines,":[93],"thus":[94],"providing":[95],"more":[97],"stringent":[98],"test,":[99],"its":[102],"performance":[103],"multiple":[105],"leading":[106],"decentralized":[107],"strategies.":[110]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
