default search action
IET Cyber-Physical Systems: Theory & Applications, Volume 5
Volume 5, Number 1, 2020
- Lucas C. Cordeiro, Eddie Batista de Lima Filho, Iury Valente de Bessa:
Survey on automated symbolic verification and its application for synthesising cyber-physical systems. 1-24 - Md. Masud Rana, Rui Bo:
IoT-based cyber-physical communication architecture: challenges and research directions. 25-30 - Shane Lambert, Haitao Lu, Zane Shreve, Yi Zhan, A. K. M. Jahangir Alam Majumder, Gokhan Sahin:
Low-powered wearable motion detecting system using static electric fields. 31-38 - Fang Fang, Songyuan Yu, Le Wei, Yajuan Liu, Jizhen Liu:
Data-driven control for combustion process of circulating fluidised bed boiler. 39-48 - Hadis Karimipour, Henry Leung:
Relaxation-based anomaly detection in cyber-physical systems using ensemble kalman filter. 49-58 - Md. Al Maruf, Akramul Azim:
Extending resources for avoiding overloads of mixed-criticality tasks in cyber-physical systems. 60-70 - Lili Zhao, Ming Ni, Heqin Tong, Yuecen Li:
Design and application of distributed co-simulation platform for cyber physical power system based on the concepts of software bus and middleware. 71-79 - Yordanos Kassa Semero, Jianhua Zhang, Dehua Zheng:
Optimal energy management strategy in microgrids with mixed energy resources and energy storage system. 80-84 - Fotis Foukalas, Paul Pop:
Distributed control plane for safe cooperative vehicular cyber physical systems. 85-91 - Shawkat Sabah Khairullah, Carl R. Elks:
Self-repairing hardware architecture for safety-critical cyber-physical-systems. 92-99 - Huei-Yung Lin, Fang-Ning Yang:
Design and implementation of a CPS-based predictive maintenance and automated management platform. 100-109 - Yuancheng Li, Wendan Huo, Rixuan Qiu, Jing Zeng:
Efficient detection of false data injection attack with invertible automatic encoder and long-short-term memory. 110-118 - Jiankang Wang, Gonzalo E. Constante, Christian Moya, Junho Hong:
Semantic analysis framework for protecting the power grid against monitoring-control attacks. 119-126 - Patrick Slade, Zachary N. Sunberg, Mykel J. Kochenderfer:
Estimation and control using sampling-based Bayesian reinforcement learning. 127-135
Volume 5, Number 2, 2020
- Kiran Deep Singh, Sandeep K. Sood:
5G ready optical fog-assisted cyber-physical system for IoT applications. 137-144 - Yongmei Liu, Songhuai Du, Wanxing Sheng:
Classification and identification of electric shock current for safety operation in power distribution network. 145-152 - Xirong Ning, Jin Jiang:
In the mind of an insider attacker on cyber-physical systems and how not being fooled. 153-161 - Deguang Li, Ruiling Zhang, Shijie Jia, Dong Liu, Yanling Jin, Junke Li:
Improved dynamic frequency-scaling approach for energy-saving-based radial basis function neural network. 162-167 - Gokhan Cetin, M. Sami Fadali, Hao Xu:
Optimal resource allocation in networked control systems. 168-175 - Liming Sheng, Jian Zhou, Xin Li, Yifan Pan, Linfeng Liu:
Water quality prediction method based on preferred classification. 176-180 - Yingqiong Peng, Muxin Liao, Hong Deng, Ling Ao, Yuxia Song, Weiji Huang, Jing Hua:
CNN-SVM: a classification method for fruit fly image with the complex background. 181-185 - Tamara Becejac, Crystal Eppinger, Aditya Ashok, Urmila Agrawal, James O'Brien:
PRIME: a real-time cyber-physical systems testbed: from wide-area monitoring, protection, and control prototyping to operator training and beyond. 186-195 - Kai Peng, Hualong Huang, Wenjie Pan, Jiabin Wang:
Joint optimisation for time consumption and energy consumption of multi-application and load balancing of cloudlets in mobile edge computing. 196-206 - Arsalan Rasoolzadeh, Farzad Rajaei Salmasi:
Mitigating zero dynamic attack in communication link-enabled droop-controlled hybrid AC/DC microgrids. 207-217 - Abdelrahman Ayad, Hany Essa Zidan Farag, Amr M. Youssef, Ehab F. El-Saadany:
Cyber-physical attacks on power distribution systems. 218-225 - Hugh Gowing, Paul Cuffe:
Hijacking internet-connected devices to provoke harmful oscillations in an electrical network: a feasibility assessment. 226-231
Volume 5, Number 3, September 2020
- Md Musabbir Hossain, Chen Peng:
Cyber-physical security for on-going smart grid initiatives: a survey. 233-244 - Yiran Shi, Shengjun Xue, Xing Zhang, Tao Huang:
Data-aware monitoring method for fuel economy in ship-based CPS. 245-252 - Zhaohua Hu, JiaJing Huang:
Re-detection object tracking algorithm in the cyber physical system. 253-262 - Aradhna Patel, Shubhi Purwar:
Event-triggered detection of cyberattacks on load frequency control. 263-273 - Jay Johnson, Ifeoma Onunkwo, Patricia Cordeiro, Brian J. Wright, Nicholas Jacobs, Christine Lai:
Assessing DER network cybersecurity defences in a power-communication co-simulation environment. 274-282 - Sonja Happ, Stefan Dähling, Antonello Monti:
Scalable assessment method for agent-based control in cyber-physical distribution grids. 283-291 - Xiaomeng Feng, Qiuye Sun:
Stochastic games for power grid coordinated defence against coordinated attacks. 292-300 - Song Deng, Qingyuan Cai, Zi Zhang, Lechan Yang, Tinglei Huang, Changan Yuan:
Data filter function incremental mining based on feature selection in an active distribution network. 301-309
Volume 5, Number 4, December 2020
- Farhad Farokhi, Iman Shames, Karl Henrik Johansson:
Private routing and ride-sharing using homomorphic encryption. 311-320 - B. M. Ruhul Amin, Seyedfoad Taghizadeh, Md. Shihanur Rahman, Md. Jahangir Hossain, Vijay Varadharajan, Zhiyong Chen:
Cyber attacks in smart grid - dynamic impacts, analyses and recommendations. 321-329 - Ayaskanta Mishra, Arun Kumar Ray:
IoT cloud-based cyber-physical system for efficient solid waste management in smart cities: a novel cost function based route optimisation technique for waste collection vehicles using dustbin sensors and real-time road traffic informatics. 330-341 - Tao Huang, Shengjun Xue, Yumei Hu, Yiran Shi, Wei Jin:
Data privacy-based coordinated placement method of workflows and data. 342-350 - Fatemeh Akbarian, Amin Ramezani, Mohammad Taghi Hamidi Beheshti, Vahid Haghighat:
Advanced algorithm to detect stealthy cyber attacks on automatic generation control in smart grid. 351-358 - Walter Lucia, Amr M. Youssef:
Wyner wiretap-like encoding scheme for cyber-physical systems. 359-365 - Mithu Sarkar, Bidyadhar Subudhi:
Unified Smith predictor-based loop-shaping H ∞ damping controller for mitigating inter-area oscillations in power system. 366-375 - John Mbuli, Tarik Chargui, Damien Trentesaux, Abdelghani Bekrar, Thierry Dailly:
Multi-agent system for the reactive fleet maintenance support planning of a fleet of mobile cyber-physical systems. 376-387 - Boya Qin, Dong Liu, Yiming Lu:
Formal verification of ontology transformation for distribution network information model based on meta-model theory. 388-393 - Sheetla Prasad:
Counteractive control against cyber-attack uncertainties on frequency regulation in the power system. 394-408
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.