


default search action
IET Cyber-Physical Systems: Theory & Applications, Volume 4
Volume 4, Number 1, 2019
- Guest Editorial: Cyber-Physical Systems for Power Distribution Systems. 1-2

- Yongxiang Cai, Wei Tang, Bo Zhang, Yue Wang

:
Collaborative configuration for distributed energy storages and cyber systems in low-voltage distribution networks with high penetration of PV systems. 3-12 - Wei Pei

, Xin Ma
, Wei Deng, Xinhe Chen, Hongjian Sun
, Dan Li:
Industrial multi-energy and production management scheme in cyber-physical environments: a case study in a battery manufacturing plant. 13-21 - Qiang Yang, Weijie Hao, Leijiao Ge

, Wei Ruan, Fujian Chi:
FARIMA model-based communication traffic anomaly detection in intelligent electric power substations. 22-29 - Yuxuan Wang, Fengji Luo

, Zhaoyang Dong
, Ziyuan Tong, Yichen Qiao:
Distributed meter data aggregation framework based on Blockchain and homomorphic encryption. 30-37 - Ge Cao, Wei Gu, Chenxiao Gu, Wanxing Sheng

, Jing Pan, Rui Li, Lijing Sun:
Real-time cyber-physical system co-simulation testbed for microgrids control. 38-45 - Wenhao Shi, Xiangming Wen, Xi Han, Zhaoming Lu, Chunlei Sun, Yang Li:

Research on strategy about time-of-use pricing and economic operation of power supplier based on Stackelberg game. 46-49 - Hamed Orojloo, Mohammad Abdollahi Azgomi

:
Modelling and evaluation of the security of cyber-physical systems using stochastic Petri nets. 50-57 - Khyati Chopra, Ranjan Bose, Anupam Joshi

:
Stackelberg game for price and power control in secure cooperative relay network. 58-67 - A. Robert Singh

, D. Devaraj, R. Narmatha Banu
:
Geographic HWMP (Geo-HWMP) routing method for AMI network with lossless packet forwarding. 68-78 - Theis Bo Rasmussen

, Guangya Yang
, Arne Hejde Nielsen, Zhao Yang Dong
:
Application of functional modelling for monitoring of WTG in a cyber-physical environment. 79-87
Volume 4, Number 2, 2019
- Louis Dressel, Mykel J. Kochenderfer

:
Tutorial on the generation of ergodic trajectories with projection-based gradient descent. 89-100 - Qi Wang, Wei Tai, Yi Tang, Ming Ni:

Review of the false data injection attack against the cyber-physical power system. 101-107 - Moein Sabounchi

, Jin Wei
, Dongchan Lee, Deepa Kundur:
Flocking-based adaptive granular control strategy for autonomous microgrids in emergency situations. 108-119 - Maurizio Mongelli

, Enrico Ferrari
, Marco Muselli, Alessandro Fermi:
Performance validation of vehicle platooning through intelligible analytics. 120-127 - Prabhakar Gunasekaran

, Selvaperumal Sundaramoorthy, Nedumal Pugazhenthi Pulikesi:
Fault data injection attack on car-following model and mitigation based on interval type-2 fuzzy logic controller. 128-138 - Chia-Hung Lin, Wei-Ling Chen, Chung-Dann Kan:

Inflow and outflow stenoses screening on biophysical experimental arteriovenous graft using big spectral data and bidirectional associative memory machine learning model. 139-147 - Marco Andreacchio

, Abdelghani Bekrar, Rachid Benmansour
, Damien Trentesaux
:
Assessing cyber-physical systems to balance maintenance replacement policies and optimise long-run average costs for aircraft assets. 148-155 - Giovanna Sannino, Ivanoe De Falco, Giuseppe De Pietro:

Towards a cyber physical system for personalised and automatic OSA treatment. 156-163 - Sujay Narayana

, Rangarao Venkatesha Prasad
, Kevin Warmerdam:
Mind your thoughts: BCI using single EEG electrode. 164-172 - Tanushree Agarwal, Payam Niknejad

, Abolfazl Rahimnejad, Mohammadreza Barzegaran, Luigi Vanfretti:
Cyber-physical microgrid components fault prognosis using electromagnetic sensors. 173-178 - Sandeep Kumar Singh

, Ranjan Bose, Anupam Joshi
:
Energy theft detection for AMI using principal component analysis based reconstructed data. 179-185
Volume 4, Number 3, 2019
- Guest Editorial: Social and Human Aspects of Cyber-Physical Systems. 187-188

- Hailay Berihu Abebe

, Chih-Lyang Hwang:
RGB-D face recognition using LBP with suitable feature dimension of depth image. 189-197 - Yuchou Chang:

Architecture design for performing grasp-and-lift tasks in brain-machine-interface-based human-in-the-loop robotic system. 198-203 - Takuya Toyono, Hirotaka Osawa:

Power of looking together: an analysis of social facilitation by Agent's mutual gaze. 204-208 - Zhiyong Fu

, Chiju Chao, Huan Wang, Yandi Wang:
Toward the participatory human-centred community an exploration of cyber-physical public design for urban experience. 209-213 - Qingshu Zeng, Bing Jiang, Qijun Duan:

Integrated evaluation of hardware and software interfaces for automotive human-machine interaction. 214-220 - Xiaorong Lyu, Yulong Ding, Shuang-Hua Yang

:
Safety and security risk assessment in cyber-physical systems. 221-232 - Md. Zakirul Alam Bhuiyan, George J. Anders

, Jason Philhower, Songhuai Du:
Review of static risk-based security assessment in power system. 233-239 - Jay Johnson

, Jimmy E. Quiroz, Ricky J. Concepcion, Felipe Wilches-Bernal
, Matthew J. Reno:
Power system effects and mitigation recommendations for DER cyberattacks. 240-249 - Hao Ren

, Ratnesh Kumar:
Simulation-based verification of bounded-horizon safety for hybrid systems using dynamic number of simulations. 250-258 - Luhao Wang, Massoud Pedram:

QoS guaranteed online management of battery swapping station under dynamic energy pricing. 259-264 - Etinosa Ekomwenrenren, Hatem A. Alharbi, Taisir Elgorashi, Jaafar M. H. Elmirghani

, Petros Aristidou
:
Stabilising control strategy for cyber-physical power systems. 265-275 - Chandan Karfa

, Dipankar Sarkar, Chittaranjan Mandal:
Verification of parallelising transformations of KPN models. 276-289
Volume 4, Number 4, 2019
- Swaroop Ranjan Mishra, Meher Preetam Korukonda, Laxmidhar Behera

, Anupam Shukla:
Enabling cyber-physical demand response in smart grids via conjoint communication and controller design. 291-303 - Shanshan Bi, Tianchen Wang, Lei Wang, Maciej Zawodniok:

Novel cyber fault prognosis and resilience control for cyber-physical systems. 304-312 - Venkatesh Venkataramanan, Adam Hahn, Anurag Srivastava

:
CyPhyR: a cyber-physical analysis tool for measuring and enabling resiliency in microgrids. 313-321 - Qutaiba Ibrahim Ali

:
Realisation of a self-powered, secured and robust disaster recovery network. 322-331 - Halima Ibrahim Kure, Shareeful Islam:

Assets focus risk management framework for critical infrastructure cybersecurity risk management. 332-340 - Mohammad Jafari

, Amir Ghasemkhani
, Vahid Sarfi, Hanif Livani, Lei Yang, Hao Xu:
Biologically inspired adaptive intelligent secondary control for MGs under cyber imperfections. 341-352 - Ning Chen

, Jiayang Dai
, Shuang Tian, Weihua Gui:
Data fusion based on-line product quality evaluation of ternary cathode material cyber-physical systems. 353-364 - Nima Nikmehr

, Solmaz Moradi Moghadam:
Game-theoretic cybersecurity analysis for false data injection attack on networked microgrids. 365-373 - Heqin Tong, Ming Ni, Lili Zhao, Manli Li:

Flexible hardware-in-the-loop testbed for cyber physical power system simulation. 374-381 - Aradhna Patel

, Shubhi Purwar:
Switching attacks on smart grid using non-linear sliding surface. 382-392

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














