


default search action
IET Cyber-Physical Systems: Theory & Applications, Volume 5
Volume 5, Number 1, 2020
- Lucas C. Cordeiro

, Eddie Batista de Lima Filho, Iury Valente de Bessa
:
Survey on automated symbolic verification and its application for synthesising cyber-physical systems. 1-24 - Md. Masud Rana

, Rui Bo:
IoT-based cyber-physical communication architecture: challenges and research directions. 25-30 - Shane Lambert, Haitao Lu, Zane Shreve, Yi Zhan, A. K. M. Jahangir Alam Majumder

, Gokhan Sahin
:
Low-powered wearable motion detecting system using static electric fields. 31-38 - Fang Fang

, Songyuan Yu, Le Wei, Yajuan Liu, Jizhen Liu:
Data-driven control for combustion process of circulating fluidised bed boiler. 39-48 - Hadis Karimipour

, Henry Leung:
Relaxation-based anomaly detection in cyber-physical systems using ensemble kalman filter. 49-58 - Md. Al Maruf

, Akramul Azim:
Extending resources for avoiding overloads of mixed-criticality tasks in cyber-physical systems. 60-70 - Lili Zhao, Ming Ni, Heqin Tong, Yuecen Li:

Design and application of distributed co-simulation platform for cyber physical power system based on the concepts of software bus and middleware. 71-79 - Yordanos Kassa Semero

, Jianhua Zhang, Dehua Zheng:
Optimal energy management strategy in microgrids with mixed energy resources and energy storage system. 80-84 - Fotis Foukalas

, Paul Pop
:
Distributed control plane for safe cooperative vehicular cyber physical systems. 85-91 - Shawkat Sabah Khairullah

, Carl R. Elks
:
Self-repairing hardware architecture for safety-critical cyber-physical-systems. 92-99 - Huei-Yung Lin

, Fang-Ning Yang:
Design and implementation of a CPS-based predictive maintenance and automated management platform. 100-109 - Yuancheng Li

, Wendan Huo, Rixuan Qiu, Jing Zeng
:
Efficient detection of false data injection attack with invertible automatic encoder and long-short-term memory. 110-118 - Jiankang Wang, Gonzalo E. Constante

, Christian Moya
, Junho Hong:
Semantic analysis framework for protecting the power grid against monitoring-control attacks. 119-126 - Patrick Slade

, Zachary N. Sunberg
, Mykel J. Kochenderfer
:
Estimation and control using sampling-based Bayesian reinforcement learning. 127-135
Volume 5, Number 2, 2020
- Kiran Deep Singh

, Sandeep K. Sood
:
5G ready optical fog-assisted cyber-physical system for IoT applications. 137-144 - Yongmei Liu, Songhuai Du, Wanxing Sheng

:
Classification and identification of electric shock current for safety operation in power distribution network. 145-152 - Xirong Ning, Jin Jiang

:
In the mind of an insider attacker on cyber-physical systems and how not being fooled. 153-161 - Deguang Li

, Ruiling Zhang, Shijie Jia, Dong Liu, Yanling Jin, Junke Li:
Improved dynamic frequency-scaling approach for energy-saving-based radial basis function neural network. 162-167 - Gokhan Cetin

, M. Sami Fadali, Hao Xu:
Optimal resource allocation in networked control systems. 168-175 - Liming Sheng, Jian Zhou, Xin Li, Yifan Pan, Linfeng Liu:

Water quality prediction method based on preferred classification. 176-180 - Yingqiong Peng, Muxin Liao, Hong Deng, Ling Ao, Yuxia Song, Weiji Huang, Jing Hua:

CNN-SVM: a classification method for fruit fly image with the complex background. 181-185 - Tamara Becejac

, Crystal Eppinger, Aditya Ashok
, Urmila Agrawal
, James O'Brien:
PRIME: a real-time cyber-physical systems testbed: from wide-area monitoring, protection, and control prototyping to operator training and beyond. 186-195 - Kai Peng, Hualong Huang, Wenjie Pan

, Jiabin Wang:
Joint optimisation for time consumption and energy consumption of multi-application and load balancing of cloudlets in mobile edge computing. 196-206 - Arsalan Rasoolzadeh

, Farzad Rajaei Salmasi:
Mitigating zero dynamic attack in communication link-enabled droop-controlled hybrid AC/DC microgrids. 207-217 - Abdelrahman Ayad

, Hany Essa Zidan Farag, Amr M. Youssef, Ehab F. El-Saadany:
Cyber-physical attacks on power distribution systems. 218-225 - Hugh Gowing, Paul Cuffe

:
Hijacking internet-connected devices to provoke harmful oscillations in an electrical network: a feasibility assessment. 226-231
Volume 5, Number 3, September 2020
- Md Musabbir Hossain

, Chen Peng:
Cyber-physical security for on-going smart grid initiatives: a survey. 233-244 - Yiran Shi, Shengjun Xue, Xing Zhang, Tao Huang:

Data-aware monitoring method for fuel economy in ship-based CPS. 245-252 - Zhaohua Hu, JiaJing Huang:

Re-detection object tracking algorithm in the cyber physical system. 253-262 - Aradhna Patel

, Shubhi Purwar:
Event-triggered detection of cyberattacks on load frequency control. 263-273 - Jay Johnson

, Ifeoma Onunkwo, Patricia Cordeiro, Brian J. Wright, Nicholas Jacobs, Christine Lai:
Assessing DER network cybersecurity defences in a power-communication co-simulation environment. 274-282 - Sonja Happ

, Stefan Dähling
, Antonello Monti
:
Scalable assessment method for agent-based control in cyber-physical distribution grids. 283-291 - Xiaomeng Feng

, Qiuye Sun:
Stochastic games for power grid coordinated defence against coordinated attacks. 292-300 - Song Deng, Qingyuan Cai, Zi Zhang, Lechan Yang, Tinglei Huang, Changan Yuan:

Data filter function incremental mining based on feature selection in an active distribution network. 301-309
Volume 5, Number 4, December 2020
- Farhad Farokhi

, Iman Shames, Karl Henrik Johansson
:
Private routing and ride-sharing using homomorphic encryption. 311-320 - B. M. Ruhul Amin

, Seyedfoad Taghizadeh
, Md. Shihanur Rahman, Md. Jahangir Hossain
, Vijay Varadharajan, Zhiyong Chen:
Cyber attacks in smart grid - dynamic impacts, analyses and recommendations. 321-329 - Ayaskanta Mishra

, Arun Kumar Ray:
IoT cloud-based cyber-physical system for efficient solid waste management in smart cities: a novel cost function based route optimisation technique for waste collection vehicles using dustbin sensors and real-time road traffic informatics. 330-341 - Tao Huang, Shengjun Xue, Yumei Hu, Yiran Shi, Wei Jin:

Data privacy-based coordinated placement method of workflows and data. 342-350 - Fatemeh Akbarian, Amin Ramezani, Mohammad Taghi Hamidi Beheshti, Vahid Haghighat:

Advanced algorithm to detect stealthy cyber attacks on automatic generation control in smart grid. 351-358 - Walter Lucia

, Amr M. Youssef:
Wyner wiretap-like encoding scheme for cyber-physical systems. 359-365 - Mithu Sarkar, Bidyadhar Subudhi

:
Unified Smith predictor-based loop-shaping H ∞ damping controller for mitigating inter-area oscillations in power system. 366-375 - John Mbuli

, Tarik Chargui
, Damien Trentesaux, Abdelghani Bekrar, Thierry Dailly:
Multi-agent system for the reactive fleet maintenance support planning of a fleet of mobile cyber-physical systems. 376-387 - Boya Qin

, Dong Liu
, Yiming Lu:
Formal verification of ontology transformation for distribution network information model based on meta-model theory. 388-393 - Sheetla Prasad

:
Counteractive control against cyber-attack uncertainties on frequency regulation in the power system. 394-408

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














