


default search action
IET Cyber-Physical Systems: Theory & Applications, Volume 9
Volume 9, Number 1, March 2024
REVIEW
- Gang Lin

, Christian Rehtanz
, Shaoyang Wang, Jiayan Liu
, Zhenyu Zhang
, Pengcheng Wang:
Review on the key technologies of power grid cyber-physical systems simulation. 1-16
ORIGINAL RESEARCH
- Di Yang

, Ming Ji, Yuntong Lv, Mengyu Li, Xuezhe Gao:
Power user portrait model based on random forest. 17-26 - Vahid Tahani

, Mohammad Haddad Zarif, Hossein Gholizade-Narm
:
A new stable scheme against false data injection attacks in distributed control microgrid. 27-40 - Hongjin Yao

, Yisheng Li, Yunpeng Sun
, Zhichao Lian:
Selective real-time adversarial perturbations against deep reinforcement learning agents. 41-49 - Yongzhen Guo, Li Li

, Yuanqing Xia
, Yanxin Wen, Jingjing Guo:
Distributed consensus-based estimation for non-linear systems subject to missing measurements and Denial of Service attacks. 50-62 - Yupeng Liu

, Bofeng Yan, Jia Yu:
Multi objective task resource allocation method based on hierarchical Bayesian adaptive sparsity for edge computing in low voltage stations. 63-71 - Hossein Malekpour Naghneh, Maryamparisa Amani, Alireza Farhadi

, Mohammad Taghi Isaai:
Application of the closed loop industrial internet of things (IIoT)-based control system in enhancing the oil recovery factor and the oil production. 72-86 - Ying Li, Lei Zhao, Junwei Geng, Jinhui Hu, Lei Ma, Zilong Zhao

:
Unsafe behaviour detection with the improved YOLOv5 model. 87-98
Volume 9, Number 2, June 2024
GUEST EDITORIAL
- Rocco Zaccagnino

, Arcangelo Castiglione, Marek R. Ogiela, Florin Pop, Weizhi Meng
:
Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing. 99-101
ORIGINAL RESEARCH
- Tommaso Baldo, Mauro Migliardi

:
SwarmAd: A decentralised content management system. 102-114 - Biagio Boi

, Christian Esposito
:
Securing the Internet of Medical Things with ECG-based PUF encryption. 115-124 - Pooja Rani, Rohit Lamba, Ravi Kumar Sachdeva

, Karan Kumar
, Celestine Iwendi
:
A machine learning model for Alzheimer's disease prediction. 125-134 - Saket Sarin, Sunil K. Singh

, Sudhakar Kumar
, Shivam Goyal, Brij B. Gupta
, Varsha Arya, Kwok Tai Chui
:
SEIR-driven semantic integration framework: Internet of Things-enhanced epidemiological surveillance in COVID-19 outbreaks using recurrent neural networks. 135-149
CASE STUDY
- Adrian Florea

, Daniel-Ioan Popa, Daniel Morariu
, Ionela Maniu
, Lasse Berntzen, Ugo Fiore
:
Digital farming based on a smart and user-friendly IoT irrigation system: A conifer nursery case study. 150-168
REVIEW
- Katherine van Lopik, Steven Hayward

, Rebecca Grant
, Laura McGirr, Paul A. Goodall
, Yan Jin
, Mark Price
, Andrew A. West, Paul P. Conway:
A review of design frameworks for human-cyber-physical systems moving from industry 4 to 5. 169-183
ORIGINAL RESEARCH
- Yue Meng, Yu Song, Yuquan Chen, Xin Zhang, Mei Wu, Biao Du:

A swin transformer based bird nest detection approach with unmanned aerial vehicle images for power distribution and pole towers. 184-193 - Angxin Liu

, Yongbiao Yang:
A multilevel segmentation method of asymmetric semantics based on deep learning. 194-205
Volume 9, Number 3, September 2024
Review
- Yang Liu, Sihui Chen, Peiyi Li, Jiayu Wan

, Xin Li
:
Status, challenges, and promises of data-driven battery lifetime prediction under cyber-physical system context. 207-217
Original Research
- Yongquan Wu, Xuan Zhao

, Xinsheng Zhang, Tao Long, Ping Luo:
Feature attention gated context aggregation network for single image dehazing and its application on unmanned aerial vehicle images. 218-227 - Hongwei Li, Danai Chasaki

:
Detecting covert channel attacks on cyber-physical systems. 228-237 - Xiaoqing Mai

, Tianhu Zhang, Changwu Hu, Yan Zhang:
Feature selection algorithm for substation main equipment defect text mining based on natural language processing. 238-246 - Zhao Liangfu

, Yujie Xiong, Yongbin Gao, Wenjun Yu:
Multiple dependence representation of attention graph convolutional network relation extraction model. 247-257 - Bijan Nasiri, Farhad Bayat

, MohammadAli Mohammadkhani
, Andrzej Bartoszewicz:
Optimal congestion management in network routers subject to constraints, disturbances, and noise using the model predictive control approach. 258-268 - Dipta Neogi

, Mahirul Alam Chowdhury
, Moriom Akter
, Md. Ishan Arefin Hossain
:
Mobile detection of cataracts with an optimised lightweight deep Edge Intelligent technique. 269-281 - M. Agus Syamsul Arifin

, Deris Stiawan
, Bhakti Yudho Suprapto
, Susanto, Tasmi Salim, Mohd Yazid Idris, Rahmat Budiarto
:
Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870-5-104. 282-292
Volume 9, Number 4, 2024
- József Szolosi

, Peter Magyar, József Antal, Béla J. Szekeres
, Gabor Farkas, Mátyás Andó:
Cyber-physical-based welding systems: Components and implementation strategies. 293-312 - Muhammad Irfan

, Alireza Sadighian
, Adeen Tanveer
, Shaikha J. Al-Naimi
, Gabriele Oligeri
:
A survey on detection and localisation of false data injection attacks in smart grids. 313-333 - Zhicong Sun

, Guang Chen, Yulong Ding, Shuang-Hua Yang
:
Joint safety and security risk analysis in industrial cyber-physical systems: A survey. 334-349 - Ayodeji O. Rotibi

, Neetesh Saxena
, Pete Burnap:
Winning the battle with cyber risk identification tools in industrial control systems: A review. 350-365 - Lu Jiang

, Di Jia, Jiping Xu, Cui Zhu
, Kun Liu, Yuanqing Xia
:
Event-triggered attack detection and state estimation based on Gaussian mixture model. 366-374 - Seema Yadav, Nand Kishor

, Shubhi Purwar, Saikat Chakrabarti
, Petra Raussi
, Avinash Kumar
:
Real-time implementation for vulnerability of power components under switching attack based on sliding mode. 375-391 - Nicholas Jacobs, Shamina Hossain-McKenzie

, Shining Sun, Emily Payne, Adam Summers, Leen Al Homoud, Astrid Layton, Kate Davis, Christopher Goes:
Leveraging graph clustering techniques for cyber-physical system analysis to enhance disturbance characterisation. 392-406 - Mohsen Moradi, Amir Hossein Jahangir

:
A Petri net model for Time-Delay Attack detection in Precision Time Protocol-based networks. 407-423 - Ahmed Maqbol

, Okba Kazar
, Saad Harous:
Cyber-physical system model based on multi-agent system. 424-434 - Shining Sun, Hao Huang

, Emily Payne, Shamina Hossain-McKenzie
, Nicholas Jacobs, H. Vincent Poor, Astrid Layton, Katherine M. Rogers:
A graph embedding-based approach for automatic cyber-physical power system risk assessment to prevent and mitigate threats at scale. 435-453 - Mohammad Almuhaini

:
Resilience quantification model for cyber-physical power systems. 454-462 - Amir Norouzi Mobarakeh, Mohammad Ataei

, Rahmat-Allah Hooshmand
:
The threat of zero-dynamics attack on non-linear cyber-physical systems. 463-476 - Namrata Jiten Patel, Ashish Jadhav:

Design of an efficient dynamic context-based privacy policy deployment model via dual bioinspired Q learning optimisations. 477-496 - Takumi Namba

, Kiyotsugu Takaba
:
Cloud-mediated self-triggered synchronisation of a general linear multi-agent system over a directed graph. 497-508 - Xingyu Qu, Chengkun Peng, Peng Lu, Bing Ge, Shuang Zhang, Qinghe Wang, Zhenyang Li:

A three-vector model predicting torque control of permanent magnet synchronous motor with a fixed weight coefficient. 509-520

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














