{"title":"‘ReLIC: Reduced Logic Inference for Composition’ for Quantifier Elimination-Based Compositional Reasoning and Verification","authors":"Hao Ren, Ratnesh Kumar","doi":"10.1049/cps2.70033","DOIUrl":"https://doi.org/10.1049/cps2.70033","url":null,"abstract":"<p>Formally verifying complex model-based designs has posed a significant challenge for complex systems, primarily due to their sheer scale and the critical nature of safety involved. A common method for tackling this challenge is the divide-and-conquer strategy, which leverages the system model architecture to decompose the verification tasks into smaller subtasks focused on subsystems or components. This approach entails articulating the verification goals as formal property contracts and subsequently verifying each one separately. Once the individual contracts of the subsystems or components are validated, they are integrated through formal reasoning to achieve verification at the system level also represented as a formal property contract. However, the current procedures and tools designed for this type of compositional verification often requires manual postulation of system-level contracts and are susceptible to false alarms in verification outcomes due to over-approximation. In the paper, we introduce our approach to compositional reasoning and verification using quantifier elimination (QE), which automates the derivation of the strongest system-level property given the component-level ones and their connectivity, enabling precise automated analysis for even time-dependent and nonlinear systems. QE serves as the foundation for <i>composition calculus</i>, allowing us to derive the <i>strongest system-level property</i> in a single step. We begin by applying this framework to properties that are time-independent, and subsequently, we expand our approach to encompass the composition of time-dependent properties. For the latter case, we shift the given properties over time to span the time horizon of interest, which we show to be no greater than the total time horizons of the component-level properties. Similarly, we use QE to infer the system-initial-condition from the component-level initial conditions. The automatically inferred strongest system-level property becomes useful in verifying a postulated desired system-level property through induction, involving inferred strongest system-level property and its initial condition. In this regard, we also advance the existing <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>k</mi>\u0000 </mrow>\u0000 <annotation> $k$</annotation>\u0000 </semantics></math>-induction based model-checking by incorporating QE and formulating its base and inductive steps as QE problems. Our composition approach is uniform regardless of the type of composition (cascade/parallel/feedback) and regardless the component properties being composed are time-independent or time-dependent. We also present a prototype verifier called ReLIC (Reduced Logic Inference for Composition), which implements our approach and demonstrate it through several illustrative and practical examples. We also demonstrate the recent integration of our approach into an i","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70033","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145224546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Subir Gupta, Upasana Adhikari, Pinky Pramanik, Subrata Chowdhury, Shreyas J., Anurag Sinha, Saifullah Khalid, Malathi S. Y.
{"title":"Optimising Energy Efficiency in Agricultural Consumer Electronics Using Principal Component Analysis and Deep Q-Learning","authors":"Subir Gupta, Upasana Adhikari, Pinky Pramanik, Subrata Chowdhury, Shreyas J., Anurag Sinha, Saifullah Khalid, Malathi S. Y.","doi":"10.1049/cps2.70029","DOIUrl":"10.1049/cps2.70029","url":null,"abstract":"<p>The ability to reduce emissions and improve sustainability in agricultural consumer electronics has been significantly hindered due to the use of energy-intensive technology within the agricultural sector. This study proposes a new enhancement of deep Q-learning (DQN) with principal component analysis (PCA) focused on energy efficiency. PCA helps manage massive operational data by performing dimensionality reduction, whereas DQN, a reinforcement learning paradigm, optimises decision-making during real-world interactions. The main contribution of this study is in the combined use of PCA and DQN to form customisable, precise, contest-responsive energy frameworks powered by real-time analytics on agricultural data—energy management on such a scale has not been approached in the context of sustainable agriculture before. The experiments confirm the optimal model, further achieving a cumulative reward of 72.56, an average emission of 1.83, a <i>Q</i>-value of 24.76 and a total zenith value of 75.40% in ensuring numerous noncriteria-defined efficient energy-dependent operations. This paradigm not only fills the void in the automation of passive intelligent agricultural systems but also serves as a point of reference for other eco-critical domains to strive towards greener technology.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70029","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144997884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Panahazari, Guangming Yao, Jianhua Zhang, Jing Wang
{"title":"Cyber-Resilient Distributed Energy Resource Control Algorithms for Smart Distribution Grids","authors":"Mohammad Panahazari, Guangming Yao, Jianhua Zhang, Jing Wang","doi":"10.1049/cps2.70032","DOIUrl":"10.1049/cps2.70032","url":null,"abstract":"<p>This paper focuses on the development of cyber-resilient gradient-based optimisation algorithms and theoretical proof for grid-interactive distributed energy resource (DER) control to enable two grid services of virtual power plants (VPPs) dispatch and grid voltage regulation, considering the communication and security impacts. Firstly, the combined DER dispatch and voltage regulation as a real-time gradient-based optimisation problem is recapped. Thereafter, we consider a probabilistic traffic model to characterise packet delays and loss in a communication network, and study how the delays enter the process of information exchange among the grid measurement units, local DER controllers and the grid control centre that execute this control algorithm in a coordinated manner. Then, a strategy combining delay thresholds and message update rules is proposed to immunity the asynchrony resulting from the communications traffic and it avoids possible numerical instabilities and sensitivities of the power tracking and voltage regulation capabilities, resulting as cyber-resilient DER control algorithms. Additionally, their convergence is theoretically proved. Effectiveness of proposed cyber-resilient algorithms has been validated on the IEEE 37-bus system in terms of convergence, VPP tracking and voltage regulation performance for smart distribution systems with high penetration of DERs.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70032","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144997883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peng Zhou, Chang Liu, Jiacan Xu, Zinan Wang, Shubing Liu
{"title":"APHformerNET: A Gear Fault Diagnosis Model Based on Adaptive Prototype Hashing Optimisation Algorithm","authors":"Peng Zhou, Chang Liu, Jiacan Xu, Zinan Wang, Shubing Liu","doi":"10.1049/cps2.70028","DOIUrl":"10.1049/cps2.70028","url":null,"abstract":"<p>Fault-diagnosis methods based on deep learning technology have been widely applied in gear fault diagnosis. Gearboxes often operate under complex and harsh conditions, which can lead to faults. Therefore, monitoring the condition of gearboxes and diagnosing faults are crucial for ensuring the reliability and safety of the system. In response, this paper proposes a gear fault diagnosis model based on the adaptive prototype hashing (APH) optimisation algorithm for diagnosing faults in rotating machinery. This method combines the advantages of adaptive prototype hashing with transformers to improve the accuracy of fault diagnosis. The model utilises an adaptive prototype selection mechanism to dynamically select the most representative samples as prototypes and employs the transformer model to extract feature representations of the input data. In classification tasks using two datasets, the model achieved an accuracy of 98.11% under normal conditions. In experiments with added white noise and a smaller sample size, the accuracies reached 96.81% and 86.41%, respectively. Additionally, we conducted ablation experiments with advanced transformer models, where the APHformer model incorporating the APH layer achieved fault diagnosis accuracies exceeding 97%, significantly outperforming other combinations. Furthermore, T-SNE visualisation results indicate that the method performs well in feature representation. This study provides important insights into the field of gear fault diagnosis based on deep learning and has potential practical application values.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70028","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144716483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating Cybersecurity Risks in Grids With a High Penetration of Distributed Renewables","authors":"Matthew Green, Shahram Sarkani, Thomas Mazzuchi","doi":"10.1049/cps2.70026","DOIUrl":"10.1049/cps2.70026","url":null,"abstract":"<p>The increasing penetration of distributed renewables creates new threats to the optimal planning, management, and operation of the electric grid. In particular, new standards that mandate real-time visibility and communications to grid operations, coupled with supply-constrained inverter manufacturers, have exposed the electric grid to increased cyber risk and challenges to resiliency. Despite these developments, the electric industry must fully understand the emerging threats and develop a comprehensive and balanced approach to mitigation of the cyberattack risk by grid operators while maintaining the overall grid resiliency that connected and communicating renewables can provide. This study explores the impact of a coordinated cybersecurity attack on distributed renewables in the electric grid and proposes a novel approach to reduce the disruption of services to customers. This approach is anchored on a shift from centralised multi-party control to decentralised node-based control. It provides a starting point to address the overall framework for connecting, controlling, and securing distributed renewables, which can improve cybersecurity protection levels while maintaining the reliability of connected energy assets.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70026","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144624218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jingli Liu, Peng Ren, Xin Yang, Mengyu Li, Xiaobo Cao, Long Fu
{"title":"Transient Synchronous Stability Control for a Wind Solar Gas Energy Storage Integrated Energy Management System Considering Carbon Constraints and Dynamic Characteristics","authors":"Jingli Liu, Peng Ren, Xin Yang, Mengyu Li, Xiaobo Cao, Long Fu","doi":"10.1049/cps2.70027","DOIUrl":"10.1049/cps2.70027","url":null,"abstract":"<p>Traditional integrated energy management systems may lack comprehensive scheduling and management strategies for wind, solar and natural gas energy storage. This may lead to imbalanced utilisation of energy and the inability to fully utilise the advantages of various energy sources, thereby affecting the economy and operational efficiency of the system. A transient synchronous stability control method for wind, solar and natural gas energy storage integrated energy management systems considering carbon constraints and dynamic characteristics is proposed. Firstly, with the optimisation objective of system economy, a combined dynamic stability analysis method for photovoltaic panels, wind turbines and gas turbines is proposed based on the carbon constraints and dynamic characteristics distribution of wind, solar, gas and energy storage integrated energy management systems. A comprehensive energy management rule model for wind, solar and natural gas storage is established. This comprehensive energy management rule model can help the system achieve comprehensive scheduling and management of wind, solar and natural gas energy storage, in order to maximise the economic and operational efficiency of the system. Then, the model was analysed based on the characteristics of total fuel consumption and unit fuel price. The operational cost is used to describe the lifecycle control project of the material price management system and a control project is constructed with the goal of integrating the annual total cost of the energy system. Finally, the grid search algorithm is used to find the optimal combination of optimisation variables. This model uses transient synchronous control variables for optimisation and solution, such as system radiation conditions, wind conditions, stepped electricity pricing system loads and equipment parameters. Realise transient synchronous and stable control of the integrated energy management system of wind, light, gas and energy storage. The simulation results show that the WS-G-EMS transient synchronisation control using this method has good stability and excellent performance with good stability and small convergence error.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144524820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data-Driven Anomaly Detection and Mitigation for FACTS-Based Wide-Area Voltage Control System","authors":"Vivek Kumar Singh, Manimaran Govindarasu, Reynaldo Nuqui","doi":"10.1049/cps2.70020","DOIUrl":"10.1049/cps2.70020","url":null,"abstract":"<p>Wide-area voltage control system (WAVCS) ensures comprehensive voltage security and optimal management of power resources by incorporating flexible alternating current transmission system (FACTS) devices. However, due to its reliance on a wide-area communication network and coordination with FACTS-based local controllers, WAVCS is susceptible to cyberattacks. To address this issue, we propose a data-driven attack-resilient system (DARS) that integrates a machine learning-based anomaly detection system (ADS) and rules-based attack mitigation system (RAMS) to detect data integrity attacks and initiate necessary corrective actions to restore the grid operation after disturbances. The proposed ADS utilises the variational mode decomposition (VMD) technique to extract sub-signal modes from the measurement signals of WAVCS and computes statistics features to detect data integrity attacks using machine learning algorithms. Our proposed methodology is evaluated by emulating the fuzzy logic-based WAVCS, as developed by the Bonneville Power Administration (BPA), for Kundur's four machine two-area system. The WAVCS applies <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>V</mi>\u0000 </mrow>\u0000 <annotation> $V$</annotation>\u0000 </semantics></math> mag<span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>Q</mi>\u0000 </mrow>\u0000 <annotation> $Q$</annotation>\u0000 </semantics></math> algorithm that utilises synchrophasor measurements (voltage magnitude and reactive power) to compute an optimal set-point for FACTS devices. Experimental results show that our proposed algorithm (VMD-DT) with statistics features outperforms existing machine learning algorithms while exhibiting a smaller processing time. Also, the proposed RAMS is effective in maintaining transient voltage stability within acceptable voltage limits by triggering different modes of operations upon detection of anomalies in grid network.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70020","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144315253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling False Data Injection and Denial of Service Attacks in Cyber-Physical Microgrids","authors":"Abbas Ahmadi, Mahdieh S. Sadabadi, Qobad Shafiee","doi":"10.1049/cps2.70025","DOIUrl":"10.1049/cps2.70025","url":null,"abstract":"<p>To ensure normal and efficient operation, microgrids (MGs) must fully integrate information and communication technologies into their control systems. However, this integration introduces vulnerabilities to cyberattacks that can compromise sensitive data and disrupt operations. In MGs, two distinct types of data communication flows pose cybersecurity risks. The first involves local data transfers, which occur directly between devices based on their MAC addresses. The second involves network-wide data transmission using the Internet protocol (IP). When assessing the potential impact of cyberattacks on control systems, it is crucial to consider the specific nature of the protocols in use. This research analyses the impact of cyberattacks on data transmission in MGs and develops appropriate models for well-known attack types. It introduces updated models for false data injection (FDI) and denial of service (DoS) attacks to evaluate their impact on numerical stream data in MGs. Experimental and simulation-based validations are conducted to develop accurate cyberattack models and support the design of resilient control systems. The vulnerability of MGs' secondary control to these cyberattacks is assessed through MATLAB simulations. The results indicate that the impact of each attack depends on factors such as the packet sampling time, the injected data values (for FDI attacks) and the induced delays (for DoS attacks).</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70025","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144299692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guest Editorial: Security and Privacy of Cyber-Physical System","authors":"Xiaojie Zhu, Jiankun Hu, Waqas Haider","doi":"10.1049/cps2.70012","DOIUrl":"10.1049/cps2.70012","url":null,"abstract":"<p>Cyber-physical systems (CPS) serve as the backbone of critical infrastructure, seamlessly integrating computation, networking and physical processes. However, the growing interconnectivity of these systems also increases their exposure to sophisticated cyber threats. Ensuring the security and privacy of CPS is crucial to maintaining operational stability, preventing service disruptions and mitigating cascading failures.</p><p>This Special Issue presents cutting-edge research addressing diverse aspects of CPS security, ranging from attack methodologies to vulnerability assessments and resilience strategies. The selected papers provide insights into real-time attack implementations, advanced analytics using graph theory, multi-stage cyber threat scenarios and socio-technical security modelling.</p><p>In this Special Issue, we have received 7 papers, all of which underwent peer review. Of the six originally submitted papers, four have been accepted and two have been ‘rejected with referral’, that is, they did not meet the criteria for publication to the IET Cyber-Physical Systems: Theory & Applications, and on. Thus, the overall submissions were of high quality, which marks the success of this Special Issue.</p><p>The four eventually accepted papers can be categorised into four key themes: (1) cyber-physical attack modelling and system vulnerability, (2) graph-based cyber-physical system security analysis, (3) multi-stage cyber threats and impact assessment and (4) socio-technical security modelling for cyber-physical systems.</p><p>Yadav et al. investigate the impact of sliding mode-based switching attacks on power system components. By leveraging real-time simulation techniques, the study highlights how cyber-attacks on circuit breakers, excitation systems and governors can lead to cascading failures. The results offer valuable insights into the vulnerabilities of power grids and the need for proactive mitigation measures.</p><p>Jacobs et al. introduce a novel graph clustering approach for analysing cyber-physical interactions in smart grid environments. The study demonstrates how clustering techniques can help characterise disturbances, identify critical system components and enhance situational awareness. These findings pave the way for improved cybersecurity strategies by enabling better detection and response mechanisms.</p><p>Al Homoud et al. present an in-depth case study on a multi-stage cyber threat targeting power systems. The research details how cyber intrusions can escalate, leading to severe physical consequences in the grid. By leveraging the MITRE ATT&CK framework, the authors propose defence strategies that enhance the resilience of cyber-physical energy management systems.</p><p>Ani et al. explore socio-technical security modelling and simulation (STSec-M&S) in cyber-physical systems (CPS) to enhance critical infrastructure (CI) cybersecurity, emphasising its potential for integrating technical and social aspects to","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70012","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144292921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intrusion Detection System for Wind Turbines Based on Thermal Models","authors":"Ngoc Que Anh Tran, Liang He","doi":"10.1049/cps2.70024","DOIUrl":"10.1049/cps2.70024","url":null,"abstract":"<p>Wind energy plays an essential position in the renewable energy sector and is frequently deployed remotely, which makes them susceptible to intrusions that can compromise their operational system. This paper introduces a novel method <span>T–IDS</span> leveraging the interconnected thermal behaviours of wind turbine modules to identify the abnormal imprints that signify security breaches. Our approach consists of three key components: a graph model that outlines the dependencies among the thermal variables of the turbines, a random forest-based prediction strategy for these variables within the thermal graph and an anomaly detection method that assesses the predicted thermal values with actual observations. We performed extensive experiments using three real-world wind turbine supervisory control and data acquisition (SCADA) log datasets: one dataset collected over six months and two additional datasets covering 12-month operational durations from distinct wind turbine installations for rigorous cross-validation. The results demonstrate that <span>T–IDS</span> achieves an overall anomaly detection accuracy of 97.3% when detecting unusual thermal activities such as physical model damage leading to overheating or tampering temperature readings.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70024","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144264659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}