Zeeshan Haider, Dilshad Sabir, Laiq Khan, Zahid Ullah
{"title":"A Comparative Study of Decision Tree, RNNs and CNNs for Detection of False Data Injection Attacks in Cyber-Physical Power Systems","authors":"Zeeshan Haider, Dilshad Sabir, Laiq Khan, Zahid Ullah","doi":"10.1049/cps2.70047","DOIUrl":"https://doi.org/10.1049/cps2.70047","url":null,"abstract":"<p>External connectivity for smart grid involving internet, data equipment, relays and breakers is essential to provide reliable and secure power supply. However, their interconnectivity also makes the grid susceptible to external threats with potential to damage equipment and cause power supply disruptions and safety hazards like false data injection attacks (FDIAs). In this paper, intrusion detection for FDIAs is proposed using three approaches. (1) A stack-based model containing an expansion decision tree and neural network, (2) recurrent neural metworks (RNNs) and (3) convolutional neural networks (CNNs). The experiment evaluation is performed using a publicly available dataset of Mississippi State University and Oak Ridge Nation Laboratory. On the provided dataset, the top performance is achieved on image-based classification using ResNet-18 with accuracy, precision, recall and F1 score of 97%, 97%, 95% and 96%, respectively. The DNN-GRU framework achieved accuracy, precision, recall and F1 score of 88%, 78%, 72% and 75%, respectively. Similarly, a version of the stack model of expansion decision tree and neural network combination achieved accuracy, precision, recall and F1 score of 95%, 95%, 95% and 95%, respectively. Each of these proposed methods has different preprocessing steps with different results. ResNet 18 has outperformed the hybrid model and recurrent neural network in precision, recall, F1 score and accuracy, which results in correct predictions, better identifying true positives (recall), avoiding false positives (precision) and achieving a robust balance between them (F1 score).</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2026-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70047","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147687003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Monowar Uddin Talukdar, Khayrul Alam, Mohammad Rakibul Islam Bhuiyan, Md. Mominul Islam, David (Jingjun) Xu, Samsul Alam
{"title":"Mapping the Digital Twin Technology in Supply Chain Management: A Bibliometric Trends Analysis","authors":"Md. Monowar Uddin Talukdar, Khayrul Alam, Mohammad Rakibul Islam Bhuiyan, Md. Mominul Islam, David (Jingjun) Xu, Samsul Alam","doi":"10.1049/cps2.70046","DOIUrl":"10.1049/cps2.70046","url":null,"abstract":"<p>This study examines the scientific literature on digital twin technology (DTT) in supply chain management (SCM), utilising bibliometric analysis to investigate the annual publication trend, keyword co-occurrence, bibliographic coupling and co-citation regarding foundational themes in SCM, as well as international collaborations. The Scopus dataset is analysed for the period from 2009 to 2024, encompassing a total of 1256 publications, which are analysed using VOSviewer software. This study reviews trends in the application of DTT within SCM, featuring tables, graphs and maps that illustrate key performance metrics for article production. The findings indicate a rising number of publications over the years, with the United States, United Kingdom, Germany and India being the most prolific nations in terms of publishing and collaboration leaders. The most influential keywords related to DTT in SCM include supply chains (SCs), additive manufacturing (AM), 3D printing, digital twin (DT) and sustainability. The authors identify four distinct thematic clusters: AM and SC innovation; shaping parts and service SCs; sustainability and global impact; and DT and Industry 4.0, which are relevant for current and future researchers in this area. The study is useful for researchers, practitioners and policymakers interested in comprehending, implementing and further studying DTT in various sectors of SCM.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2026-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70046","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147686913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Danish Hudani, Muhammad Haseeb, Muhammad Taufiq, Muhammad Azmi Umer, Nandha Kumar Kandasamy, Aditya P. Mathur
{"title":"A Design-Driven Machine Learning Approach for Invariant Mining in a Smart Grid","authors":"Danish Hudani, Muhammad Haseeb, Muhammad Taufiq, Muhammad Azmi Umer, Nandha Kumar Kandasamy, Aditya P. Mathur","doi":"10.1049/cps2.70043","DOIUrl":"https://doi.org/10.1049/cps2.70043","url":null,"abstract":"<p>The study reported here was undertaken to investigate how invariants (rules) that govern the operation of a critical infrastructure can be mined automatically. Unsupervised machine learning was used to extract invariants from data generated by a testbed that includes electric power generation, transmission and distribution. The mined invariants were validated against multiple operational scenarios from the testbed to assess their suitability for future deployment in monitoring and anomaly detection. The complete list of invariants generated is available as a dataset.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2026-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70043","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147567339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Justin Moskolaï Ngossaha, Verlaine Rostand Nwokam, Raymond Houé Ngouna, Samuel Bowong Tsakou, Bernard Archimède
{"title":"Towards Adaptative Cyber-Physical Transportation System: From Knowledge Elicitation to Meta-Architecture Based on Clustering Algorithm","authors":"Justin Moskolaï Ngossaha, Verlaine Rostand Nwokam, Raymond Houé Ngouna, Samuel Bowong Tsakou, Bernard Archimède","doi":"10.1049/cps2.70044","DOIUrl":"https://doi.org/10.1049/cps2.70044","url":null,"abstract":"<p>Transportation systems are increasingly evolving into highly integrated cyber-physical environments that demand advanced coordination between computational intelligence and physical infrastructure. In response to growing requirements for sustainability, resilience and adaptability, this paper proposes a cyber-physical transportation system (CPTS) framework that prioritises real-time data-driven decision-making. The framework captures the dynamic interactions between cyber components (e.g., sensing, computation and communication) and physical subsystems (e.g., infrastructure, vehicles and users), thereby enabling continuous monitoring, anomaly detection and adaptive control. At its core lies a meta-architectural design developed through structured knowledge elicitation and operationalised via a design structure matrix (DSM) clustering algorithm to manage system complexity and behavioural evolution. This approach strengthens the system's capacity to detect failures and uncover latent mobility demands, ultimately supporting strategic transportation planning. A real-world case study validates the framework's effectiveness in guiding policymakers and stakeholders towards the creation of intelligent, sustainable and responsive transportation infrastructures. The findings underscore the transformative potential of CPTS in advancing transportation decision-making through integrated cyber-physical reasoning and adaptive system design.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2026-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70044","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147567338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SKE2SG: A Secure Key Establishment Scheme for Smart Grid Cyber-Physical Systems Based on Elliptic Curve Cryptography","authors":"Ahmad Rahdari, Bahareh Akhbari","doi":"10.1049/cps2.70045","DOIUrl":"https://doi.org/10.1049/cps2.70045","url":null,"abstract":"<p>Smart grids combine cyber systems with complex physical networks and present numerous technological challenges. One example is the implementation of communication technology, specifically within the advanced metering infrastructure, which has made it an attractive target for attackers. Cyber attacks, such as impersonation, unauthorised data access, fraud, energy theft, and reduced network reliability, are some of the threats faced by smart grids. Notably, recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication, claiming their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment. In response to these shortcomings, this paper introduces a novel elliptic curve cryptography-based key establishment scheme, specifically designed to enhance communication security in smart grid cyber-physical systems. A comprehensive and comparative analysis of the security attributes of the proposed scheme is presented. Furthermore, the security of the scheme is formally validated within the random oracle under the Canetti-Krawczyk security model. The AVISPA tool is also leveraged to verify the security assertions. The findings demonstrate that the proposed protocol is pioneering in efficiently satisfying the non-repudiation feature, simultaneously ensuring user anonymity and perfect forward secrecy. It exhibits robustness against various well-known attacks, including Denial of Service and ephemeral secret leakage attacks, all while effectively managing both computational complexity and communication costs.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2026-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70045","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147566900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber–Human Social Co-Operating System: Application Design and Implementation","authors":"Takeshi Kato, Misa Owa, Junichi Miyakoshi, Yasuhiro Asa, Takashi Numata, Yasuyuki Kudo, Tadayuki Matsumura, Kanako Esaki, Ryuji Mine, Toru Yasumura, Hikaru Matsunaka, Satomi Hori","doi":"10.1049/cps2.70041","DOIUrl":"https://doi.org/10.1049/cps2.70041","url":null,"abstract":"<p>Cyber-physical systems have been proposed for Industry 5.0 and Society 5.0. One such CPS is the Social Co-OS (cyber–human social co-operating system). Social Co-OS is a co-operating system between cyber and human societies that views the social system as a dynamic circular structure composed of three layers: individual behaviour, interindividual interaction and institutional formation. Within this framework, the cyber system supports collective decision-making and individual cooperative behaviour across these layers. The objective of this study is to define a novel application architecture based on the Social Co-OS concept, design a user interface flow and implement it in practice. Specifically, we develop a social impact evaluator, a pluralistic policy simulator and a consensus-building facilitator, which constitute the deliberative and political loop of Social Co-OS. Additionally, we implement a personality estimator and a behaviour change promoter, which constitute the operational and administrative loop, along with a common mediator that serves as the cyber–human interface. Through these implementations, we demonstrate that Social Co-OS applications can effectively support human social systems and offer practical utility for policy co-making and cooperation as evidenced by examples grounded in real-world challenges. In the future, we aim to promote the wider adoption of digital democracy and cooperative platforms.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2026-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70041","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146224019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SmartWeed: An Autonomous Rover System for Real-Time Weed Detection and Classification in Agricultural Fields","authors":"Md Shahriar Hossain Apu, Suman Saha","doi":"10.1049/cps2.70039","DOIUrl":"https://doi.org/10.1049/cps2.70039","url":null,"abstract":"<p>Weeds are a significant challenge to crop quality and quantity and therefore there is a need to adopt effective weed control and management systems. Nowadays, object detection has found extensive applications in the agricultural field such as the detection of weeds through deep learning, machine learning, image processing and IoT. The idea in this paper is to present the proposal of an autonomous rover that can identify and classify weeds in real time using the YOLO object detection method. The dataset that will be utilised in the current research is a collection of 5997 images of weed instances, allowing even more accurate detection and classification of weeds. We also combined the Convolutional Block Attention Module (CBAM) with YOLO to enable the model to pay attention to the useful spatial and channel-wise features, as an evaluation of the performance of various YOLO models is based on inference time and weed detection accuracy. Based on the experiment, YOLOv8 and its variant YOLOv8-X demonstrated the best mean average precision (mAP) of 93.6% with that inference times of 3.4 and 2.2 ms per image, respectively. YOLOv9-E (an extension of YOLOv9) using CBAM, on the other hand, had better mAP of 99.5% with inference times of 10.6 and 2.5 ms, respectively. These findings indicate that YOLOv8 and YOLOv9 hold a good prospective of automatic field-level weed detection and emphasise the significance of high-quality datasets, efficient model architectures and attention mechanisms to the efficient and correct autonomous weed management.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2026-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70039","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146096597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Modelling and Analysis of Cyber-Physical System Security Against DoS Attacks Using Generalised Stochastic Petri Nets","authors":"Mahdi Jafarpour, M. Sami Fadali","doi":"10.1049/cps2.70036","DOIUrl":"https://doi.org/10.1049/cps2.70036","url":null,"abstract":"<p>This paper proposes a new framework for the analysis of cyber-physical system security against denial-of-service (DoS) attacks using generalised stochastic Petri nets. Although cyber-physical systems, through increased integration of computational and physical processes, offer great advantages, they are subject to cyber threats that can disrupt their critical operations. Among them, DoS attacks, which overload communication channels and prohibit the exchange of data between system components, are a major concern. Traditional methods of security assessment are inadequate given the unique complexities of cyber-physical system architectures. This research presents a generalised stochastic Petri net-based model able to capture the dynamics of a cyber-physical system under attack scenarios for the comprehensive analysis of system vulnerabilities and defencive mechanisms. The model incorporates immediate and timed transitions, thus mapping both continuous operations of the cyber-physical system and the discrete-event nature of cyber threats. Simulation experiments validate the effectiveness of the model in demonstrating how DoS attacks can degrade system performance. The results reflect the need for improved methodologies for security testing in order to enhance the resilience of cyber-physical systems, particularly in safety-critical applications.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2026-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70036","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146096488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alireza Mohamadkhani, Marc Geilen, Jeroen Voeten, Twan Basten
{"title":"Time- and Behaviour-Preserving Execution of Determinate Supervisory Control","authors":"Alireza Mohamadkhani, Marc Geilen, Jeroen Voeten, Twan Basten","doi":"10.1049/cps2.70038","DOIUrl":"https://doi.org/10.1049/cps2.70038","url":null,"abstract":"<p>Behaviours and activities are natural concepts (found, e.g., in UML and SysML) for model-driven design of cyber-physical systems (CPS). These concepts are formalised in the <i>activity framework</i>, a model-based framework incorporating a model of activities with determinate timing and behaviour, and a strong mathematical foundation based on max-plus algebra that allows efficient timing analysis and optimisation. It provides a layered view of the system's actions and events, activities built from them, and sequences of activities that capture the overall behaviour of the system. Implementations of supervisory control for CPS to govern the system behaviour are often made by hand. Preserving the specified behaviour and the model-predicted timing in an implementation is challenging, due to the need to simultaneously handle <i>action timing, synchronisation, concurrency, pipelining</i> and <i>plant feedback</i>. We introduce an execution architecture and engine to automatically synthesise an implementation of a supervisory controller directly from a model specification. The execution engine is guaranteed to execute a specification in a time- and behaviour-preserving fashion, even in the presence of action timing variations and including event feedback in a physical execution. We prove that the architecture and engine preserve the specified ordering of actions and events of the model as well as the timing thereof, up to a known bound. We validate our approach on a prototype production system.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2026-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70038","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145964282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zequn Wang, Muhammad Azmi Umer, Haibo Zhang, Naveed ul Hassan, Chuadhry Mujeeb Ahmed
{"title":"Guardians of ICS: A Comparative Analysis of Anomaly Detection Techniques","authors":"Zequn Wang, Muhammad Azmi Umer, Haibo Zhang, Naveed ul Hassan, Chuadhry Mujeeb Ahmed","doi":"10.1049/cps2.70037","DOIUrl":"https://doi.org/10.1049/cps2.70037","url":null,"abstract":"<p>The security of industrial control systems (ICSs) is crucial due to their integral role in critical national infrastructure. This study tackles the escalating challenges posed by sophisticated cyberattacks, especially those that are unknown and evade existing detection mechanisms. Despite extensive research, there is a notable gap in systematically comparing supervised and unsupervised learning models for anomaly detection, leading to inconsistent evaluations of their effectiveness. To bridge this gap, we developed a comprehensive anomaly detection framework to systematically evaluate these models, focusing on their capability to detect unknown attacks. Utilising operational data from the Secure Water Treatment (SWaT) testbed, we assessed six unsupervised and five supervised learning methods. Our findings reveal significant performance disparities: supervised models excel in precision but have higher undetected rates, whereas unsupervised models achieve superior recall at the expense of increased false alarm rates. This study provides critical insights into the strengths and limitations of both approaches, guiding the development of more robust ICS security solutions.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2026-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70037","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145904897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}