{"title":"A Review of Energy Aware Cyber-Physical Systems","authors":"Houssam Kanso, Adel Noureddine, E. Exposito","doi":"10.1080/23335777.2022.2163298","DOIUrl":"https://doi.org/10.1080/23335777.2022.2163298","url":null,"abstract":"","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79379540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sekar, S. Jeyalakshmi, S. Ravikumar, D. Kavitha
{"title":"Modified light GBM based classification of malicious users in cooperative cognitive radio networks","authors":"S. Sekar, S. Jeyalakshmi, S. Ravikumar, D. Kavitha","doi":"10.1080/23335777.2022.2135610","DOIUrl":"https://doi.org/10.1080/23335777.2022.2135610","url":null,"abstract":"","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88275690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-stage IDS for IoT using layered machine- and deep-learning models","authors":"André van der Walt, T. Quazi, B. van Niekerk","doi":"10.1080/23335777.2022.2142300","DOIUrl":"https://doi.org/10.1080/23335777.2022.2142300","url":null,"abstract":"","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86245298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequency control for islanded AC microgrid based on deep reinforcement learning","authors":"Xianggang Liu, Zhiwei Liu, Ming Chi, Guixi Wei","doi":"10.1080/23335777.2022.2130434","DOIUrl":"https://doi.org/10.1080/23335777.2022.2130434","url":null,"abstract":"","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"153 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86670771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and analysis of supply chain with green product change","authors":"Yezhou Yang, Chen-Yuan Peng, Li Qing-kui","doi":"10.1080/23335777.2022.2123048","DOIUrl":"https://doi.org/10.1080/23335777.2022.2123048","url":null,"abstract":"","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"134 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80467743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing the cyber-physical system: a review","authors":"M. Lydia, G. E. Prem Kumar, A. Selvakumar","doi":"10.1080/23335777.2022.2104378","DOIUrl":"https://doi.org/10.1080/23335777.2022.2104378","url":null,"abstract":"ABSTRACT The Cyber-Physical System (CPS) is poised to have a revolutionary impact on almost every area of our lives including transportation, healthcare, energy, automation and other industrial sectors. However, securing the CPS has emerged as a major area of concern. A thorough review on the various security scenarios in CPS, the attacks, the diverse approaches to model different attacks, and the need for CPS testbeds has been presented in this paper. The significance of risk models and risk assessment has also been detailed. The intricate research challenges that are faced in securing the CPS have also been presented. Graphical Abstract","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"1 1","pages":"193 - 223"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75749660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Abbattista, M. Chimienti, V. Dentamaro, P. Giglio, D. Impedovo, G. Pirlo, Giacomo Rosato
{"title":"A biometric-based system for unsupervised anomaly behaviour detection at the pawn shop","authors":"G. Abbattista, M. Chimienti, V. Dentamaro, P. Giglio, D. Impedovo, G. Pirlo, Giacomo Rosato","doi":"10.1080/23335777.2022.2104379","DOIUrl":"https://doi.org/10.1080/23335777.2022.2104379","url":null,"abstract":"ABSTRACT This article shows a system performing re-identification and description of people entering different stores of the same franchise by means of Face Recognition, Gait Analysis, and Soft Biometrics techniques. Additionally, an anomaly detection analysis is conducted to identify suspicious behavioral patterns.It has been tested on an ad-hoc dataset of a set of pawn shops of a local franchise.The registered users paths have been human labelled as ‘normal’ or ‘abnormal’ achieving a precision of 100%, recall of 72.72%, and an average accuracy of 96.39%.The system is able to report anomalies to support decisions in a context of a security monitoring system..","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"20 1","pages":"338 - 356"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85274309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nonlinear finite-time and fixed-time bipartite consensus tracking of multi-agent systems","authors":"Li Lu, B. Xiao, Tao Han","doi":"10.1080/23335777.2022.2104380","DOIUrl":"https://doi.org/10.1080/23335777.2022.2104380","url":null,"abstract":"ABSTRACT This paper deals with the finite-time and fixed-time bipartite consensus tracking (FFBCT) problems for multi-agent systems (MASs) , in which both cooperative and competition exist. Using Lyapunov stability methods, distributed nonlinear protocols are provided to ensure all agents reach agreement. Its absolute value is the same but it might be different in direction. Besides, the second protocol can make the system reach bipartite consensus in fixed time regardless of the initial state of agents. Moreover, boundaries for settling times are estimated. Some numerical examples are finally presented to prove the validity of our designs.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"38 1","pages":"390 - 406"},"PeriodicalIF":0.0,"publicationDate":"2022-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76522431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LTL cross entropy optimisation for quadcopter task orchestration","authors":"Christopher J. Banks, S. Coogan, M. Egerstedt","doi":"10.1080/23335777.2022.2083689","DOIUrl":"https://doi.org/10.1080/23335777.2022.2083689","url":null,"abstract":"ABSTRACT This paper presents a task orchestration framework for multi-agent systems utilising linear temporal logic (LTL) and cross entropy optimisation, a stochastic optimisation technique used for rare-event sampling. We define task orchestration as a combination of task decomposition, allocation and planning for a quadcopter or team of quadcopters given a high-level specification. Specifically, we consider tasks that are complex and consist of environment constraints, system constraints, or both, that must be satisfied. We first approach motion planning for the single agent case where transition systems for the environment allow tasks to be developed as linear temporal logic (LTL) specifications. Trajectories are then generated via motion primitives for a single quadcopter and optimised via cross entropy to ensure optimal satisfaction of a cost function. We extend this work to the multi-agent case where a team of homogeneous quadcopters are considered to satisfy an LTL specification. In order to provide faster computations and initial cost-agnostic sampling, we formulate the online version of multi-agent task allocation via cross entropy for tasks specified in LTL specifications. The results of this framework are verified in simulation and experimentally with a team of quadcopters.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"41 1","pages":"273 - 312"},"PeriodicalIF":0.0,"publicationDate":"2022-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77506048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}