EconPapers    
Economics at your fingertips  
 

Cyber-Physical Systems

2015 - 2025

Current editor(s): Yang Xiao

From Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 11, issue 1, 2025

Model-based framework for exploiting sensors of IoT devices using a botnet: a case study with android pp. 1-46 Downloads
Zubair Khaliq, Dawood Ashraf Khan, Asif Iqbal Baba, Shahbaz Ali and Sheikh Umar Farooq
CyberGrid: an IEC61850 protocol-based substation automation virtual cyber range for cybersecurity research in the smart grid pp. 47-66 Downloads
John E. Efiong, Abiodun Akinwale, B. O. Akinyemi, Emmanuel Olajubu and Sola Aderounmu
Multi-time scale optimisation strategy for effective control of small-capacity controllable devices in integrated energy systems pp. 67-92 Downloads
Zhenyu Wang, Yanfang Wang, Chupeng Xiao, Wenbo Hu, Ruoxi Geng, Qingyi Liu, Botao Zhou and Meng Yu
A new target accessibility control method based on SMC pp. 93-111 Downloads
Sheng Fang, Huimin Li, Lihong Liu, Dan Zhang and Huageng Liang

Volume 10, issue 4, 2024

Robust predictive path-following control of autonomous ground vehicle with input delays pp. 303-317 Downloads
Wei Li, Yu Xie and Xiaoyuan Zhu
Time-to-approach-based model predictive controller for autonomous vehicle safety during unexpected wheelchairs on the path pp. 318-339 Downloads
Mhafuzul Islam, Mashrur Chowdhury, Mizanur Rahman and Zadid Khan
Hysteretic quantised security control for PDE systems under replay attacks pp. 340-361 Downloads
Ganghui Lu, Xiaona Song and Shuai Song
Blockchain-based group signature for secure authentication of IoT systems in smart home environments pp. 362-386 Downloads
Mustafa Kara, Hisham R.J. Merzeh, Muhammed Ali Aydin and Hasan Hüseyin Balik

Volume 10, issue 3, 2024

Development of a digital twin of heat energy storage and retrieval system for performance evaluation through AR-based simulation pp. 231-246 Downloads
Bhagyesh B. Deshmukh, Vijay A. Athavale, Aditya R. Vernekar, Yash R. Katkar, Anirudha K. Jahagirdar, Yash C. Waghmare, Sachin Salunkhe and Sharad Gawade
Dual-path recommendation algorithm based on CNN and attention-enhanced LSTM pp. 247-262 Downloads
Huimin Li, Yongyi Cheng, Hongjie Ni and Dan Zhang
Incremental segmented slope residential load pattern clustering based on three-stage curve profiles pp. 263-282 Downloads
Jue Hou, Tingzhe Pan, Xinlei Cai, Xin Jin, Zijie Meng and Hongxuan Luo
Maximum elastic scheduling of virtual machines in general graph cloud data center networks pp. 283-301 Downloads
Yusuf Qwareeq, Abdalaziz Sawwan and Jie Wu

Volume 10, issue 2, 2024

Cooperative vehicular platooning: a multi-dimensional survey towards enhanced safety, security and validation pp. 123-175 Downloads
Ênio Vasconcelos Filho, Ricardo Severino, Pedro M. Salgueiro dos Santos, Anis Koubaa and Eduardo Tovar
Design of a single input control signal for fault-tolerant synchronization of fractional order hyperchaotic Lu system pp. 176-196 Downloads
Alireza Sabaghian, Saeed Balochian and Mohammad Alishahi
Rolling bearing fault diagnosis based on the enhanced channel attention network pp. 197-213 Downloads
Zhongting Huang, Yongyi Chen, Jianjun Liu, Hongjie Ni and Dan Zhang
Microgrid trading mechanism enhancement for smart contract considering reputation values pp. 214-230 Downloads
Zhikang Wang, Wendi Wu, Zhengtian Wu and Baochuan Fu

Volume 10, issue 1, 2024

A Review of Energy Aware Cyber-Physical Systems pp. 1-42 Downloads
Houssam Kanso, Adel Noureddine and Ernesto Exposito
Frequency control for islanded AC microgrid based on deep reinforcement learning pp. 43-59 Downloads
Xianggang Liu, Zhi-Wei Liu, Ming Chi and Guixi Wei
Two-stage IDS for IoT using layered machine- and deep-learning models pp. 60-83 Downloads
André van der Walt, Tahmid Quazi and Brett van Niekerk
Modeling and analysis of supply chain with green product change pp. 84-103 Downloads
Yi Yang, Chen Peng and Li Qing–Kui
Modified light GBM based classification of malicious users in cooperative cognitive radio networks pp. 104-122 Downloads
S Sekar, S Jeyalakshmi, S Ravikumar and D Kavitha

Volume 9, issue 4, 2023

Deep Learning Assist IoT Search Engine for Disaster Damage Assessment pp. 313-337 Downloads
Hengshuo Liang, Lauren Burgess, Weixian Liao, Erik Blasch and Wei Yu
A biometric-based system for unsupervised anomaly behaviour detection at the pawn shop pp. 338-356 Downloads
Giacomo Abbattista, Michela Chimienti, Vincenzo Dentamaro, Paolo Giglio, Donato Impedovo, Giuseppe Pirlo and Giacomo Rosato
Exponential state estimation for reaction-diffusion inertial neural networks via incomplete measurement scheme pp. 357-375 Downloads
Xuemei Wang, Xiaona Song, Jingtao Man and Nana Wu
Fixed-point iterative approach for solving linear Diophantine systems with bounds on the variables pp. 376-389 Downloads
Haocheng Yu, Luyao Yang, Jinyu Dai, Baoping Jiang, Zhengtian Wu and Shuxian Zhu
Nonlinear finite-time and fixed-time bipartite consensus tracking of multi-agent systems pp. 390-406 Downloads
Li Lu, Bo Xiao and Tao Han

Volume 9, issue 3, 2023

Securing the cyber-physical system: a review pp. 193-223 Downloads
M. Lydia, G. Edwin Prem Kumar and A. Immanuel Selvakumar
Confidentiality attacks against encrypted control systems pp. 224-243 Downloads
Amir Mohammad Naseri, Walter Lucia and Amr Youssef
Towards an intrusion detection system for detecting web attacks based on an ensemble of filter feature selection techniques pp. 244-259 Downloads
Deepak Kshirsagar and Sandeep Kumar
Coordinative energy efficiency improvement of buildings based on deep reinforcement learning pp. 260-272 Downloads
Chenguan Xu, Wenqing Li, Yao Rao, Bei Qi, Bin Yang and Zhongdong Wang
LTL cross entropy optimisation for quadcopter task orchestration pp. 273-312 Downloads
Christopher Banks, Samuel Coogan and Magnus Egerstedt

Volume 9, issue 2, 2023

A resilient hierarchical distributed model of a cyber physical system pp. 97-121 Downloads
Surya B Yadav
Transaction model and energy management optimisation method of rural microgrid pp. 122-143 Downloads
Mengkai Chen, Baochuan Fu, Zhenping Chen and Jianhan Wu
ProSD-EdgeIoT: Protected Cluster assisted SDWSN for Tetrad Edge-IoT by Collaborative DDoS Detection and Mitigation pp. 144-173 Downloads
Vishnu V.M. and Manjunath P
A Improved Subgradient Lagrangian Relaxation Algorithm for Solving the Stochastic Demand Inventory Routing Problem pp. 174-192 Downloads
Yuan-Yuan Zhao and Qian-qian Duan

Volume 9, issue 1, 2023

A survey of video violence detection pp. 1-24 Downloads
Huiling Yao and Xing Hu
RNN-LSTM Based Deep Learning Model for Tor Traffic Classification pp. 25-42 Downloads
VishnuPriya. A, Hiran Kumar Singh, SivaChaitanyaPrasad. M and JaiSivaSai. G
Novel Authentication and Secure Trust based RPL Routing in Mobile sink supported Internet of Things pp. 43-76 Downloads
Bandarupalli Rakesh and Parveen Sultana H
Integral terminal sliding-mode integral backstepping adaptive control for trajectory tracking of unmanned surface vehicle pp. 77-96 Downloads
Jiayu Dong, Meijiao Zhao, Min Cheng and Yueying Wang

Volume 8, issue 4, 2022

Finite-time observer-based trajectory tracking control of underactuated USVs using hierarchical non-singular terminal sliding mode pp. 263-285 Downloads
Fengting Zhu, Yan Peng, Min Cheng, Jun Luo and Yueying Wang
Flexible, decentralised access control for smart buildings with smart contracts pp. 286-320 Downloads
Leepakshi Bindra, Kalvin Eng, Omid Ardakanian and Eleni Stroulia
Bandwidth assessment of scheduled and unscheduled communication in hybrid networked control system pp. 321-346 Downloads
S M A K Azad and Srinivasan Kannan

Volume 8, issue 3, 2022

Q-Learning Based Optimisation Framework for Real-Time Mixed-Task Scheduling pp. 173-191 Downloads
Tianchuang Meng, Jin Huang, Huiqian Li, Zengkun Li, Yu Jiang and Zhihua Zhong
A hierarchical perception decision-making framework for autonomous driving pp. 192-209 Downloads
Ende Zhang, Jin Huang, Yue Gao, Yau Liu and Yangdong Deng
Secure Filter for Discrete-Time Delayed Systems Subject to Cyber Attacks pp. 210-232 Downloads
Mutaz M. Hamdan and Magdi S. Mahmoud
Identification of Chua’s chaotic circuit parameters using penguins search optimisation algorithm pp. 233-260 Downloads
Fouzia Maamri, Sofiane Bououden and Ilyes Boulkaibet

Volume 8, issue 2, 2022

A constraint partially observable semi-Markov decision process for the attack–defence relationships in various critical infrastructures pp. 85-110 Downloads
Nadia Niknami and Jie Wu
Control-based event-driven bandwidth allocation scheme for video-surveillance systems pp. 111-137 Downloads
Gautham Nayak Seetanadi, Karl-Erik Årzen and Martina Maggio
Optimisation model of micro grid dispatching for smart building cluster based on blockchain pp. 138-171 Downloads
Sheng Zhao and Zhengtian Wu

Volume 8, issue 1, 2022

SEVA: Secure E-Voting Application in Cyber Physical System pp. 1-31 Downloads
Rahul Johari, Arvinder Kaur, Mohammad Hashim, Prateek Kumar Rai and Kanika Gupta
Indel-K2P: a modified Kimura 2 Parameters (K2P) model to incorporate insertion and deletion (Indel) information in phylogenetic analysis pp. 32-44 Downloads
Asim Kumar Mahadani, Shashank Awasthi, Goutam Sanyal, Partha Bhattacharjee and Sanjeev Pippal
Computational intelligence paradigm for job shop scheduling and routing in an uncertain environment pp. 45-66 Downloads
Suresh Chavhan, Joel J. P. C. Rodrigues and Ashish Khanna
A rail detection algorithm for accurate recognition of train fuzzy video pp. 67-84 Downloads
Bin Wang, Zhen Wang, Dou Zhao and Xuhai Wang
Page updated 2025-01-09