- document
-
Chatterjee, Sarthak (author), Alessandretti, Andrea (author), Aguiar, A. Pedro (author), Gonçalves Melo Pequito, S.D. (author)Fractional-order dynamical networks are increasingly being used to model and describe processes demonstrating long-term memory or complex interlaced dependencies among the spatial and temporal components of a wide variety of dynamical networks. Notable examples include networked control systems or neurophysiological networks which are created...journal article 2023
- document
-
Wu, C. (author), Pan, W. (author), Staa, Rick (author), Liu, Jianxing (author), Sun, Guanghui (author), Wu, Ligang (author)This paper investigates the deep reinforcement learning based secure control problem for cyber–physical systems (CPS) under false data injection attacks. We describe the CPS under attacks as a Markov decision process (MDP), based on which the secure controller design for CPS under attacks is formulated as an action policy learning using data....journal article 2023
- document
-
Zampetti, Fiorelli (author), Tamburri, Damian A. (author), Panichella, Sebastiano (author), Panichella, A. (author), Di Penta, Massimiliano (author), Canfora, Gerardo (author)Continuous Integration and Delivery (CI/CD) practices have shown several benefits for software development and operations, such as faster release cycles and early discovery of defects. For Cyber-Physical System (CPS) development, CI/CD can help achieving required goals, such as high dependability, yet it may be challenging to apply. This...journal article 2022
- document
-
de Albuquerque Gleizer, G. (author)Event-triggered control (ETC) and self-triggered control (STC) are sample-and-hold control paradigms in which sensor data is only updated to the controller when necessary, often aperiodically, in contrast to the well-established periodic sampling paradigm. In ETC, a state-dependent event triggers a transmission, while in STC the controller...doctoral thesis 2022
- document
-
Tepjit, S. (author)Our research concentrated on a newly emerged problem related to smart cyber-physical systems (S-CPSs). The essence of the problem is that S-CPSs are based on reasoning mechanisms that enable them to generate context-dependent solutions for various application problems. Typically, development of application-specific reasoning mechanisms (ASRMs)...doctoral thesis 2022
- document
-
Oskam, P.I.J. (author), Bier, H.H. (author), Alavi, Hamed S. (author)Minimal interventions that provide various microclimates can stimulate both biodiversity and social accessibility of leftover spaces. New habitats are often developed for different animal and plant species based on studies of the microclimates typical of such residual spaces. By introducing interventions of 0.5-1.0 m diameter ‘planetoids’ placed...journal article 2022
- document
-
Semertzis, I. (author), Subramaniam Rajkumar, Vetrivel (author), Stefanov, Alexandru (author), Fransen, Frank (author), Palensky, P. (author)Over the past decade, the number of cyber attack incidents targeting critical infrastructures such as the electrical power system has increased. To assess the risk of cyber attacks on the cyber-physical system, a holistic approach is needed that considers both system layers. However, the existing risk assessment methods are either qualitative in...conference paper 2022
- document
-
Marot, Antoine (author), Kelly, Adrian (author), Naglic, M. (author), Barbesant, Vincent (author), Cremer, Jochen (author), Stefanov, Alexandru (author), Viebahn, Jan (author)Today's power systems are seeing a paradigm shift under the energy transition, sparkled by the electrification of demand, digitalisation of systems, and an increasing share of decarbonated power generation. Most of these changes have a direct impact on their control centers, forcing them to handle weather-based energy resources, new...journal article 2022
- document
-
Semertzis, Ioannis (author)Power grids rely on Operational Technology (OT) networks, for real-time monitoring and control. These traditionally segregated systems are now being integrated with general-purpose Information and Communication Technologies (ICTs). The coupling of the physical power system and its communications infrastructure forms a complex, interdependent...master thesis 2021
- document
-
Mazhar, O. (author), Ramdani, Sofiane (author), Cherubini, Andrea (author)Intuitive user interfaces are indispensable to interact with the human centric smart environments. In this paper, we propose a unified framework that recognizes both static and dynamic gestures, using simple RGB vision (without depth sensing). This feature makes it suitable for inexpensive human-robot interaction in social or industrial settings...journal article 2021
- document
-
Horvath, I. (author), Tavčar, Jože (author)Cyber-physical systems (CPSs) represent practical examples of the integration of bits and atoms in human and social contexts and contribute to the integration of neurons and genes into system implementation. Many experts believe that a deeper theoretical understanding of system adaptation will lead to the development of autonomous systems and...review 2021
- document
-
Wu, Chengwei (author), Yao, Weiran (author), Pan, W. (author), Sun, Guanghui (author), Liu, Jianxing (author), Wu, Ligang (author)This article investigates the secure control problem for cyber-physical systems when the malicious data are injected into the cyber realm, which directly connects to the actuators. Based on moving target defense (MTD) and reinforcement learning, we propose a novel proactive and reactive defense control scheme. First, the system (A,B) is...journal article 2021
- document
-
Wu, C. (author), Pan, W. (author), Sun, Guanghui (author), Liu, Jianxing (author), Wu, Ligang (author)This paper investigates the problem of optimal tracking control for cyber-physical systems (CPS) when the cyber realm is attacked by denial-of-service (DoS) attacks which can prevent the control signal transmitting to the actuator. Attention is focused on how to design the optimal tracking control scheme without using the system dynamics and...journal article 2021
- document
-
Liu, Y. (author), Semertzis, I. (author), Stefanov, Alexandru (author), Palensky, P. (author)The security issues of Cyber-Physical power Systems (CPS) have attracted widespread attention from scholars. Vulnerability assessment emerges as an effective method to identify the critical components and thus increase the system resilience. While efforts have been made to study the vulnerability features of power systems under the occurrence...conference paper 2021
- document
-
Gramatikov, S.T. (author)Cyber-attacks long have been a topic reserved for sci-fi movies and books. With the advance of internet and the globalisation of technology supply chains, as well as the growing political and economic pressure around the world, cyber warfare has become the new weapon of choice for covert state operations, but also rogue organizations. In the...master thesis 2020
- document
-
Lont, J.J. (author)The application of optimal control structures for water irrigation systems (WISs) can be enabled by applying wireless event-triggered control (ETC). The term WIS, is used to describe open-water channels, that are mainly used to supply water to farmers all around the world. The water levels in these channels need to be controlled, but because of...master thesis 2020
- document
-
Samant, Aniket Ashwin (author)Modern times have seen an increasing use of networked control systems, in which plants and controllers may not necessarily have a direct link but instead be connected through a network, thereby closing control loops over multiple nodes.<br/><br/>The system may also be spread out spatially over a large area, and thus the associated network delays...master thesis 2020
- document
-
WU, YONGYI (author)With the thorough penetration of Internet, everyone has a dual identity in contemporary urban life. On one hand, urban survival pressure and high-density, planned forms of living consume the vitality of young generation; on the other hand, streaming videos, social media and online games establish their existence in another dimension. The Toronto...master thesis 2020
- document
-
Kromhout, Ben (author)The project is divided into three sub-assignments: - A future manufacturing context must be envisioned and the most important requirements synthesized. - An implementation of this envisioned manufacturing system must be developed and validated. - An exemplary-product producible by this system must be designed, showcasing the benefits of the...master thesis 2020
- document
-
Wijaya, Herman (author), Aniche, Maurício (author), Mathur, Aditya (author)A novel approach is proposed for constructing models of anomaly detectors using supervised learning from the traces of normal and abnormal operations of an Industrial Control System (ICS). Such detectors are of value in detecting process anomalies in complex critical infrastructure such as power generation and water treatment systems. The traces...conference paper 2020