{"id":"https://openalex.org/W7130385431","doi":"https://doi.org/10.1007/s10207-026-01222-4","title":"Adaptive strategy optimization for cyber-physical systems under denial-of-service attacks using continuous learning automata","display_name":"Adaptive strategy optimization for cyber-physical systems under denial-of-service attacks using continuous learning automata","publication_year":2026,"publication_date":"2026-02-18","ids":{"openalex":"https://openalex.org/W7130385431","doi":"https://doi.org/10.1007/s10207-026-01222-4"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-026-01222-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01222-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01222-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01222-4.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126343360","display_name":"Diana Gheiby","orcid":null},"institutions":[{"id":"https://openalex.org/I155419210","display_name":"Islamic Azad University, Science and Research Branch","ror":"https://ror.org/03187yj51","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I155419210"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Diana Gheiby","raw_affiliation_strings":["School of Electrical, Mechanical and Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"School of Electrical, Mechanical and Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran","institution_ids":["https://openalex.org/I155419210"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039640213","display_name":"S. Gheisari","orcid":"https://orcid.org/0000-0001-8974-2841"},"institutions":[{"id":"https://openalex.org/I110525433","display_name":"Islamic Azad University, Tehran","ror":"https://ror.org/01kzn7k21","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433"]},{"id":"https://openalex.org/I43439940","display_name":"University of Southampton","ror":"https://ror.org/01ryk1543","country_code":"GB","type":"education","lineage":["https://openalex.org/I43439940"]}],"countries":["GB","IR"],"is_corresponding":false,"raw_author_name":"Soulmaz Gheisari","raw_affiliation_strings":["Department of Computer Engineering, Pardis Branch, Islamic Azad University, Tehran, Iran","School of Engineering and Computer Science, University of Southampton, Southampton, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Pardis Branch, Islamic Azad University, Tehran, Iran","institution_ids":["https://openalex.org/I110525433"]},{"raw_affiliation_string":"School of Engineering and Computer Science, University of Southampton, Southampton, UK","institution_ids":["https://openalex.org/I43439940"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5126343360"],"corresponding_institution_ids":["https://openalex.org/I155419210"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.54571923,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9020000100135803,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9020000100135803,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.03660000115633011,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.014800000004470348,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/learning-automata","display_name":"Learning automata","score":0.6061000227928162},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.5691999793052673},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.558899998664856},{"id":"https://openalex.org/keywords/kalman-filter","display_name":"Kalman filter","score":0.501800000667572},{"id":"https://openalex.org/keywords/automaton","display_name":"Automaton","score":0.4950000047683716},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4596000015735626},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.439300000667572},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4147999882698059},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.3977000117301941}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8148000240325928},{"id":"https://openalex.org/C2776807809","wikidata":"https://www.wikidata.org/wiki/Q6510160","display_name":"Learning automata","level":3,"score":0.6061000227928162},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.5691999793052673},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.558899998664856},{"id":"https://openalex.org/C157286648","wikidata":"https://www.wikidata.org/wiki/Q846780","display_name":"Kalman filter","level":2,"score":0.501800000667572},{"id":"https://openalex.org/C112505250","wikidata":"https://www.wikidata.org/wiki/Q787116","display_name":"Automaton","level":2,"score":0.4950000047683716},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4596000015735626},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.439300000667572},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4147999882698059},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.3977000117301941},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37950000166893005},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.36239999532699585},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.34549999237060547},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.32739999890327454},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.31200000643730164},{"id":"https://openalex.org/C36299963","wikidata":"https://www.wikidata.org/wiki/Q1369844","display_name":"Observability","level":2,"score":0.30469998717308044},{"id":"https://openalex.org/C52970973","wikidata":"https://www.wikidata.org/wiki/Q2497134","display_name":"Adaptive system","level":2,"score":0.29409998655319214},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.2906999886035919},{"id":"https://openalex.org/C50897621","wikidata":"https://www.wikidata.org/wiki/Q2665508","display_name":"Hybrid system","level":2,"score":0.29010000824928284},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.27970001101493835},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.27469998598098755},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.26409998536109924},{"id":"https://openalex.org/C107464732","wikidata":"https://www.wikidata.org/wiki/Q235781","display_name":"Adaptive control","level":3,"score":0.262800008058548},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.25619998574256897}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-026-01222-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01222-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01222-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-026-01222-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01222-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01222-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5955182909965515}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321389","display_name":"Islamic Azad University","ror":"https://ror.org/01kzn7k21"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7130385431.pdf","grobid_xml":"https://content.openalex.org/works/W7130385431.grobid-xml"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W1527776882","https://openalex.org/W1972523481","https://openalex.org/W1986971882","https://openalex.org/W2049421380","https://openalex.org/W2520529446","https://openalex.org/W2943651313","https://openalex.org/W2966672852","https://openalex.org/W3035286387","https://openalex.org/W3041006851","https://openalex.org/W3046805839","https://openalex.org/W3081325920","https://openalex.org/W3109569191","https://openalex.org/W3115892855","https://openalex.org/W3126827950","https://openalex.org/W3178115352","https://openalex.org/W3180440455","https://openalex.org/W3198058595","https://openalex.org/W3206959716","https://openalex.org/W4221161625","https://openalex.org/W4224932126","https://openalex.org/W4285507209","https://openalex.org/W4285732625","https://openalex.org/W4303627769","https://openalex.org/W4313005493","https://openalex.org/W4362503537","https://openalex.org/W4362587591","https://openalex.org/W4368408265","https://openalex.org/W4381335124","https://openalex.org/W4381336893","https://openalex.org/W4382119200","https://openalex.org/W4382982890","https://openalex.org/W4386000788","https://openalex.org/W4388919042","https://openalex.org/W4392289352","https://openalex.org/W4392901723","https://openalex.org/W4399640287","https://openalex.org/W4399915021","https://openalex.org/W4401509368","https://openalex.org/W4401709895","https://openalex.org/W4402659210","https://openalex.org/W4402978005","https://openalex.org/W4404952685","https://openalex.org/W4406276022","https://openalex.org/W4406727843","https://openalex.org/W4407194208","https://openalex.org/W4408078131","https://openalex.org/W4410977832","https://openalex.org/W4412732452","https://openalex.org/W4417045868","https://openalex.org/W6928957181"],"related_works":[],"abstract_inverted_index":{"Cyber-physical":[0],"systems":[1],"(CPS)":[2],"combine":[3],"computational,":[4],"communication,":[5],"and":[6,13,32,74,87,99,117,127,137,147,162,202,204],"physical":[7],"components":[8],"to":[9,25,70,81,94,106,122,159,173,210],"enable":[10],"real-time":[11,191],"monitoring":[12],"control":[14],"in":[15,65,112],"critical":[16],"infrastructures.":[17],"Despite":[18],"their":[19],"advantages,":[20],"CPS":[21,43,116,195],"are":[22],"highly":[23],"susceptible":[24],"Denial-of-Service":[26],"(DoS)":[27],"attacks":[28,47],"that":[29,142,185],"disrupt":[30],"communication":[31,75],"impair":[33],"state":[34,109,149],"estimation.":[35,110],"This":[36],"study":[37,183],"conducted":[38],"a":[39,53,61,103,206],"comprehensive":[40],"analysis":[41],"of":[42,166],"defense":[44],"under":[45,125,133,151],"DoS":[46],"using":[48],"learning":[49,90,186],"automata":[50,91,187],"(LA)":[51],"within":[52],"game-theoretic":[54],"framework.":[55],"Sensor\u2013attacker":[56],"interactions":[57],"were":[58,92,100,120],"modeled":[59],"as":[60,130,132],"two-player":[62],"zero-sum":[63],"game,":[64],"which":[66],"the":[67,78,170,182],"sensor":[68,97],"sought":[69],"minimize":[71],"estimation":[72,150,198],"error":[73],"cost,":[76,201],"while":[77],"attacker":[79],"aimed":[80],"maximize":[82],"disruption.":[83],"Both":[84],"discrete":[85],"(DLA)":[86],"continuous":[88],"(CLA)":[89],"employed":[93],"adaptively":[95],"optimize":[96],"strategies":[98],"integrated":[101],"with":[102],"Kalman":[104],"filter":[105],"achieve":[107],"accurate":[108],"Simulations":[111],"MATLAB/Simulink,":[113],"including":[114],"generic":[115],"microgrid":[118],"systems,":[119],"performed":[121],"evaluate":[123],"performance":[124],"reliable":[126],"unreliable":[128],"channels,":[129],"well":[131],"varying":[134],"attack":[135,167],"frequencies":[136],"durations.":[138],"The":[139],"results":[140],"demonstrated":[141,184],"CLA":[143],"achieved":[144],"smooth":[145],"convergence":[146],"high-accuracy":[148],"stable":[152],"conditions,":[153],"whereas":[154],"DLA":[155],"adapted":[156],"more":[157],"rapidly":[158],"abrupt":[160],"disturbances":[161],"dynamic":[163],"environments.":[164],"Analyses":[165],"patterns":[168],"confirmed":[169],"framework\u2019s":[171],"capacity":[172],"maintain":[174],"system":[175],"resilience":[176],"through":[177],"adaptive":[178],"strategy":[179],"allocation.":[180],"Overall,":[181],"provided":[188],"an":[189],"effective,":[190],"approach":[192],"for":[193],"optimizing":[194],"defense,":[196],"balancing":[197],"accuracy,":[199],"operational":[200],"security,":[203],"offered":[205],"flexible":[207],"solution":[208],"applicable":[209],"other":[211],"cyber":[212],"threats.":[213]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2026-02-19T00:00:00"}
