{"id":"https://openalex.org/W4405092797","doi":"https://doi.org/10.1109/tii.2024.3495766","title":"Security State Assessment in Cyber-Physical Systems Post-DoS Attack Based on Cyber Layer Partitioning","display_name":"Security State Assessment in Cyber-Physical Systems Post-DoS Attack Based on Cyber Layer Partitioning","publication_year":2024,"publication_date":"2024-12-05","ids":{"openalex":"https://openalex.org/W4405092797","doi":"https://doi.org/10.1109/tii.2024.3495766"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2024.3495766","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2024.3495766","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://discovery.ucl.ac.uk/id/eprint/10202556/1/Security_State_Assessment_in_Cyber-Physical_Systems_Post-DoS_Attack_Based_on_Cyber_Layer_Partitioning.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115603922","display_name":"Yu Zhang","orcid":"https://orcid.org/0009-0002-3102-7516"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Zhang","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronical Engineering and Automation, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronical Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051175363","display_name":"Minrui Fei","orcid":"https://orcid.org/0000-0002-7804-077X"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minrui Fei","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronical Engineering and Automation, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronical Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100735340","display_name":"Dajun Du","orcid":"https://orcid.org/0000-0003-2979-1507"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dajun Du","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronical Engineering and Automation, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronical Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086866094","display_name":"Yukun Hu","orcid":"https://orcid.org/0000-0002-7480-4250"},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yukun Hu","raw_affiliation_strings":["Department of Civil, Environmental, and Geomatic Engineering, University College London, London, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Civil, Environmental, and Geomatic Engineering, University College London, London, U.K","institution_ids":["https://openalex.org/I45129253"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5115603922"],"corresponding_institution_ids":["https://openalex.org/I113940042"],"apc_list":null,"apc_paid":null,"fwci":2.4223,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.9001309,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"21","issue":"3","first_page":"2204","last_page":"2213"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9606000185012817,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9606000185012817,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9559999704360962,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9253000020980835,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6942605376243591},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6146330237388611},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5887469053268433},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.5096211433410645},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.49237358570098877},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4466443955898285},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4185936152935028},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16080042719841003},{"id":"https://openalex.org/keywords/chemistry","display_name":"Chemistry","score":0.1369664967060089},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.11582642793655396}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6942605376243591},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6146330237388611},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5887469053268433},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.5096211433410645},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.49237358570098877},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4466443955898285},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4185936152935028},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16080042719841003},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.1369664967060089},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.11582642793655396},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tii.2024.3495766","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2024.3495766","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},{"id":"pmh:oai:eprints.ucl.ac.uk.OAI2:10202556","is_oa":true,"landing_page_url":"https://discovery.ucl.ac.uk/id/eprint/10202556/","pdf_url":"https://discovery.ucl.ac.uk/id/eprint/10202556/1/Security_State_Assessment_in_Cyber-Physical_Systems_Post-DoS_Attack_Based_on_Cyber_Layer_Partitioning.pdf","source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Industrial Informatics     pp. 1-10.   (2024)     (In press).","raw_type":"Article"}],"best_oa_location":{"id":"pmh:oai:eprints.ucl.ac.uk.OAI2:10202556","is_oa":true,"landing_page_url":"https://discovery.ucl.ac.uk/id/eprint/10202556/","pdf_url":"https://discovery.ucl.ac.uk/id/eprint/10202556/1/Security_State_Assessment_in_Cyber-Physical_Systems_Post-DoS_Attack_Based_on_Cyber_Layer_Partitioning.pdf","source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Industrial Informatics     pp. 1-10.   (2024)     (In press).","raw_type":"Article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3837850091","display_name":null,"funder_award_id":"D18003","funder_id":"https://openalex.org/F4320327912","funder_display_name":"Higher Education Discipline Innovation Project"}],"funders":[{"id":"https://openalex.org/F4320327912","display_name":"Higher Education Discipline Innovation Project","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405092797.pdf","grobid_xml":"https://content.openalex.org/works/W4405092797.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W2324861975","https://openalex.org/W2921750014","https://openalex.org/W3115892855","https://openalex.org/W3142590036","https://openalex.org/W3149151777","https://openalex.org/W3156268666","https://openalex.org/W3174459259","https://openalex.org/W3185796648","https://openalex.org/W3204846932","https://openalex.org/W4220959163","https://openalex.org/W4226322799","https://openalex.org/W4292258978","https://openalex.org/W4295832119","https://openalex.org/W4295832331","https://openalex.org/W4295916802","https://openalex.org/W4312576920","https://openalex.org/W4312858246","https://openalex.org/W4313155135","https://openalex.org/W4383337623","https://openalex.org/W4383890668","https://openalex.org/W4386112519","https://openalex.org/W4387442985"],"related_works":["https://openalex.org/W2358245908","https://openalex.org/W2974890647","https://openalex.org/W2921897907","https://openalex.org/W4242728933","https://openalex.org/W2493430149","https://openalex.org/W1604710049","https://openalex.org/W4385452087","https://openalex.org/W2485875719","https://openalex.org/W1994763079","https://openalex.org/W4304097726"],"abstract_inverted_index":{"Coupling,":[0],"as":[1,126],"an":[2,57],"important":[3],"characteristic":[4],"of":[5,18,27,34,94,196],"cyber-physical":[6],"systems":[7],"(CPS),":[8],"brings":[9],"opportunities":[10],"and":[11,16,39,70,76,135,159,167,207,217,223,232],"challenges":[12],"to":[13,183,213],"the":[14,25,28,32,36,47,50,65,68,95,113,143,153,163,179,185,197],"control":[15,116,144],"application":[17],"industrial":[19],"systems.":[20],"This":[21,146,190],"article":[22],"mainly":[23],"analyses":[24],"role":[26],"cyber":[29,71],"layer":[30,38,109,124,155,181],"in":[31,142,234],"process":[33],"controlling":[35],"physical":[37,69,114],"gives":[40],"a":[41,90,103,157,172,193,214],"security":[42,173,199,231],"state":[43,174],"assessment":[44],"method":[45,105,129],"for":[46,106,220,228],"CPS":[48,59,221],"after":[49],"Denial-of-Service":[51],"(DoS)":[52],"attack.":[53],"First,":[54],"we":[55,101,170],"develop":[56],"advanced":[58],"coupling":[60],"model":[61,88],"that":[62,82,121,149,177,202],"intricately":[63],"captures":[64],"interactions":[66],"between":[67],"layers,":[72],"emphasizing":[73],"both":[74],"data":[75,150],"topology":[77],"coupling.":[78],"Unlike":[79,118],"existing":[80],"models":[81],"often":[83],"overlook":[84],"these":[85,210],"aspects,":[86],"our":[87,128],"offers":[89],"more":[91,215],"comprehensive":[92],"understanding":[93],"complex":[96],"interdependencies":[97],"within":[98,152],"CPS.":[99],"Second,":[100],"propose":[102],"unique":[104],"partitioning":[107,182],"network":[108,123,154,180],"nodes":[110,125,131],"based":[111],"on":[112],"layer's":[115],"requirements.":[117],"traditional":[119],"approaches":[120],"treat":[122],"homogeneous,":[127],"categorizes":[130],"into":[132],"sensor,":[133],"controller,":[134],"actuator":[136],"areas,":[137],"each":[138],"with":[139,225],"distinct":[140],"roles":[141],"process.":[145],"differentiation":[147],"ensures":[148],"flow":[151],"follows":[156],"fixed":[158],"logical":[160],"direction,":[161],"enhancing":[162,229],"overall":[164],"system":[165,230],"efficiency":[166],"reliability.":[168],"Third,":[169],"introduce":[171],"evaluation":[175,191],"factor":[176],"leverages":[178],"assess":[184],"system's":[186,198],"resilience":[187],"under":[188],"cyber-attacks.":[189],"provides":[192],"detailed":[194],"analysis":[195],"status,":[200],"ensuring":[201],"potential":[203],"vulnerabilities":[204],"are":[205],"identified":[206],"mitigated.":[208],"Together,":[209],"innovations":[211],"contribute":[212],"robust":[216],"practical":[218],"framework":[219],"design":[222],"analysis,":[224],"significant":[226],"implications":[227],"performance":[233],"real-world":[235],"applications.":[236]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
