首页 > 最新文献

IET Cyber-Physical Systems: Theory and Applications最新文献

英文 中文
Feature Dimensionality Reduction Based on Deep Lasso for Wind Power Forecasting 基于深度套索的风能预测特征降维
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-02 DOI: 10.1049/cps2.70011
Haohan Liao, Kunming Fu, Shiji Pan, Yongning Zhao

Wind power forecasting considering spatio-temporal correlations can effectively improve the forecasting accuracy. However, this will lead to a complicated structure in the forecasting model, making it difficult to solve due to dimensional catastrophe. To this end, a neural network framework called Deep Lasso is applied, which achieves feature selection by adding the regularisation of Lasso to the input gradients. Primarily, a forecasting model based on Deep Lasso, considering the features of all wind farms (i.e., global variables), is constructed. Subsequently, the coefficients of Deep Lasso can directly represent the contribution of input features to wind power forecasts. Therefore, to construct a more efficient forecasting model, secondary modelling is performed by filtering the features with small coefficients. Experiments including 20 wind farms demonstrate that Deep Lasso exhibits remarkable suitability and effectiveness in ultra-short-term wind power forecasting compared with six feature selection methods. Moreover, to test the effectiveness of feature dimensionality reduction, the secondary modelling forecasting model is verified by comparing it with principal component analysis (PCA) and factor analysis (FA). The results obtained show that the overall performance of the proposed method outperforms PCA and FA while improving the computational efficiency to a certain extent.

考虑时空相关性的风电预测可以有效提高预测精度。然而,这将导致预测模型结构复杂,由于量纲突变而难以求解。为此,应用了一种称为Deep Lasso的神经网络框架,该框架通过将Lasso的正则化添加到输入梯度中来实现特征选择。首先,构建了考虑所有风电场特征(即全局变量)的基于Deep Lasso的预测模型。因此,Deep Lasso的系数可以直接表示输入特征对风电预测的贡献。因此,为了构建更有效的预测模型,通过过滤小系数特征进行二次建模。对20个风电场进行的实验表明,与6种特征选择方法相比,Deep Lasso在超短期风电预测中具有显著的适用性和有效性。此外,为了检验特征降维的有效性,将二级建模预测模型与主成分分析(PCA)和因子分析(FA)进行对比验证。结果表明,该方法在一定程度上提高了计算效率的同时,整体性能优于PCA和FA。
{"title":"Feature Dimensionality Reduction Based on Deep Lasso for Wind Power Forecasting","authors":"Haohan Liao,&nbsp;Kunming Fu,&nbsp;Shiji Pan,&nbsp;Yongning Zhao","doi":"10.1049/cps2.70011","DOIUrl":"10.1049/cps2.70011","url":null,"abstract":"<p>Wind power forecasting considering spatio-temporal correlations can effectively improve the forecasting accuracy. However, this will lead to a complicated structure in the forecasting model, making it difficult to solve due to dimensional catastrophe. To this end, a neural network framework called Deep Lasso is applied, which achieves feature selection by adding the regularisation of Lasso to the input gradients. Primarily, a forecasting model based on Deep Lasso, considering the features of all wind farms (i.e., global variables), is constructed. Subsequently, the coefficients of Deep Lasso can directly represent the contribution of input features to wind power forecasts. Therefore, to construct a more efficient forecasting model, secondary modelling is performed by filtering the features with small coefficients. Experiments including 20 wind farms demonstrate that Deep Lasso exhibits remarkable suitability and effectiveness in ultra-short-term wind power forecasting compared with six feature selection methods. Moreover, to test the effectiveness of feature dimensionality reduction, the secondary modelling forecasting model is verified by comparing it with principal component analysis (PCA) and factor analysis (FA). The results obtained show that the overall performance of the proposed method outperforms PCA and FA while improving the computational efficiency to a certain extent.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70011","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143761837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Performance in Mixed-Criticality Real-Time Systems Through Learner-Based Resource Management 通过基于学习者的资源管理提高混合临界实时系统的性能
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-18 DOI: 10.1049/cps2.70007
Mohammadreza Saberikia, Hakem Beitollahi, Rasool Jader, Hamed Farbeh

In mixed-criticality (MC) systems, tasks with varying criticality levels share resources, leading to challenges in resource management during mode transitions. Existing approaches often result in suboptimal performance due to resource contention and criticality level inheritance. This paper introduces a novel learner-based resource management strategy that predicts optimal mode switching times and prevents low-criticality tasks from acquiring resources during critical periods. By combining vector autoregressive (VAR) and feed-forward neural network (FNN) techniques, our approach effectively anticipates system state changes and optimises resource allocation. Specifically, the method extracts key system features, including processor temperature, soft error rate, cache miss rate, and task slack time. A hybrid forecasting model then predicts the probability of a mode transition within a specified time horizon. Based on these predictions, the system proactively denies resource requests from low-criticality tasks during periods of high probability of mode transition, ensuring the availability of resources for high-criticality tasks. Comprehensive simulations demonstrate significant reductions in blocking time (up to 75%), miss rate (up to 9.35%), and energy consumption (up to 12.15%) compared to state-of-the-art methods. These improvements enhance system reliability and efficiency, making it suitable for safety-critical applications.

在混合临界系统中,不同临界级别的任务共享资源,这给模式转换期间的资源管理带来了挑战。由于资源争用和临界级别的继承,现有的方法常常导致性能次优。本文介绍了一种新的基于学习者的资源管理策略,该策略可以预测最优模式切换时间,并防止低关键任务在关键时期获取资源。该方法结合向量自回归(VAR)和前馈神经网络(FNN)技术,有效预测系统状态变化并优化资源分配。具体来说,该方法提取了关键的系统特征,包括处理器温度、软错误率、缓存缺失率和任务空闲时间。然后,混合预测模型预测在指定时间范围内模态转换的概率。基于这些预测,系统在高概率模式转换期间主动拒绝低临界任务的资源请求,确保高临界任务的资源可用性。综合模拟表明,与最先进的方法相比,阻塞时间(高达75%)、漏报率(高达9.35%)和能耗(高达12.15%)显著降低。这些改进提高了系统的可靠性和效率,使其适用于安全关键应用。
{"title":"Enhancing Performance in Mixed-Criticality Real-Time Systems Through Learner-Based Resource Management","authors":"Mohammadreza Saberikia,&nbsp;Hakem Beitollahi,&nbsp;Rasool Jader,&nbsp;Hamed Farbeh","doi":"10.1049/cps2.70007","DOIUrl":"10.1049/cps2.70007","url":null,"abstract":"<p>In mixed-criticality (MC) systems, tasks with varying criticality levels share resources, leading to challenges in resource management during mode transitions. Existing approaches often result in suboptimal performance due to resource contention and criticality level inheritance. This paper introduces a novel learner-based resource management strategy that predicts optimal mode switching times and prevents low-criticality tasks from acquiring resources during critical periods. By combining vector autoregressive (VAR) and feed-forward neural network (FNN) techniques, our approach effectively anticipates system state changes and optimises resource allocation. Specifically, the method extracts key system features, including processor temperature, soft error rate, cache miss rate, and task slack time. A hybrid forecasting model then predicts the probability of a mode transition within a specified time horizon. Based on these predictions, the system proactively denies resource requests from low-criticality tasks during periods of high probability of mode transition, ensuring the availability of resources for high-criticality tasks. Comprehensive simulations demonstrate significant reductions in blocking time (up to 75%), miss rate (up to 9.35%), and energy consumption (up to 12.15%) compared to state-of-the-art methods. These improvements enhance system reliability and efficiency, making it suitable for safety-critical applications.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143646133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative Optimisation of Carbon Trading Mechanism and Heat Network in Integrated Energy System 综合能源系统碳交易机制与热网络协同优化
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-12 DOI: 10.1049/cps2.70009
Zhiguo Dong, Li Wang, Fengxiang Xie, Yongcheng Yu, Runjie Li, Luyong Cao

To achieve low-carbon development, the ladder-type carbon trading mechanism is proved to be beneficial to reduce carbon emissions while increasing the operation cost of the integrated energy system (IES). In this paper, an IES optimal operation strategy considering the ladder-type carbon trading mechanism is proposed, with the help of the dynamic characteristics of the heat network to compensate for the increased operation cost. First, the transmission model of the heat network is established, and the dynamic characteristic of the heat network during the heat transfer process is analysed Then, the ladder-type carbon trading mechanism is introduced, and the impact on IES operation is analysed accordingly. Finally, the IES optimal operation model considering the ladder-type carbon trading mechanism and the dynamic characteristics of the heat network is established. The programming model is expressed as mixed-integer quadratic programming (MIQP). Simulation experiments are carried out for validation. The results show that considering the ladder-type carbon trading mechanism and the dynamic characteristics of the heat network in the IES can improve the wind power consumption rate and reduce the system operation cost and carbon emissions.

为了实现低碳发展,阶梯式碳交易机制被证明有利于减少碳排放,同时增加了综合能源系统(IES)的运行成本。本文提出了一种考虑阶梯型碳交易机制的IES最优运行策略,利用热网的动态特性来补偿增加的运行成本。首先建立热网的传输模型,分析热网在传热过程中的动态特性,然后引入阶梯式碳交易机制,并据此分析其对IES运行的影响。最后,建立了考虑阶梯型碳交易机制和热网动态特性的IES最优运行模型。规划模型表示为混合整数二次规划(MIQP)。进行了仿真实验验证。结果表明,考虑阶梯式碳交易机制和IES热网的动态特性,可以提高风电的消纳率,降低系统运行成本和碳排放。
{"title":"Collaborative Optimisation of Carbon Trading Mechanism and Heat Network in Integrated Energy System","authors":"Zhiguo Dong,&nbsp;Li Wang,&nbsp;Fengxiang Xie,&nbsp;Yongcheng Yu,&nbsp;Runjie Li,&nbsp;Luyong Cao","doi":"10.1049/cps2.70009","DOIUrl":"10.1049/cps2.70009","url":null,"abstract":"<p>To achieve low-carbon development, the ladder-type carbon trading mechanism is proved to be beneficial to reduce carbon emissions while increasing the operation cost of the integrated energy system (IES). In this paper, an IES optimal operation strategy considering the ladder-type carbon trading mechanism is proposed, with the help of the dynamic characteristics of the heat network to compensate for the increased operation cost. First, the transmission model of the heat network is established, and the dynamic characteristic of the heat network during the heat transfer process is analysed Then, the ladder-type carbon trading mechanism is introduced, and the impact on IES operation is analysed accordingly. Finally, the IES optimal operation model considering the ladder-type carbon trading mechanism and the dynamic characteristics of the heat network is established. The programming model is expressed as mixed-integer quadratic programming (MIQP). Simulation experiments are carried out for validation. The results show that considering the ladder-type carbon trading mechanism and the dynamic characteristics of the heat network in the IES can improve the wind power consumption rate and reduce the system operation cost and carbon emissions.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70009","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143612504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Damping Characteristics in Wind Turbine-Energy Storage Hybrid Systems Based on Path Module 基于路径模块的风电-储能混合系统阻尼特性分析
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-07 DOI: 10.1049/cps2.70006
Shanshan Cheng, Haixin Wang, Jing Li, Shengyang Lu, Xinyi Lu, Junyou Yang, Zhe Chen

Current analytical methods are inadequate in uncovering the internal propagation mechanisms of disturbances and the interconnections between subsystems in the wind turbine-storage integrated grid connected system, which faces stability issues. Therefore, this paper employs a damping module modelling approach to conduct a dynamic analysis of the dynamic interactions in wind turbine-storage storage integrated systems, focusing on the damping path analysis with the phase-locked loop (PLL) as the oscillation mode. The research initiates with the linearisation of the doubly-fed induction generator (DFIG) and energy storage system (ESS) models. The closed-loop structure of the system is then presented to expose the disturbance propagation paths between subsystems. Subsequently, the damping coefficients of the second-order dynamic equation are expanded to include the dynamic equations of the most prominent oscillation mode, which establishes stability criteria for the system. Finally, by performing damping decomposition and reconstruction, the damping coefficients of each subsystem as well as the total damping coefficient of the interconnection system are obtained. An analysis is conducted on how the proportional-integral parameters of the PLL affect the damping of the interconnection system. The results suggest that the damping paths of the DFIG and the ESS can be expressed as a closed-loop structure diagram. By decreasing the proportional or integral coefficients of the PLL, the overall damping coefficient is increased, resulting in an enhancement of the stability of the grid-connected system.

现有的分析方法不足以揭示风电-储能一体化并网系统中扰动的内部传播机制和子系统之间的互联关系,该系统面临稳定性问题。因此,本文采用阻尼模块建模方法对风电-蓄电集成系统的动态相互作用进行动态分析,重点分析以锁相环(PLL)为振荡模态的阻尼路径。研究从双馈感应发电机(DFIG)和储能系统(ESS)模型的线性化开始。然后提出了系统的闭环结构,以暴露子系统之间的扰动传播路径。随后,将二阶动力学方程的阻尼系数展开,使其包含最显著振型的动力学方程,从而建立了系统的稳定性判据。最后,通过对阻尼进行分解和重构,得到各子系统的阻尼系数以及互联系统的总阻尼系数。分析了锁相环的比例积分参数对互连系统阻尼的影响。结果表明,DFIG和ESS的阻尼路径可以用闭环结构图表示。通过减小锁相环的比例系数或积分系数,增加了总体阻尼系数,从而增强了并网系统的稳定性。
{"title":"Analysis of Damping Characteristics in Wind Turbine-Energy Storage Hybrid Systems Based on Path Module","authors":"Shanshan Cheng,&nbsp;Haixin Wang,&nbsp;Jing Li,&nbsp;Shengyang Lu,&nbsp;Xinyi Lu,&nbsp;Junyou Yang,&nbsp;Zhe Chen","doi":"10.1049/cps2.70006","DOIUrl":"10.1049/cps2.70006","url":null,"abstract":"<p>Current analytical methods are inadequate in uncovering the internal propagation mechanisms of disturbances and the interconnections between subsystems in the wind turbine-storage integrated grid connected system, which faces stability issues. Therefore, this paper employs a damping module modelling approach to conduct a dynamic analysis of the dynamic interactions in wind turbine-storage storage integrated systems, focusing on the damping path analysis with the phase-locked loop (PLL) as the oscillation mode. The research initiates with the linearisation of the doubly-fed induction generator (DFIG) and energy storage system (ESS) models. The closed-loop structure of the system is then presented to expose the disturbance propagation paths between subsystems. Subsequently, the damping coefficients of the second-order dynamic equation are expanded to include the dynamic equations of the most prominent oscillation mode, which establishes stability criteria for the system. Finally, by performing damping decomposition and reconstruction, the damping coefficients of each subsystem as well as the total damping coefficient of the interconnection system are obtained. An analysis is conducted on how the proportional-integral parameters of the PLL affect the damping of the interconnection system. The results suggest that the damping paths of the DFIG and the ESS can be expressed as a closed-loop structure diagram. By decreasing the proportional or integral coefficients of the PLL, the overall damping coefficient is increased, resulting in an enhancement of the stability of the grid-connected system.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143571232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Ports of Web Applications Against Cross Site Port Attack (XSPA) by Using a Strong Session Identifier (Session ID) 使用强会话标识符(Session ID)保护Web应用程序端口免受跨站端口攻击(XSPA)
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-25 DOI: 10.1049/cps2.70005
Kavita Bhatia, Santosh K. Pandey, Vivek K. Singh, Deena Nath Gupta

XSPA vulnerability can be attacked by stealing the cookie's information. In this case, it becomes utmost necessary to secure the information written in a cookie. A cookie contains a session ID that is a unique number generated by the server. This session ID must be a large random number so that no one can guess a valid session ID in real-time. Numerous research studies have been accomplished on the same but the area still persist gaps in view of emerging threats, such as phishing, pharming, and DoS. This paper proposes a new random-number generator that produces unique numbers in bulk. This helps the server to match the high demand of unique session IDs from different clients. The proposed generator is suitable for all types of web applications, because it requires the smallest area of only 134 Gate Equivalent on the application specific integrated circuit (ASIC) for its execution. Additionally, the proposed generator passed all tests of EPCglobal. Total time delay of digital circuit and power analysis results presented in the subsequent sections are also in the favour of proposed generator. With the implementation of this proposed technique cookies are expected to be more secure as evident from try-out results.

可以通过窃取cookie的信息来攻击XSPA漏洞。在这种情况下,保护写入cookie中的信息就变得极为必要。cookie包含一个会话ID,是服务器生成的唯一编号。这个会话ID必须是一个大的随机数,这样没有人可以实时猜测一个有效的会话ID。许多研究已经完成,但该领域仍然存在差距,考虑到新兴的威胁,如网络钓鱼,钓鱼和DoS。本文提出了一种新的随机数生成器,可以批量生成唯一的随机数。这有助于服务器匹配来自不同客户端的唯一会话id的高需求。所提出的生成器适用于所有类型的web应用程序,因为它在特定应用集成电路(ASIC)上只需要134个栅极等效的最小面积即可执行。此外,提议的发生器通过了EPCglobal的所有测试。数字电路的总时延和后续章节中给出的功率分析结果也支持所提出的发电机。随着这一技术的实现,从试用结果可以看出,cookie有望更加安全。
{"title":"Securing Ports of Web Applications Against Cross Site Port Attack (XSPA) by Using a Strong Session Identifier (Session ID)","authors":"Kavita Bhatia,&nbsp;Santosh K. Pandey,&nbsp;Vivek K. Singh,&nbsp;Deena Nath Gupta","doi":"10.1049/cps2.70005","DOIUrl":"10.1049/cps2.70005","url":null,"abstract":"<p>XSPA vulnerability can be attacked by stealing the cookie's information. In this case, it becomes utmost necessary to secure the information written in a cookie. A cookie contains a session ID that is a unique number generated by the server. This session ID must be a large random number so that no one can guess a valid session ID in real-time. Numerous research studies have been accomplished on the same but the area still persist gaps in view of emerging threats, such as phishing, pharming, and DoS. This paper proposes a new random-number generator that produces unique numbers in bulk. This helps the server to match the high demand of unique session IDs from different clients. The proposed generator is suitable for all types of web applications, because it requires the smallest area of only 134 Gate Equivalent on the application specific integrated circuit (ASIC) for its execution. Additionally, the proposed generator passed all tests of EPCglobal. Total time delay of digital circuit and power analysis results presented in the subsequent sections are also in the favour of proposed generator. With the implementation of this proposed technique cookies are expected to be more secure as evident from try-out results.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143481347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive learning anomaly detection and classification model for cyber and physical threats in industrial control systems 工业控制系统中网络与物理威胁的自适应学习异常检测与分类模型
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-14 DOI: 10.1049/cps2.70004
Gabriela Ahmadi-Assalemi, Haider Al-Khateeb, Vladlena Benson, Bogdan Adamyk, Meryem Ammi

A surge of digital technologies adopted into Industrial Control Systems (ICS) exposes critical infrastructures to increasingly hostile and well-organised cybercrime. The increased need for flexibility and convenient administration expands the attack surface. Likewise, an insider with authorised access reveals a difficult-to-detect attack vector. Because of the range of critical services that ICS provide, disruptions to operations could have devastating consequences making ICS an attractive target for sophisticated threat actors. Hence, the authors introduce a novel anomalous behaviour detection model for ICS data streams from physical plant sensors. A model for one-class classification is developed, using stream rebalancing followed by adaptive machine learning algorithms coupled with drift detection methods to detect anomalies from physical plant sensor data. The authors’ approach is shown on ICS datasets. Additionally, a use case illustrates the model's applicability to post-incident investigations as part of a defence-in-depth capability in ICS. The experimental results show that the proposed model achieves an overall Matthews Correlation Coefficient score of 0.999 and Cohen's Kappa score of 0.9986 on limited variable single-type anomalous behaviour per data stream. The results on wide data streams achieve an MCC score of 0.981 and a K score of 0.9808 in the prevalence of multiple types of anomalous instances.

工业控制系统(ICS)中采用的数字技术激增,使关键基础设施暴露于日益敌对和组织良好的网络犯罪之下。对灵活性和方便管理的需求增加扩大了攻击面。同样,具有授权访问权限的内部人员暴露了难以检测的攻击向量。由于ICS提供的一系列关键服务,运营中断可能会造成破坏性后果,使ICS成为复杂威胁行为者的有吸引力的目标。因此,作者为来自物理植物传感器的ICS数据流引入了一种新的异常行为检测模型。开发了一类分类模型,使用流再平衡,然后使用自适应机器学习算法以及漂移检测方法来检测物理植物传感器数据中的异常。作者的方法显示在ICS数据集上。此外,用例说明了该模型在事件后调查中的适用性,作为ICS中深度防御功能的一部分。实验结果表明,该模型在每个数据流有限变量单一类型异常行为上的总体Matthews相关系数得分为0.999,Cohen’s Kappa得分为0.9986。在大数据流条件下,多类型异常实例的MCC得分为0.981,K得分为0.9808。
{"title":"Adaptive learning anomaly detection and classification model for cyber and physical threats in industrial control systems","authors":"Gabriela Ahmadi-Assalemi,&nbsp;Haider Al-Khateeb,&nbsp;Vladlena Benson,&nbsp;Bogdan Adamyk,&nbsp;Meryem Ammi","doi":"10.1049/cps2.70004","DOIUrl":"10.1049/cps2.70004","url":null,"abstract":"<p>A surge of digital technologies adopted into Industrial Control Systems (ICS) exposes critical infrastructures to increasingly hostile and well-organised cybercrime. The increased need for flexibility and convenient administration expands the attack surface. Likewise, an insider with authorised access reveals a difficult-to-detect attack vector. Because of the range of critical services that ICS provide, disruptions to operations could have devastating consequences making ICS an attractive target for sophisticated threat actors. Hence, the authors introduce a novel anomalous behaviour detection model for ICS data streams from physical plant sensors. A model for one-class classification is developed, using stream rebalancing followed by adaptive machine learning algorithms coupled with drift detection methods to detect anomalies from physical plant sensor data. The authors’ approach is shown on ICS datasets. Additionally, a use case illustrates the model's applicability to post-incident investigations as part of a defence-in-depth capability in ICS. The experimental results show that the proposed model achieves an overall Matthews Correlation Coefficient score of 0.999 and Cohen's Kappa score of 0.9986 on limited variable single-type anomalous behaviour per data stream. The results on wide data streams achieve an MCC score of 0.981 and a K score of 0.9808 in the prevalence of multiple types of anomalous instances.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143404626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multiscale and multilevel fusion network based on ResNet and MobileFaceNet for facial expression recognition 一种基于ResNet和MobileFaceNet的多尺度多层次融合网络用于面部表情识别
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-10 DOI: 10.1049/cps2.70003
Jiao Ding, Tianfei Zhang, Li Yang, Tianhan Hu

There are complex correlations between facial expression and facial landmarks in facial images. The facial landmarks detection technology is more mature than the facial expression recognition methods. Considering this, in order to better address the problem of interclass similarity and intraclass discrepancy in facial expressions recognition (FER), facial landmarks are used to supervise the learning of facial expression features in our work, and a multiscale and multilevel fusion network based on ResNet and MobileFaceNet (MMFRM) is proposed for FER. Specifically, the authors designed a triple CBAM feature fusion module (TCFFM) that characterises the correlation between facial expression and facial landmarks to better guide the learning of expression features. Furthermore, the proposed loss function of removing facial residual features (RFLoss) can suppress facial features and highlight expression features. We extensively validate our proposed MMFRM on two public facial expression datasets, demonstrating the effectiveness of our method.

人脸图像中面部表情与面部标志之间存在复杂的相关性。人脸特征点检测技术比人脸表情识别技术更为成熟。为此,为了更好地解决面部表情识别中的类间相似性和类内差异问题,我们在工作中利用面部地标来监督面部表情特征的学习,并提出了一种基于ResNet和MobileFaceNet的多尺度多层次融合网络(MMFRM)用于面部表情识别。具体而言,作者设计了一个三重CBAM特征融合模块(TCFFM),表征面部表情与面部地标之间的相关性,以更好地指导表情特征的学习。此外,提出的去除面部残留特征的损失函数(RFLoss)可以抑制面部特征,突出表情特征。我们在两个公共面部表情数据集上广泛验证了我们提出的MMFRM,证明了我们的方法的有效性。
{"title":"A multiscale and multilevel fusion network based on ResNet and MobileFaceNet for facial expression recognition","authors":"Jiao Ding,&nbsp;Tianfei Zhang,&nbsp;Li Yang,&nbsp;Tianhan Hu","doi":"10.1049/cps2.70003","DOIUrl":"10.1049/cps2.70003","url":null,"abstract":"<p>There are complex correlations between facial expression and facial landmarks in facial images. The facial landmarks detection technology is more mature than the facial expression recognition methods. Considering this, in order to better address the problem of interclass similarity and intraclass discrepancy in facial expressions recognition (FER), facial landmarks are used to supervise the learning of facial expression features in our work, and a multiscale and multilevel fusion network based on ResNet and MobileFaceNet (MMFRM) is proposed for FER. Specifically, the authors designed a triple CBAM feature fusion module (TCFFM) that characterises the correlation between facial expression and facial landmarks to better guide the learning of expression features. Furthermore, the proposed loss function of removing facial residual features (RFLoss) can suppress facial features and highlight expression features. We extensively validate our proposed MMFRM on two public facial expression datasets, demonstrating the effectiveness of our method.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143379956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient learning of uncertainty distributions in coupled multidisciplinary systems through sensory data 基于传感数据的耦合多学科系统不确定性分布的有效学习
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-04 DOI: 10.1049/cps2.70000
Negar Asadi, Seyede Fatemeh Ghoreishi

Coupled multidisciplinary systems are fundamental to many complex engineering systems, such as those in cyber–physical systems, aerospace engineering, automotive systems, energy networks, and robotics. Accurate analysis, control, and monitoring of these systems depend on effectively inferring their inherent uncertainties. However, the dynamic nature of these systems, along with the interconnectivity of various disciplines, poses significant challenges for uncertainty estimation. This paper presents a framework for learning uncertainty distributions in partially observed coupled multidisciplinary systems. By employing a non-linear/non-Gaussian hidden Markov model (HMM) representation, the authors capture the stochastic nature of system states and observations. The proposed methodology leverages particle filtering techniques and Bayesian optimisation for efficient parameter estimation, accounting for the inherent uncertainties in input statistics. Numerical experiments on a coupled aerodynamics-structures system and a power converter system demonstrate the efficacy of the proposed method in estimating input distribution statistics. The results highlight the critical importance of accounting for non-stationary behaviours in coupled multidisciplinary systems for capturing the true variability of input statistics and showcase the superiority of our method over approaches that assume data derive from the stationary state of the system.

耦合多学科系统是许多复杂工程系统的基础,例如网络物理系统、航空航天工程、汽车系统、能源网络和机器人。对这些系统的准确分析、控制和监测依赖于对其固有不确定性的有效推断。然而,这些系统的动态性,以及各学科的相互联系,对不确定性估计提出了重大挑战。本文提出了一个局部观测耦合多学科系统中不确定性分布学习的框架。通过采用非线性/非高斯隐马尔可夫模型(HMM)表示,作者捕获了系统状态和观测值的随机性质。所提出的方法利用粒子滤波技术和贝叶斯优化进行有效的参数估计,考虑到输入统计中固有的不确定性。在空气动力-结构耦合系统和功率变换器系统上的数值实验证明了该方法在估计输入分布统计量方面的有效性。结果强调了在耦合多学科系统中对非平稳行为进行核算的重要性,以捕获输入统计的真正可变性,并展示了我们的方法比假设数据来自系统的平稳状态的方法的优越性。
{"title":"Efficient learning of uncertainty distributions in coupled multidisciplinary systems through sensory data","authors":"Negar Asadi,&nbsp;Seyede Fatemeh Ghoreishi","doi":"10.1049/cps2.70000","DOIUrl":"10.1049/cps2.70000","url":null,"abstract":"<p>Coupled multidisciplinary systems are fundamental to many complex engineering systems, such as those in cyber–physical systems, aerospace engineering, automotive systems, energy networks, and robotics. Accurate analysis, control, and monitoring of these systems depend on effectively inferring their inherent uncertainties. However, the dynamic nature of these systems, along with the interconnectivity of various disciplines, poses significant challenges for uncertainty estimation. This paper presents a framework for learning uncertainty distributions in partially observed coupled multidisciplinary systems. By employing a non-linear/non-Gaussian hidden Markov model (HMM) representation, the authors capture the stochastic nature of system states and observations. The proposed methodology leverages particle filtering techniques and Bayesian optimisation for efficient parameter estimation, accounting for the inherent uncertainties in input statistics. Numerical experiments on a coupled aerodynamics-structures system and a power converter system demonstrate the efficacy of the proposed method in estimating input distribution statistics. The results highlight the critical importance of accounting for non-stationary behaviours in coupled multidisciplinary systems for capturing the true variability of input statistics and showcase the superiority of our method over approaches that assume data derive from the stationary state of the system.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70000","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143111841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FL-ADS: Federated learning anomaly detection system for distributed energy resource networks FL-ADS:分布式能源资源网络联合学习异常检测系统
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-29 DOI: 10.1049/cps2.70001
Shaurya Purohit, Manimaran Govindarasu, Benjamin Blakely

With the ongoing development of Distributed Energy Resources (DER) communication networks, the imperative for strong cybersecurity and data privacy safeguards is increasingly evident. DER networks, which rely on protocols such as Distributed Network Protocol 3 and Modbus, are susceptible to cyberattacks such as data integrity breaches and denial of service due to their inherent security vulnerabilities. This paper introduces an innovative Federated Learning (FL)-based anomaly detection system designed to enhance the security of DER networks while preserving data privacy. Our models leverage Vertical and Horizontal Federated Learning to enable collaborative learning while preserving data privacy, exchanging only non-sensitive information, such as model parameters, and maintaining the privacy of DER clients' raw data. The effectiveness of the models is demonstrated through its evaluation on datasets representative of real-world DER scenarios, showcasing significant improvements in accuracy and F1-score across all clients compared to the traditional baseline model. Additionally, this work demonstrates a consistent reduction in loss function over multiple FL rounds, further validating its efficacy and offering a robust solution that balances effective anomaly detection with stringent data privacy needs.

随着分布式能源(DER)通信网络的不断发展,强大的网络安全和数据隐私保护的必要性日益明显。DER网络依赖于分布式网络协议3和Modbus等协议,由于其固有的安全漏洞,容易受到数据完整性破坏和拒绝服务等网络攻击。本文介绍了一种创新的基于联邦学习(FL)的异常检测系统,旨在增强DER网络的安全性,同时保护数据隐私。我们的模型利用垂直和水平联邦学习来实现协作学习,同时保护数据隐私,仅交换非敏感信息(如模型参数),并维护DER客户端原始数据的隐私。模型的有效性通过其对代表真实世界DER场景的数据集的评估来证明,与传统基线模型相比,在所有客户端显示出准确性和f1分数的显着提高。此外,这项工作证明了在多个FL轮中损失函数的一致减少,进一步验证了其有效性,并提供了一个强大的解决方案,平衡了有效的异常检测和严格的数据隐私需求。
{"title":"FL-ADS: Federated learning anomaly detection system for distributed energy resource networks","authors":"Shaurya Purohit,&nbsp;Manimaran Govindarasu,&nbsp;Benjamin Blakely","doi":"10.1049/cps2.70001","DOIUrl":"10.1049/cps2.70001","url":null,"abstract":"<p>With the ongoing development of Distributed Energy Resources (DER) communication networks, the imperative for strong cybersecurity and data privacy safeguards is increasingly evident. DER networks, which rely on protocols such as Distributed Network Protocol 3 and Modbus, are susceptible to cyberattacks such as data integrity breaches and denial of service due to their inherent security vulnerabilities. This paper introduces an innovative Federated Learning (FL)-based anomaly detection system designed to enhance the security of DER networks while preserving data privacy. Our models leverage Vertical and Horizontal Federated Learning to enable collaborative learning while preserving data privacy, exchanging only non-sensitive information, such as model parameters, and maintaining the privacy of DER clients' raw data. The effectiveness of the models is demonstrated through its evaluation on datasets representative of real-world DER scenarios, showcasing significant improvements in accuracy and F1-score across all clients compared to the traditional baseline model. Additionally, this work demonstrates a consistent reduction in loss function over multiple FL rounds, further validating its efficacy and offering a robust solution that balances effective anomaly detection with stringent data privacy needs.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143120821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysing a multi-stage cyber threat and its impact on the power system 分析多阶段网络威胁及其对电力系统的影响
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-24 DOI: 10.1049/cps2.12107
Leen Al Homoud, Namrata Barpanda, Vinicius Bobato, Ana Goulart, Kate Davis, Mark Rice

Electric power systems are composed of physical and cyber sub-systems. The sub-systems depend on each other. If the cyber sub-system is compromised by a cyber threat, what is the impact on the physical system? This paper presents a case study that shows the steps of a multi-stage cyber threat involving a database injection attack, and what happens to the power system if this threat is not detected in its early stages. The threat first affects one utility but it can spread to the balancing authority, which is responsible for keeping the voltage and frequency stable in the power grid. During the cyber threat, the authors also show defence tools, such as a cyber-physical data fusion tool that displays and analyses power and cyber telemetry.

电力系统由物理子系统和网络子系统组成。子系统相互依赖。如果网络子系统受到网络威胁,对物理系统的影响是什么?本文提出了一个案例研究,展示了涉及数据库注入攻击的多阶段网络威胁的步骤,以及如果在早期阶段未检测到这种威胁会对电力系统产生什么影响。这种威胁首先影响到一家公用事业公司,但它可以扩散到负责保持电网电压和频率稳定的平衡机构。在网络威胁期间,作者还展示了防御工具,例如显示和分析电力和网络遥测的网络物理数据融合工具。
{"title":"Analysing a multi-stage cyber threat and its impact on the power system","authors":"Leen Al Homoud,&nbsp;Namrata Barpanda,&nbsp;Vinicius Bobato,&nbsp;Ana Goulart,&nbsp;Kate Davis,&nbsp;Mark Rice","doi":"10.1049/cps2.12107","DOIUrl":"10.1049/cps2.12107","url":null,"abstract":"<p>Electric power systems are composed of physical and cyber sub-systems. The sub-systems depend on each other. If the cyber sub-system is compromised by a cyber threat, what is the impact on the physical system? This paper presents a case study that shows the steps of a multi-stage cyber threat involving a database injection attack, and what happens to the power system if this threat is not detected in its early stages. The threat first affects one utility but it can spread to the balancing authority, which is responsible for keeping the voltage and frequency stable in the power grid. During the cyber threat, the authors also show defence tools, such as a cyber-physical data fusion tool that displays and analyses power and cyber telemetry.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12107","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143118620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Cyber-Physical Systems: Theory and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1