2.3(top 20%)
impact factor
177(top 50%)
papers
2.7K(top 50%)
citations
23(top 20%)
h-index
2.4(top 20%)
impact factor
274
all documents
2.8K
doc citations
45(top 20%)
g-index

Top Articles

#TitleJournalYearCitations
1Cyber‐physical attacks and defences in the smart grid: a surveyIET Cyber-Physical Systems: Theory and Applications2016332
2Cybersecurity for distributed energy resources and smart invertersIET Cyber-Physical Systems: Theory and Applications2016146
3Enabling cyber‐physical communication in 5G cellular networks: challenges, spatial spectrum sensing, and cyber‐securityIET Cyber-Physical Systems: Theory and Applications2017132
4Design optimisation of cyber‐physical distributed systems using IEEE time‐sensitive networksIET Cyber-Physical Systems: Theory and Applications2016115
5Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning methodIET Cyber-Physical Systems: Theory and Applications2017101
6Designing CPS/IoT applications for smart buildings and citiesIET Cyber-Physical Systems: Theory and Applications201687
7Review of the false data injection attack against the cyber‐physical power systemIET Cyber-Physical Systems: Theory and Applications201971
8Developing IoT applications: challenges and frameworksIET Cyber-Physical Systems: Theory and Applications201867
9Safety and security risk assessment in cyber‐physical systemsIET Cyber-Physical Systems: Theory and Applications201963
10Remote health care cyber‐physical system: quality of service (QoS) challenges and opportunitiesIET Cyber-Physical Systems: Theory and Applications201658
11GPS spoofing effect on phase angle monitoring and control in a real‐time digital simulator‐based hardware‐in‐the‐loop environmentIET Cyber-Physical Systems: Theory and Applications201749
12Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbedIET Cyber-Physical Systems: Theory and Applications202146
13Entropy‐based electricity theft detection in AMI networkIET Cyber-Physical Systems: Theory and Applications201842
14Assessing and mitigating cybersecurity risks of traffic light systems in smart citiesIET Cyber-Physical Systems: Theory and Applications201638
15Energy theft detection for AMI using principal component analysis based reconstructed dataIET Cyber-Physical Systems: Theory and Applications201936
16Power system effects and mitigation recommendations for DER cyberattacksIET Cyber-Physical Systems: Theory and Applications201936
17Platform choices and design demands for IoT platforms: cost, power, and performance tradeoffsIET Cyber-Physical Systems: Theory and Applications201635
18Relaxation‐based anomaly detection in cyber‐physical systems using ensemble kalman filterIET Cyber-Physical Systems: Theory and Applications202034
19Review of distributed control and optimization in energy internet: From traditional methods to artificial intelligence‐based methodsIET Cyber-Physical Systems: Theory and Applications202134
20Distributed meter data aggregation framework based on Blockchain and homomorphic encryptionIET Cyber-Physical Systems: Theory and Applications201932
21Cyber–physical security for on‐going smart grid initiatives: a surveyIET Cyber-Physical Systems: Theory and Applications202029
22Assessing DER network cybersecurity defences in a power‐communication co‐simulation environmentIET Cyber-Physical Systems: Theory and Applications202028
23Real‐time cyber−physical system co‐simulation testbed for microgrids controlIET Cyber-Physical Systems: Theory and Applications201925
245G ready optical fog‐assisted cyber‐physical system for IoT applicationsIET Cyber-Physical Systems: Theory and Applications202025
25Sliding mode‐based active disturbance rejection control for vehicle steer‐by‐wire systemsIET Cyber-Physical Systems: Theory and Applications201821
26FARIMA model‐based communication traffic anomaly detection in intelligent electric power substationsIET Cyber-Physical Systems: Theory and Applications201921
27Game‐theoretic cybersecurity analysis for false data injection attack on networked microgridsIET Cyber-Physical Systems: Theory and Applications201921
28Modelling and evaluation of the security of cyber‐physical systems using stochastic Petri netsIET Cyber-Physical Systems: Theory and Applications201921
29Cyber–physical attacks on power distribution systemsIET Cyber-Physical Systems: Theory and Applications202021
30Cyber‐physical robust control framework for enhancing transient stability of smart gridsIET Cyber-Physical Systems: Theory and Applications201720
31Review of static risk‐based security assessment in power systemIET Cyber-Physical Systems: Theory and Applications201920
32IoT‐based cyber‐physical communication architecture: challenges and research directionsIET Cyber-Physical Systems: Theory and Applications202020
33Assets focus risk management framework for critical infrastructure cybersecurity risk managementIET Cyber-Physical Systems: Theory and Applications201919
34Distributed model predictive control for wide area measurement power systems under malicious attacksIET Cyber-Physical Systems: Theory and Applications201818
35CyPhyR: a cyber‐physical analysis tool for measuring and enabling resiliency in microgridsIET Cyber-Physical Systems: Theory and Applications201918
36PRIME: a real‐time cyber‐physical systems testbed: from wide‐area monitoring, protection, and control prototyping to operator training and beyondIET Cyber-Physical Systems: Theory and Applications202018
37Flexible hardware‐in‐the‐loop testbed for cyber physical power system simulationIET Cyber-Physical Systems: Theory and Applications201918
38Design and evaluation of a cyber‐physical testbed for improving attack resilience of power systemsIET Cyber-Physical Systems: Theory and Applications202117
39Verifying the structure and behavior in UML/OCL models using satisfiability solversIET Cyber-Physical Systems: Theory and Applications201616
40Handling multi‐parametric variations in distributed control of cyber‐physical energy systems through optimal communication designIET Cyber-Physical Systems: Theory and Applications201716
41Three‐stage electric vehicle scheduling considering stakeholders economic inconsistency and battery degradationIET Cyber-Physical Systems: Theory and Applications201716
42Short‐term risk assessment of botnet attacks on advanced metering infrastructureIET Cyber-Physical Systems: Theory and Applications201716
43Fault data injection attack on car‐following model and mitigation based on interval type‐2 fuzzy logic controllerIET Cyber-Physical Systems: Theory and Applications201916
44Optimal energy management strategy in microgrids with mixed energy resources and energy storage systemIET Cyber-Physical Systems: Theory and Applications202016
45Fuzzy logic approach to modelling trust in cloud computingIET Cyber-Physical Systems: Theory and Applications201715
46New communication strategy for spectrum sharing enabled smart grid cyber‐physical systemIET Cyber-Physical Systems: Theory and Applications201715
47Mind your thoughts: BCI using single EEG electrodeIET Cyber-Physical Systems: Theory and Applications201915
48Demand side management with consumer clusters in cyber‐physical smart distribution system considering price‐based and reward‐based scheduling programsIET Cyber-Physical Systems: Theory and Applications201714
49Risk assessment for the cascading failure of electric cyber‐physical system considering multiple information factorsIET Cyber-Physical Systems: Theory and Applications201714
50Stabilising control strategy for cyber‐physical power systemsIET Cyber-Physical Systems: Theory and Applications201914