{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T04:01:48Z","timestamp":1771473708239,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:00:00Z","timestamp":1771372800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:00:00Z","timestamp":1771372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"DOI":"10.1007\/s10207-026-01222-4","type":"journal-article","created":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T14:37:51Z","timestamp":1771425471000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive strategy optimization for cyber-physical systems under denial-of-service attacks using continuous learning automata"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5200-9668","authenticated-orcid":false,"given":"Diana","family":"Gheiby","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8974-2841","authenticated-orcid":false,"given":"Soulmaz","family":"Gheisari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,18]]},"reference":[{"key":"1222_CR1","doi-asserted-by":"publisher","first-page":"1407","DOI":"10.1007\/s11424-022-2120-6","volume":"36","author":"Z Pang","year":"2023","unstructured":"Pang, Z., Fu, Y., Guo, H., Sun, J.: Analysis of stealthy false data injection attacks against networked control systems: three case studies. J. Syst. Sci. Complex. 36, 1407\u20131422 (2023)","journal-title":"J. Syst. Sci. Complex."},{"key":"1222_CR2","doi-asserted-by":"publisher","DOI":"10.3390\/w15122289","volume":"15","author":"IM Pershin","year":"2023","unstructured":"Pershin, I.M., Papush, E.G., Kukharova, T.V., Utkin, V.A.: Modeling of distributed control system for network of mineral water wells. Water 15, 2289 (2023)","journal-title":"Water"},{"key":"1222_CR3","doi-asserted-by":"publisher","DOI":"10.3390\/en16135088","volume":"16","author":"S Giannelos","year":"2023","unstructured":"Giannelos, S., Borozan, S., Aunedi, M., Zhang, X., Ameli, H., Pudjianto, D., Konstantelos, I., Strbac, G.: Modelling smart grid technologies in optimisation problems for electricity grids. Energies 16, 5088 (2023)","journal-title":"Energies"},{"key":"1222_CR4","doi-asserted-by":"publisher","DOI":"10.3390\/technologies11030081","volume":"11","author":"S Dorji","year":"2023","unstructured":"Dorji, S., Stonier, A.A., Peter, G., Kuppusamy, R., Teekaraman, Y.: An extensive critique on smart grid technologies: recent advancements, key challenges, and future directions. Technologies 11, 81 (2023)","journal-title":"Technologies"},{"key":"1222_CR5","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.automatica.2014.10.067","volume":"51","author":"A Teixeira","year":"2015","unstructured":"Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: A secure control framework for resource-limited adversaries. Automatica 51, 135\u2013148 (2015)","journal-title":"Automatica"},{"key":"1222_CR6","doi-asserted-by":"crossref","unstructured":"Sharma, D.M., Shandilya, S.K.: Attack detection based on machine learning techniques to safe and secure for CPS\u2014a review. In: International Conference on IoT, Intelligent Computing and Security: Select Proceedings of IICS 2021. pp. 273\u2013286 (2023)","DOI":"10.1007\/978-981-19-8136-4_23"},{"key":"1222_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.isatra.2021.01.036","volume":"116","author":"D Zhang","year":"2021","unstructured":"Zhang, D., Wang, Q.-G., Feng, G., Shi, Y., Vasilakos, A.V.: A survey on attack detection, estimation and control of industrial cyber\u2013physical systems. ISA Trans. 116, 1\u201316 (2021)","journal-title":"ISA Trans."},{"key":"1222_CR8","first-page":"2245","volume":"14","author":"C-C Kuo","year":"2018","unstructured":"Kuo, C.-C., Chain, K., Yang, C.S.: others: Cyber attack and defense training: Using emulab as a platform. Int. J. Innov. Comput. Inf. Control. 14, 2245\u20132258 (2018)","journal-title":"Int. J. Innov. Comput. Inf. Control."},{"key":"1222_CR9","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11193161","volume":"11","author":"Z Jin","year":"2022","unstructured":"Jin, Z., Ma, M., Zhang, S., Hu, Y., Zhang, Y., Sun, C.: Secure state estimation of cyber-physical system under cyber attacks: Q-learning vs. SARSA. Electronics 11, 3161 (2022)","journal-title":"Electronics"},{"key":"1222_CR10","doi-asserted-by":"publisher","first-page":"4950","DOI":"10.1109\/TSMC.2021.3106228","volume":"52","author":"Z Kazemi","year":"2021","unstructured":"Kazemi, Z., Safavi, A.A., Arefi, M.M., Naseri, F.: Finite-time secure dynamic state estimation for cyber\u2013physical systems under unknown inputs and sensor attacks. IEEE Trans. Syst. Man Cybern. Syst. 52, 4950\u20134959 (2021)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"1222_CR11","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TSMC.2020.3041121","volume":"51","author":"D Ding","year":"2020","unstructured":"Ding, D., Han, Q.-L., Ge, X., Wang, J.: Secure state estimation and control of cyber-physical systems: a survey. IEEE Trans. Syst. Man, Cybern. Syst. 51, 176\u2013190 (2020)","journal-title":"IEEE Trans. Syst. Man, Cybern. Syst."},{"key":"1222_CR12","doi-asserted-by":"publisher","first-page":"3425","DOI":"10.1109\/TSG.2021.3052303","volume":"12","author":"L Xu","year":"2021","unstructured":"Xu, L., Guo, Q., Wang, Z., Sun, H.: Modeling of time-delayed distributed cyber-physical power systems for small-signal stability analysis. IEEE Trans. Smart Grid 12, 3425\u20133437 (2021)","journal-title":"IEEE Trans. Smart Grid"},{"key":"1222_CR13","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1515\/auto-2016-0065","volume":"64","author":"S Kang","year":"2016","unstructured":"Kang, S., Jeon, J., Kim, H.-S., Chun, I.: CPS-based fault-tolerance method for smart factories: simulation-based framework and fault management application. Automatisierungstech 64, 750\u2013757 (2016)","journal-title":"Automatisierungstech"},{"key":"1222_CR14","doi-asserted-by":"publisher","first-page":"4924","DOI":"10.1109\/TCYB.2020.3034374","volume":"51","author":"X Wang","year":"2020","unstructured":"Wang, X., Park, J.H., Liu, H., Zhang, X.: Cooperative output-feedback secure control of distributed linear cyber-physical systems resist intermittent DoS attacks. IEEE Trans. Cybern. 51, 4924\u20134933 (2020)","journal-title":"IEEE Trans. Cybern."},{"key":"1222_CR15","doi-asserted-by":"crossref","unstructured":"Mertoguno, J.S., Craven, R.M., Mickelson, M.S., Koller, D.P.: A physics-based strategy for cyber resilience of CPS. In: Autonomous Systems: Sensors, Processing, and Security for Vehicles and Infrastructure 2019. pp. 79\u201390 (2019)","DOI":"10.1117\/12.2517604"},{"key":"1222_CR16","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.arcontrol.2022.03.004","volume":"53","author":"S Liu","year":"2022","unstructured":"Liu, S., Trivedi, A., Yin, X., Zamani, M.: Secure-by-construction synthesis of cyber-physical systems. Annu. Rev. Control. 53, 30\u201350 (2022)","journal-title":"Annu. Rev. Control."},{"key":"1222_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/tac.2025.3532541","author":"B Zhong","year":"2025","unstructured":"Zhong, B., Liu, S., Caccamo, M., Zamani, M.: Secure-by-construction synthesis for control systems. IEEE Trans. Automat. Contr. (2025). https:\/\/doi.org\/10.1109\/tac.2025.3532541","journal-title":"IEEE Trans. Automat. Contr."},{"key":"1222_CR18","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.ifacol.2023.10.1575","volume":"56","author":"B Zhong","year":"2023","unstructured":"Zhong, B., Liu, S., Caccamo, M., Zamani, M.: Secure-by-construction controller synthesis via control barrier functions. IFAC-PapersOnLine. 56, 239\u2013245 (2023)","journal-title":"IFAC-PapersOnLine."},{"key":"1222_CR19","doi-asserted-by":"publisher","first-page":"2302","DOI":"10.1016\/j.matpr.2021.06.320","volume":"80","author":"AA Jamal","year":"2023","unstructured":"Jamal, A.A., Majid, A.-A.M., Konev, A., Kosachenko, T., Shelupanov, A.: A review on security analysis of cyber physical systems using machine learning. Mater. Today Proc. 80, 2302\u20132306 (2023)","journal-title":"Mater. Today Proc."},{"key":"1222_CR20","doi-asserted-by":"crossref","unstructured":"Khoury, J., Nassar, M.: A hybrid game theory and reinforcement learning approach for cyber-physical systems security. In: NOMS 2020\u20132020 IEEE\/IFIP Network Operations and Management Symposium. pp. 1\u20139 (2020)","DOI":"10.1109\/NOMS47738.2020.9110453"},{"key":"1222_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, S., Liu, S., Sun, J., Chen, Y., Huang, W., Liu, J., Liu, J., Hao, J.: FIGCPS: effective failure-inducing input generation for cyber-physical systems with deep reinforcement learning. In: 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE). pp. 555\u2013567 (2021)","DOI":"10.1109\/ASE51524.2021.9678832"},{"key":"1222_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108862","volume":"135","author":"J Liang","year":"2024","unstructured":"Liang, J., Sadiq, M., Yang, G., Jiang, K., Cai, T., Ma, M.: Enhanced collaborative intrusion detection for industrial cyber-physical systems using permissioned blockchain and decentralized federated learning networks. Eng. Appl. Artif. Intell. 135, 108862 (2024)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"1222_CR23","doi-asserted-by":"crossref","unstructured":"Gaba, S., Budhiraja, I., Kumar, V.: Improving security and privacy in advanced federated learning environments for cyber-physical systems. In: 2024 IEEE International Conference on Communications Workshops (ICC Workshops). pp. 1822\u20131827 (2024)","DOI":"10.1109\/ICCWorkshops59551.2024.10615839"},{"key":"1222_CR24","first-page":"1509","volume":"17","author":"RK Pandey","year":"2025","unstructured":"Pandey, R.K., Das, T.K.: Anomaly detection in cyber-physical systems using actuator state transition model. Int. J. Inf. Technol. 17, 1509\u20131521 (2025)","journal-title":"Int. J. Inf. Technol."},{"key":"1222_CR25","doi-asserted-by":"crossref","unstructured":"Alabadi, M., Albayrak, Z.: Q-learning for securing cyber-physical systems: a survey. In: 2020 International Congress on Human\u2013Computer Interaction, Optimization and Robotic Applications (HORA). pp. 1\u201313 (2020)","DOI":"10.1109\/HORA49412.2020.9152841"},{"key":"1222_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1049\/iet-cps.2018.5006","volume":"5","author":"LC Cordeiro","year":"2020","unstructured":"Cordeiro, L.C., de Lima Filho, E.B., Bessa, I.V.: Survey on automated symbolic verification and its application for synthesising cyber-physical systems. IET Cyber-Phys. Syst. Theory Appl. 5, 1\u201324 (2020)","journal-title":"IET Cyber-Phys. Syst. Theory Appl."},{"key":"1222_CR27","doi-asserted-by":"publisher","first-page":"7425","DOI":"10.1002\/rnc.5694","volume":"31","author":"S Nateghi","year":"2021","unstructured":"Nateghi, S., Shtessel, Y., Edwards, C.: Resilient control of cyber-physical systems under sensor and actuator attacks driven by adaptive sliding mode observer. Int. J. Robust Nonlinear Control 31, 7425\u20137443 (2021)","journal-title":"Int. J. Robust Nonlinear Control"},{"key":"1222_CR28","doi-asserted-by":"publisher","first-page":"7089","DOI":"10.1007\/s00521-024-10546-y","volume":"37","author":"J Lindsay","year":"2025","unstructured":"Lindsay, J., Givigi, S.: Optimizing a continuous action learning automata (CALA) optimizer for training artificial neural networks. Neural Comput. Appl. 37, 7089\u20137105 (2025)","journal-title":"Neural Comput. Appl."},{"key":"1222_CR29","doi-asserted-by":"crossref","unstructured":"Now\u00e9, A., Verbeeck, K., Peeters, M.: Learning automata as a basis for multi agent reinforcement learning. In: International Workshop on Learning and Adaption in Multi-Agent Systems. pp. 71\u201385 (2005)","DOI":"10.1007\/11691839_3"},{"key":"1222_CR30","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1548","volume":"14","author":"Y Yang","year":"2024","unstructured":"Yang, Y., Gao, Y., Ding, Z., Wu, J., Zhang, S., Han, F., Qiu, X., Gao, S., Wang, Y.-G.: Advancements in Q-learning meta-heuristic optimization algorithms: a survey. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 14, e1548 (2024)","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"issue":"12","key":"1222_CR31","doi-asserted-by":"publisher","first-page":"555","DOI":"10.3390\/fi17120555","volume":"17","author":"LA Atadet","year":"2025","unstructured":"Atadet, L.A., Musabe, R., Hitimana, E., Gatera, O.: Optimizing LoRaWAN performance through learning automata-based channel selection. Future Internet.\n17(12), 555 (2025). https:\/\/doi.org\/10.3390\/fi17120555","journal-title":"Future Internet"},{"key":"1222_CR32","doi-asserted-by":"crossref","unstructured":"Jin, Z., Zhang, S., Hu, Y., Zhang, Y., Sun, C.: Security state estimation for cyber-physical systems against DoS attacks via reinforcement learning and game theory. In: Actuators. p. 192. MDPI (2022)","DOI":"10.3390\/act11070192"},{"key":"1222_CR33","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/S0020-0255(03)00179-8","volume":"157","author":"MS Obaidat","year":"2003","unstructured":"Obaidat, M.S., Papadimitriou, G.I., Pomportsis, A.S.: Efficient fast learning automata. Inf. Sci. (NY). 157, 121\u2013133 (2003)","journal-title":"Inf. Sci. (NY)."},{"key":"1222_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103201","volume":"77","author":"J-PA Yaacoub","year":"2020","unstructured":"Yaacoub, J.-P.A., Salman, O., Noura, H.N., Kaaniche, N., Chehab, A., Malli, M.: Cyber-physical systems security: limitations, issues and future trends. Microprocess. Microsyst. 77, 103201 (2020)","journal-title":"Microprocess. Microsyst."},{"key":"1222_CR35","unstructured":"Fu, J., Kumar, A., Soh, M., Levine, S.: Diagnosing bottlenecks in deep q-learning algorithms. In: International Conference on Machine Learning. pp. 2021\u20132030 (2019)"},{"key":"1222_CR36","doi-asserted-by":"crossref","unstructured":"Misra, S., Krishna, P.V., Agarwal, H., Saxena, A., Obaidat, M.S.: A learning automata based solution for preventing distributed denial of service in internet of things. In: 2011 international conference on internet of things and 4th international conference on cyber, physical and social computing. pp. 114\u2013122 (2011)","DOI":"10.1109\/iThings\/CPSCom.2011.84"},{"key":"1222_CR37","doi-asserted-by":"publisher","DOI":"10.1109\/tgcn.2025.3528189","author":"W Xing","year":"2025","unstructured":"Xing, W., Zhang, J., Zong, G., Wang, Y., Zhao, X.: Transmission schedule for remote state estimation in CPSs with energy harvesting and sharing two-hop networks. IEEE Trans. Green Commun. Netw. (2025). https:\/\/doi.org\/10.1109\/tgcn.2025.3528189","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"1222_CR38","unstructured":"Ding, D., Han, Q., Ge, X., Wang, J.: Secure state estimation and control of cyber-physical systems: a survey. IEEE"},{"key":"1222_CR39","unstructured":"Kadiyala, A.: Securing intelligent intersections: the effects of physical sensor attacks on traffic efficiency and tracking accuracy. Master\u2019s thesis, University of California, Irvine (2025). https:\/\/escholarship.org\/uc\/item\/50m2f8c7"},{"key":"1222_CR40","doi-asserted-by":"publisher","DOI":"10.3390\/s24123815","volume":"24","author":"W Xing","year":"2024","unstructured":"Xing, W., Shen, J.: Security control of cyber\u2013physical systems under cyber attacks: a survey. Sensors 24, 3815 (2024)","journal-title":"Sensors"},{"key":"1222_CR41","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.aej.2025.02.042","volume":"121","author":"TNI Alrumaih","year":"2025","unstructured":"Alrumaih, T.N.I., Alenazi, M.J.F.: ERINDA: a novel framework for enhancing the resilience of industrial networks against DDoS attacks with adaptive recovery. Alexandria Eng. J. 121, 248\u2013262 (2025)","journal-title":"Alexandria Eng. J."},{"key":"1222_CR42","doi-asserted-by":"publisher","first-page":"21670","DOI":"10.1109\/JIOT.2023.3289625","volume":"10","author":"Z Yu","year":"2023","unstructured":"Yu, Z., Gao, H., Cong, X., Wu, N., Song, H.H.: A survey on cyber\u2013physical systems security. IEEE Internet Things J. 10, 21670\u201321686 (2023)","journal-title":"IEEE Internet Things J."},{"key":"1222_CR43","doi-asserted-by":"publisher","first-page":"76648","DOI":"10.1109\/ACCESS.2022.3191430","volume":"10","author":"VDM Rios","year":"2022","unstructured":"Rios, V.D.M., In\u00e1cio, P.R.M., Magoni, D., Freire, M.M.: Detection and mitigation of low-rate denial-of-service attacks: a survey. IEEE Access 10, 76648\u201376668 (2022)","journal-title":"IEEE Access"},{"key":"1222_CR44","doi-asserted-by":"publisher","first-page":"5384","DOI":"10.1002\/rnc.7274","volume":"34","author":"C Zhang","year":"2024","unstructured":"Zhang, C., Zhao, X., Tian, E., Zou, Y.: Stochastic important\u2010data\u2010based attack model and defense strategies for cyber\u2010physical system: a data\u2010driven method. Int. J. Robust Nonlinear Control 34, 5384\u20135398 (2024)","journal-title":"Int. J. Robust Nonlinear Control"},{"key":"1222_CR45","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1109\/JAS.2024.124257","volume":"11","author":"J Zhou","year":"2024","unstructured":"Zhou, J., Shang, J., Chen, T.: Cybersecurity landscape on remote state estimation: a comprehensive review. IEEE\/CAA J. Autom. Sin. 11, 851\u2013865 (2024)","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"1222_CR46","doi-asserted-by":"publisher","DOI":"10.1002\/dac.70145","volume":"38","author":"PV Krishna","year":"2025","unstructured":"Krishna, P.V., Saritha, V., Pounambal, M., Penchala, R.: Energy-aware learning automata-based backoff algorithm in cyber-physical systems. Int. J. Commun. Syst. 38, e70145 (2025)","journal-title":"Int. J. Commun. Syst."},{"key":"1222_CR47","doi-asserted-by":"publisher","first-page":"3540","DOI":"10.1109\/TSMC.2022.3228798","volume":"53","author":"X Wang","year":"2022","unstructured":"Wang, X., Zhou, Y., Yang, L.: Event-triggered cooperative adaptive neural control for cyber--physical systems with unknown state time delays and deception attacks. IEEE Trans. Syst. Man, Cybern. Syst. 53, 3540\u20133552 (2022)","journal-title":"IEEE Trans. Syst. Man, Cybern. Syst."},{"key":"1222_CR48","doi-asserted-by":"publisher","first-page":"2963","DOI":"10.1002\/acs.3668","volume":"37","author":"A Nemati","year":"2023","unstructured":"Nemati, A., Peimani, M., Mobayen, S., Sayyedfattahi, S.: Adaptive non\u2010singular second\u2010order terminal sliding mode control for cyber\u2010physical systems subject to actuator cyber\u2010attacks and unwanted disturbances. Int. J. Adapt. Control Signal Process. 37, 2963\u20132982 (2023)","journal-title":"Int. J. Adapt. Control Signal Process."},{"key":"1222_CR49","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/JAS.2022.105548","volume":"9","author":"W Duo","year":"2022","unstructured":"Duo, W., Zhou, M., Abusorrah, A.: A survey of cyber attacks on cyber physical systems: recent advances and challenges. IEEE\/CAA J. Autom. Sin. 9, 784\u2013800 (2022)","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"1222_CR50","doi-asserted-by":"crossref","unstructured":"Luo, B., Ramakrishna, S., Pettet, A., Kuhn, C., Karsai, G., Mukhopadhyay, A.: Dynamic simplex: Balancing safety and performance in autonomous cyber physical systems. In: Proceedings of the ACM\/IEEE 14th International Conference on Cyber-Physical Systems (with CPS-IoT Week 2023). pp. 177\u2013186 (2023)","DOI":"10.1145\/3576841.3585934"},{"key":"1222_CR51","doi-asserted-by":"publisher","unstructured":"Pellegrino, G.: Learning automata for network behaviour analysis. PhD dissertation, Delft University of Technology (2023). https:\/\/doi.org\/10.4233\/uuid:6ea4a13b-ff8e-4c4b-866d-168cdccd880a","DOI":"10.4233\/uuid:6ea4a13b-ff8e-4c4b-866d-168cdccd880a"},{"key":"1222_CR52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3510533","author":"HJ Hadi","year":"2024","unstructured":"Hadi, H.J., Ahmad, N., Aziz, K., Cao, Y., Alshara, M.A.: Cost-effective resilience: a comprehensive survey and tutorial on assessing open-source cybersecurity tools for multi-tiered defense. IEEE Access (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3510533","journal-title":"IEEE Access"},{"key":"1222_CR53","doi-asserted-by":"publisher","DOI":"10.1049\/rpg2.70078","volume":"19","author":"H Dong","year":"2025","unstructured":"Dong, H., Wei, Z., Peiyi, C., Yiqing, L., Hua, H.: Multi\u2010layered optimization for adaptive decoy placement in cyber\u2010resilient power systems under uncertain attack scenarios. IET Renew. Power Gener. 19, e70078 (2025)","journal-title":"IET Renew. Power Gener."},{"key":"1222_CR54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3461756","author":"Y Zeng","year":"2024","unstructured":"Zeng, Y., Liao, B., Li, Z., Hua, C., Li, S.: A comprehensive review of recent advances on intelligence algorithms and information engineering applications. IEEE Access (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3461756","journal-title":"IEEE Access"},{"key":"1222_CR55","doi-asserted-by":"crossref","unstructured":"Ayoughi, N., Nejati, S., Sabetzadeh, M., Saavedra, P.: Enhancing automata learning with statistical machine learning: a network security case study. In: Proceedings of the ACM\/IEEE 27th International Conference on Model Driven Engineering Languages and Systems. pp. 172\u2013182 (2024)","DOI":"10.1145\/3640310.3674087"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-026-01222-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-026-01222-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-026-01222-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T03:03:23Z","timestamp":1771470203000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-026-01222-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,18]]},"references-count":55,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["1222"],"URL":"https:\/\/doi.org\/10.1007\/s10207-026-01222-4","relation":{},"ISSN":["1615-5270"],"issn-type":[{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,18]]},"assertion":[{"value":"29 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"56"}}