{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T19:54:10Z","timestamp":1769198050879,"version":"3.49.0"},"reference-count":154,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T00:00:00Z","timestamp":1765843200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1016\/j.engappai.2025.113542","type":"journal-article","created":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T04:14:17Z","timestamp":1766204057000},"page":"113542","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"PA","title":["Machine learning for resilience analysis: a review of systems under cyberattacks"],"prefix":"10.1016","volume":"166","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5723-0886","authenticated-orcid":false,"given":"Ruoqing","family":"Yin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6955-478X","authenticated-orcid":false,"given":"Liz","family":"Varga","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.engappai.2025.113542_bib1","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1109\/TSG.2023.3304537","article-title":"Online recursive detection and adaptive fuzzy mitigation of cyber-physical attacks targeting topology of IMG: an LFC case study","volume":"15","author":"Abazari","year":"2024","journal-title":"IEEE Trans. Smart Grid"},{"issue":"9","key":"10.1016\/j.engappai.2025.113542_bib2","doi-asserted-by":"crossref","first-page":"16398","DOI":"10.1109\/JIOT.2024.3354045","article-title":"The role of deep learning in advancing proactive cybersecurity measures for smart grid networks: a survey","volume":"11","author":"Abdi","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"10.1016\/j.engappai.2025.113542_bib3","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TII.2022.3151748","article-title":"A new false data injection attack detection model for cyberattack resilient energy forecasting","volume":"19","author":"Ahmadi","year":"2023","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"15","key":"10.1016\/j.engappai.2025.113542_bib4","doi-asserted-by":"crossref","first-page":"13279","DOI":"10.1109\/JIOT.2022.3144127","article-title":"Super learner ensemble for anomaly detection and cyber-risk quantification in industrial control systems","volume":"9","author":"Ahmadi-Assalemi","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.engappai.2025.113542_bib5","series-title":"Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks","first-page":"25","article-title":"WADI: a water distribution testbed for research in the design of secure cyber physical systems","author":"Ahmed","year":"2017"},{"key":"10.1016\/j.engappai.2025.113542_bib6","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2023.106128","article-title":"Resilient backstepping control for a class of switched nonlinear time-delay systems under hybrid cyber-attacks","volume":"122","author":"Akbari","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"4","key":"10.1016\/j.engappai.2025.113542_bib7","doi-asserted-by":"crossref","first-page":"2968","DOI":"10.1109\/TNSE.2020.3032415","article-title":"Deep learning-enabled threat intelligence scheme in the internet of things networks","volume":"8","author":"Al-Hawawreh","year":"2021","journal-title":"IEEE Trans. Netw. Sci. Eng"},{"issue":"7","key":"10.1016\/j.engappai.2025.113542_bib8","doi-asserted-by":"crossref","first-page":"5018","DOI":"10.1109\/TII.2021.3133361","article-title":"A self-tuning cyber-attacks\u2019 location identification approach for critical infrastructures","volume":"18","author":"Alabassi","year":"2022","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"16","key":"10.1016\/j.engappai.2025.113542_bib9","doi-asserted-by":"crossref","first-page":"10211","DOI":"10.1007\/s00521-021-05785-2","article-title":"Hybrid DeepGCL model for cyber-attacks detection on cyber-physical systems","volume":"33","author":"Alguliyev","year":"2021","journal-title":"Neural Comput. Appl."},{"issue":"20","key":"10.1016\/j.engappai.2025.113542_bib10","doi-asserted-by":"crossref","first-page":"20034","DOI":"10.1109\/JIOT.2022.3171294","article-title":"Low-altitude-platform-based airborne IoT network (LAP-AIN) for water quality monitoring in harsh tropical environment","volume":"9","author":"Alobaidy","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"20","key":"10.1016\/j.engappai.2025.113542_bib11","doi-asserted-by":"crossref","first-page":"8362","DOI":"10.3390\/s23208362","article-title":"Deep neural decision forest (DNDF): a novel approach for enhancing intrusion detection systems in network traffic analysis","volume":"23","author":"Alrayes","year":"2023","journal-title":"Sensors"},{"key":"10.1016\/j.engappai.2025.113542_bib12","article-title":"Resilient optimal estimation using measurement prior","author":"Anubi","year":"2019","journal-title":"arXiv: arXiv:1907.13102"},{"key":"10.1016\/j.engappai.2025.113542_bib13","doi-asserted-by":"crossref","first-page":"1060","DOI":"10.1016\/j.rser.2015.12.193","article-title":"On the definition of cyber-physical resilience in power systems","volume":"58","author":"Arghandeh","year":"2016","journal-title":"Renew. Sustain. Energy Rev."},{"issue":"1","key":"10.1016\/j.engappai.2025.113542_bib14","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1109\/TII.2022.3165890","article-title":"SIEMS: a secure intelligent energy management system for industrial IoT applications","volume":"19","author":"Asef","year":"2023","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.engappai.2025.113542_bib15","doi-asserted-by":"crossref","DOI":"10.1016\/j.cie.2024.110224","article-title":"A systematic review of optimization methods for recovery planning in cyber\u2013physical infrastructure networks: current state and future trends","volume":"192","author":"Aslani","year":"2024","journal-title":"Comput. Ind. Eng."},{"key":"10.1016\/j.engappai.2025.113542_bib16","doi-asserted-by":"crossref","DOI":"10.1016\/j.cie.2024.110224","article-title":"A systematic review of optimization methods for recovery planning in cyber\u2013physical infrastructure networks: current state and future trends","volume":"192","author":"Aslani","year":"2024","journal-title":"Comput. Ind. Eng."},{"key":"10.1016\/j.engappai.2025.113542_bib17","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.101012","article-title":"Benchmark of machine learning algorithms on transient stability prediction in renewable rich power grids under cyber-attacks","volume":"25","author":"Aygul","year":"2024","journal-title":"Internet Things"},{"key":"10.1016\/j.engappai.2025.113542_bib18","doi-asserted-by":"crossref","DOI":"10.1109\/JIOT.2024.3454257","article-title":"DeeBBAA: a benchmark deep black box adversarial attack against cyber-physical power systems","author":"Bhattacharjee","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.engappai.2025.113542_bib19","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1193\/1.1623497","article-title":"A framework to quantitatively assess and enhance the seismic resilience of communities","volume":"19","author":"Bruneau","year":"2003","journal-title":"Earthq. Spectra"},{"key":"10.1016\/j.engappai.2025.113542_bib20","author":"Calma"},{"issue":"11","key":"10.1016\/j.engappai.2025.113542_bib21","doi-asserted-by":"crossref","first-page":"2359","DOI":"10.1111\/risa.14089","article-title":"Resilience analysis of cyber\u2010physical systems: a review of models and methods","volume":"43","author":"Cassottana","year":"2023","journal-title":"Risk Anal."},{"issue":"7","key":"10.1016\/j.engappai.2025.113542_bib23","doi-asserted-by":"crossref","first-page":"4835","DOI":"10.1007\/s00521-021-06106-3","article-title":"Deep-learning-based data-manipulation attack resilient supervisory backup protection of transmission lines","volume":"35","author":"Chawla","year":"2023","journal-title":"Neural Comput. Appl."},{"issue":"8","key":"10.1016\/j.engappai.2025.113542_bib24","doi-asserted-by":"crossref","first-page":"9204","DOI":"10.1109\/TII.2022.3227726","article-title":"Deep-learning-based denial-of-service resilient framework for wide area situational awareness of power systems","volume":"19","author":"Chawla","year":"2023","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"11","key":"10.1016\/j.engappai.2025.113542_bib25","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MCOM.001.1900094","article-title":"An intelligent robust networking mechanism for the internet of things","volume":"57","author":"Chen","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.engappai.2025.113542_bib26","series-title":"2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","first-page":"962","article-title":"Learning-guided network fuzzing for testing cyber-physical system defences","author":"Chen","year":"2019"},{"issue":"12","key":"10.1016\/j.engappai.2025.113542_bib27","doi-asserted-by":"crossref","first-page":"8092","DOI":"10.1109\/TII.2021.3058413","article-title":"Data-driven resilient automatic generation control against false data injection attacks","volume":"17","author":"Chen","year":"2021","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"2","key":"10.1016\/j.engappai.2025.113542_bib28","doi-asserted-by":"crossref","first-page":"1671","DOI":"10.1109\/TSG.2017.2776279","article-title":"Cyber-physical resilience: definition and assessment metric","volume":"10","author":"Clark","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.engappai.2025.113542_bib29","article-title":"Graph-augmented normalizing flows for anomaly detection of multiple time series","author":"Dai","year":"2022","journal-title":"arXiv: arXiv:2202.07857"},{"key":"10.1016\/j.engappai.2025.113542_bib30","article-title":"Graph neural network-based anomaly detection in multivariate time series","author":"Deng","year":"2021","journal-title":"arXiv: arXiv:2106.06947"},{"issue":"2","key":"10.1016\/j.engappai.2025.113542_bib31","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/TII.2016.2614396","article-title":"False data injection on state estimation in power systems\u2014attacks, impacts, and defense: a Survey","volume":"13","author":"Deng","year":"2017","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.engappai.2025.113542_bib32","doi-asserted-by":"crossref","first-page":"1674","DOI":"10.1016\/j.neucom.2017.10.009","article-title":"A survey on security control and attack detection for industrial cyber-physical systems","volume":"275","author":"Ding","year":"2018","journal-title":"Neurocomputing"},{"issue":"1","key":"10.1016\/j.engappai.2025.113542_bib33","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TSMC.2020.3041121","article-title":"Secure state estimation and control of cyber-physical systems: a survey","volume":"51","author":"Ding","year":"2021","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"5","key":"10.1016\/j.engappai.2025.113542_bib35","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1109\/JAS.2022.105548","article-title":"A survey of cyber attacks on cyber physical systems: recent advances and challenges","volume":"9","author":"Duo","year":"2022","journal-title":"IEEECAA J. Autom. Sin."},{"key":"10.1016\/j.engappai.2025.113542_bib36","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1016\/j.psep.2023.03.012","article-title":"Analysis of safety and security challenges and opportunities related to cyber-physical systems","volume":"173","author":"El-Kady","year":"2023","journal-title":"Process Saf. Environ. Prot."},{"issue":"20","key":"10.1016\/j.engappai.2025.113542_bib37","doi-asserted-by":"crossref","first-page":"33873","DOI":"10.1109\/JIOT.2024.3433600","article-title":"Securing smart grid false data detectors against white-box evasion attacks without sacrificing accuracy","volume":"11","author":"Elgarhy","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.engappai.2025.113542_bib38","series-title":"2020 IEEE 38th International Conference on Computer Design (ICCD)","first-page":"37","article-title":"Special session: physics- informed neural networks for securing water distribution systems","author":"Falas","year":"2020"},{"key":"10.1016\/j.engappai.2025.113542_bib39","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.102055","article-title":"Deep autoencoders as anomaly detectors: method and case study in a distributed water treatment plant","volume":"99","author":"Gauthama Raman","year":"2020","journal-title":"Comput. Secur."},{"key":"10.1016\/j.engappai.2025.113542_bib40","series-title":"2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE)","first-page":"140","article-title":"Anomaly detection in cyber physical systems using recurrent neural networks","author":"Goh","year":"2017"},{"issue":"6","key":"10.1016\/j.engappai.2025.113542_bib41","doi-asserted-by":"crossref","first-page":"5335","DOI":"10.1109\/TSG.2021.3106105","article-title":"A privacy-aware reconfigurable authenticated key exchange scheme for secure communication in smart grids","volume":"12","author":"Gope","year":"2021","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.engappai.2025.113542_bib42","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1016\/j.solener.2023.01.014","article-title":"Accurate and fast machine learning algorithm for systems outage prediction","volume":"251","author":"Gu","year":"2023","journal-title":"Sol. Energy"},{"key":"10.1016\/j.engappai.2025.113542_bib43","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2023.106814","article-title":"Fuzzy-aided finite-time frequency controller of renewable-integrated power systems with hydrogen energy storage","volume":"126","author":"Guha","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.engappai.2025.113542_bib44","series-title":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","first-page":"1801","article-title":"Surviving false data injection attacks: an effective recovery scheme for resilient CPS","author":"Guibene","year":"2023"},{"key":"10.1016\/j.engappai.2025.113542_bib46","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2021.107113","article-title":"Reinforcement-learning-based dynamic defense strategy of multistage game against dynamic load altering attack","volume":"131","author":"Guo","year":"2021","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"10.1016\/j.engappai.2025.113542_bib47","series-title":"ROOT CAUSE ANALYSIS OF ANOMALIES IN MULTI- VARIATE TIME SERIES THROUGH GRANGER CAUSAL DISCOVERY","author":"Han","year":"2025"},{"key":"10.1016\/j.engappai.2025.113542_bib48","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2022.103540","article-title":"Review on cyber-physical and cyber-security system in smart grid: standards, protocols, constraints, and recommendations","volume":"209","author":"Hasan","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.engappai.2025.113542_bib49","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2022.103861","article-title":"Detection of false data injection attacks leading to line congestions using neural networks","volume":"82","author":"He","year":"2022","journal-title":"Sustain. Cities Soc."},{"key":"10.1016\/j.engappai.2025.113542_bib50","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.ress.2015.08.006","article-title":"A review of definitions and measures of system resilience","volume":"145","author":"Hosseini","year":"2016","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.engappai.2025.113542_bib51","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.neucom.2019.06.069","article-title":"Reliable control of cyber-physical systems under sensor and actuator attacks: an identifier-critic based integral sliding-mode control approach","volume":"361","author":"Huang","year":"2019","journal-title":"Neurocomputing"},{"issue":"6","key":"10.1016\/j.engappai.2025.113542_bib52","doi-asserted-by":"crossref","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","article-title":"Cyber-physical systems security\u2014A survey","volume":"4","author":"Humayed","year":"2017","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"10.1016\/j.engappai.2025.113542_bib53","first-page":"352","article-title":"Modeling and assessing cyber resilience of smart grid using Bayesian network-based approach: a system of systems problem","volume":"7","author":"Ibne Hossain","year":"2020","journal-title":"J. Comput. Des. Eng."},{"issue":"6","key":"10.1016\/j.engappai.2025.113542_bib54","doi-asserted-by":"crossref","first-page":"7858","DOI":"10.1109\/TIA.2023.3298289","article-title":"Reinforcement learning-based attack graph analysis for wastewater treatment plant","volume":"59","author":"Ibrahim","year":"2023","journal-title":"IEEE Trans. Ind. Appl."},{"key":"10.1016\/j.engappai.2025.113542_bib55","series-title":"2017 IEEE International Conference on Data Mining Workshops (ICDMW), New Orleans, LA: IEEE","first-page":"1058","article-title":"Anomaly detection for a water treatment system using unsupervised machine learning","author":"Inoue","year":"2017"},{"issue":"7","key":"10.1016\/j.engappai.2025.113542_bib56","doi-asserted-by":"crossref","first-page":"5719","DOI":"10.1109\/JIOT.2022.3172936","article-title":"A triggerless backdoor attack and defense mechanism for intelligent task offloading in Multi-UAV systems","volume":"10","author":"Islam","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.engappai.2025.113542_bib57","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2023.109062","article-title":"Design of an intelligent hybrid diagnosis scheme for cyber-physical PV systems at the microgrid level","volume":"150","author":"Jadidi","year":"2023","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"4","key":"10.1016\/j.engappai.2025.113542_bib58","doi-asserted-by":"crossref","first-page":"2113","DOI":"10.1109\/TCYB.2023.3305240","article-title":"Active fault-tolerant and attack-resilient control for a renewable microgrid against power-loss faults and data integrity attacks","volume":"54","author":"Jadidi","year":"2024","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.engappai.2025.113542_bib59","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.future.2021.02.001","article-title":"A hypergraph based Kohonen map for detecting intrusions over cyber\u2013physical systems traffic","volume":"119","author":"Jagtap","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"issue":"4","key":"10.1016\/j.engappai.2025.113542_bib62","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1016\/j.ifacol.2024.07.267","article-title":"Attack isolation in a water treatment plant","volume":"58","author":"Jia","year":"2024","journal-title":"IFAC-PapersOnLine"},{"key":"10.1016\/j.engappai.2025.113542_bib63","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1016\/j.apenergy.2019.02.017","article-title":"State-of-the-art review on power grid resilience to extreme weather events: definitions, frameworks, quantitative assessment methodologies, and enhancement strategies","volume":"239","author":"Jufri","year":"2019","journal-title":"Appl. Energy"},{"key":"10.1016\/j.engappai.2025.113542_bib64","doi-asserted-by":"crossref","DOI":"10.1007\/s10586-024-04529-w","article-title":"A novel approach detection for IIoT attacks via artificial intelligence","author":"Karacay\u0131lmaz","year":"2024","journal-title":"Clust. Comput."},{"issue":"3","key":"10.1016\/j.engappai.2025.113542_bib65","doi-asserted-by":"crossref","first-page":"2390","DOI":"10.1109\/TSG.2022.3218934","article-title":"Detection of microgrid cyberattacks using network and system management","volume":"14","author":"Karanfil","year":"2023","journal-title":"IEEE Trans. Smart Grid"},{"issue":"5","key":"10.1016\/j.engappai.2025.113542_bib66","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1109\/TDSC.2015.2423682","article-title":"Distributed attack graph generation","volume":"13","author":"Kaynar","year":"2016","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"5","key":"10.1016\/j.engappai.2025.113542_bib67","doi-asserted-by":"crossref","DOI":"10.1016\/j.jksuci.2023.03.010","article-title":"A novel hybrid ensemble learning for anomaly detection in industrial sensor networks and SCADA systems for smart city infrastructures","volume":"35","author":"Kayode Saheed","year":"2023","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"5","key":"10.1016\/j.engappai.2025.113542_bib68","doi-asserted-by":"crossref","DOI":"10.1016\/j.jksuci.2023.03.010","article-title":"A novel hybrid ensemble learning for anomaly detection in industrial sensor networks and SCADA systems for smart city infrastructures","volume":"35","author":"Kayode Saheed","year":"2023","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"4","key":"10.1016\/j.engappai.2025.113542_bib69","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1109\/TSG.2016.2544854","article-title":"A bayesian algorithm to enhance the resilience of WAMS applications against cyber attacks","volume":"7","author":"Khalid","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"10.1016\/j.engappai.2025.113542_bib70","doi-asserted-by":"crossref","first-page":"1490","DOI":"10.1109\/TSG.2021.3128034","article-title":"Attack detection in power distribution systems using a cyber-physical real-time reference model","volume":"13","author":"Khan","year":"2022","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.engappai.2025.113542_bib71","series-title":"Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy","first-page":"72","article-title":"Detecting cyber attacks in industrial control systems using convolutional neural networks","author":"Kravchik","year":"2018"},{"issue":"5","key":"10.1016\/j.engappai.2025.113542_bib72","doi-asserted-by":"crossref","first-page":"2802","DOI":"10.1109\/TNSE.2022.3191601","article-title":"Blockchain and deep learning for secure communication in digital twin empowered industrial IoT network","volume":"10","author":"Kumar","year":"2023","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"6","key":"10.1016\/j.engappai.2025.113542_bib73","doi-asserted-by":"crossref","first-page":"6640","DOI":"10.1109\/TSG.2019.2909357","article-title":"Performance and resilience of cyber-physical control systems with reactive attack mitigation","volume":"10","author":"Lakshminarayana","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"10.1016\/j.engappai.2025.113542_bib74","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1109\/TPWRS.2020.3018936","article-title":"The creation and validation of load time series for synthetic electric power systems","volume":"36","author":"Li","year":"2021","journal-title":"IEEE Trans. Power Syst."},{"key":"10.1016\/j.engappai.2025.113542_bib75","first-page":"1","article-title":"Resilient-learning control of cyber\u2013physical systems against mixed-type network attacks","author":"Li","year":"2024","journal-title":"IEEE Trans. Syst. Man Cybern. Syst"},{"key":"10.1016\/j.engappai.2025.113542_bib76","first-page":"1","article-title":"Resilient-learning control of cyber\u2013physical systems against mixed-type network attacks","author":"Li","year":"2024","journal-title":"IEEE Trans. Syst. Man Cybern. Syst"},{"issue":"4","key":"10.1016\/j.engappai.2025.113542_bib77","doi-asserted-by":"crossref","first-page":"1630","DOI":"10.1109\/TSG.2015.2495133","article-title":"A review of false data injection attacks against modern power systems","volume":"8","author":"Liang","year":"2017","journal-title":"IEEE Trans. Smart Grid"},{"issue":"4","key":"10.1016\/j.engappai.2025.113542_bib78","doi-asserted-by":"crossref","DOI":"10.1109\/TSG.2015.2495133","article-title":"A review of false data injection attacks against modern power systems","volume":"8","author":"Liang","year":"2017","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1","key":"10.1016\/j.engappai.2025.113542_bib80","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1952982.1952995","article-title":"False data injection attacks against state estimation in electric power grids","volume":"14","author":"Liu","year":"2011","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"10.1016\/j.engappai.2025.113542_bib81","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/JAS.2017.7510349","article-title":"Review on cyber-physical systems","volume":"4","author":"Liu","year":"2017","journal-title":"IEEECAA J. Autom. Sin."},{"issue":"7","key":"10.1016\/j.engappai.2025.113542_bib82","doi-asserted-by":"crossref","first-page":"11632","DOI":"10.1109\/JIOT.2023.3331736","article-title":"Fractional optimal control for malware propagation in internet of underwater things","volume":"11","author":"Liu","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"10.1016\/j.engappai.2025.113542_bib83","doi-asserted-by":"crossref","first-page":"6145","DOI":"10.1109\/TNNLS.2023.3257225","article-title":"Representation-learning-based CNN for intelligent attack localization and recovery of cyber-physical power systems","volume":"35","author":"Lu","year":"2024","journal-title":"IEEE Transact. Neural Networks Learn. Syst."},{"key":"10.1016\/j.engappai.2025.113542_bib84","article-title":"CF-GNNExplainer: counterfactual explanations for graph neural networks","author":"Lucic","year":"2022","journal-title":"arXiv: arXiv:2102.03322"},{"key":"10.1016\/j.engappai.2025.113542_bib85","unstructured":"S. Lyngaas, \u2018cyberattacks are hitting water systems throughout US, biden officials warn governors | CNN Politics\u2019. Accessed: December. 4, 2024. [Online]. Available: https:\/\/edition.cnn.com\/2024\/03\/19\/politics\/cyberattacks-water-systems-us\/index.html."},{"key":"10.1016\/j.engappai.2025.113542_bib86","series-title":"2022 IEEE 31st International Symposium on Industrial Electronics (ISIE), Anchorage, AK, USA","first-page":"418","article-title":"Intrusion detection in water distribution systems using machine learning techniques: a survey","author":"Mabunda","year":"2022"},{"issue":"3","key":"10.1016\/j.engappai.2025.113542_bib87","doi-asserted-by":"crossref","first-page":"2805","DOI":"10.1109\/JESTPE.2023.3242299","article-title":"A novel standalone implementation of MDNN controller for DC\u2013DC converter resilient to sensor attacks\u2014A design approach","volume":"11","author":"Machina","year":"2023","journal-title":"IEEE J. Emerg. Sel. Top. Power Electron."},{"key":"10.1016\/j.engappai.2025.113542_bib88","series-title":"IECON 2021 \u2013 47th Annual Conference of the IEEE Industrial Electronics Society","first-page":"1","article-title":"A machine learning approach to intrusion detection in water distribution systems \u2013 a review","author":"Mboweni","year":"2021"},{"key":"10.1016\/j.engappai.2025.113542_bib89","series-title":"2024 28th International Electrical Power Distribution Conference (EPDC), Zanjan, Iran, Islamic Republic Of: IEEE","first-page":"1","article-title":"A review and analysis of attack and countermeasure approaches for enhancing smart grid cybersecurity","author":"Meydani","year":"2024"},{"issue":"2","key":"10.1016\/j.engappai.2025.113542_bib90","doi-asserted-by":"crossref","first-page":"1268","DOI":"10.1109\/TSMC.2022.3195121","article-title":"Secure event-triggered distributed kalman filters for state estimation over wireless sensor networks","volume":"53","author":"Mustafa","year":"2023","journal-title":"IEEE Trans. Syst. Man Cybern. Syst"},{"issue":"10","key":"10.1016\/j.engappai.2025.113542_bib91","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3565570","article-title":"Smart grid cyber-physical situational awareness of complex operational technology attacks: a review","volume":"55","author":"Nafees","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.engappai.2025.113542_bib92","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.ress.2016.08.013","article-title":"A quantitative method for assessing resilience of interdependent infrastructures","volume":"157","author":"Nan","year":"2017","journal-title":"Reliab. Eng. Syst. Saf."},{"issue":"3","key":"10.1016\/j.engappai.2025.113542_bib93","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/TDSC.2020.3034331","article-title":"ABATe: automatic behavioral abstraction technique to detect anomalies in smart cyber-physical systems","volume":"19","author":"Narayanan","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.engappai.2025.113542_bib94","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102585","article-title":"CNN based method for the development of cyber-attacks detection algorithms in industrial control systems","volume":"114","author":"Nedeljkovic","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.engappai.2025.113542_bib95","unstructured":"ngoclesydney, \u2018Anomaly-Detection-with-Swat-Dataset\/Anomaly_3_attacks_25_01.ipynb at master \u00b7 Ngoclesydney\/anomaly-detection-With-swat-dataset\u2019, GitHub. Accessed: December. 1, 2025. [Online]. Available: https:\/\/github.com\/ngoclesydney\/Anomaly-Detection-with-Swat-Dataset\/blob\/master\/Anomaly_3_attacks_25_01.ipynb."},{"issue":"8","key":"10.1016\/j.engappai.2025.113542_bib96","doi-asserted-by":"crossref","first-page":"3779","DOI":"10.1109\/TNNLS.2021.3121870","article-title":"Deep reinforcement learning for cyber security","volume":"34","author":"Nguyen","year":"2023","journal-title":"IEEE Transact. Neural Networks Learn. Syst."},{"issue":"5","key":"10.1016\/j.engappai.2025.113542_bib97","doi-asserted-by":"crossref","first-page":"3853","DOI":"10.1007\/s00521-022-07903-0","article-title":"Few-shot learning for modeling cyber physical systems in non-stationary environments","volume":"35","author":"Ntalampiras","year":"2023","journal-title":"Neural Comput. Appl."},{"issue":"1","key":"10.1016\/j.engappai.2025.113542_bib98","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1109\/COMST.2020.3036778","article-title":"Resilient machine learning for networked cyber physical systems: a survey for machine learning security to securing machine learning for CPS","volume":"23","author":"Olowononi","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"10.1016\/j.engappai.2025.113542_bib99","doi-asserted-by":"crossref","first-page":"4394","DOI":"10.1109\/TIA.2020.2977872","article-title":"Detection of cyberattacks in industrial control systems using enhanced principal component analysis and hypergraph-based convolution neural network (EPCA-HG-CNN)","volume":"56","author":"P","year":"2020","journal-title":"IEEE Trans. Ind. Appl."},{"key":"10.1016\/j.engappai.2025.113542_bib100","doi-asserted-by":"crossref","first-page":"73907","DOI":"10.1109\/ACCESS.2020.2988055","article-title":"Artificial neural networks-based intrusion detection system for internet of things fog nodes","volume":"8","author":"Pacheco","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2025.113542_bib101","article-title":"Reinforcement learning-based resilient power maximization and regulation control for large-scale wind turbines under cyber actuator attacks","volume":"36","author":"Palanimuthu","year":"2023","journal-title":"Sustain. Energy Grids Netw."},{"issue":"16","key":"10.1016\/j.engappai.2025.113542_bib102","doi-asserted-by":"crossref","first-page":"3577","DOI":"10.1080\/00207721.2022.2143735","article-title":"Security of networked control systems subject to deception attacks: a survey","volume":"53","author":"Pang","year":"2022","journal-title":"Int. J. Syst. Sci."},{"key":"10.1016\/j.engappai.2025.113542_bib103","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2022.108653","article-title":"Modelling cyber resilience in a water treatment and distribution system","volume":"226","author":"Patriarca","year":"2022","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.engappai.2025.113542_bib104","series-title":"Causality: Models, Reasoning and Inference","author":"Pearl","year":"2009"},{"issue":"5","key":"10.1016\/j.engappai.2025.113542_bib105","doi-asserted-by":"crossref","first-page":"4007","DOI":"10.1109\/TSG.2023.3237011","article-title":"Attack graph model for cyber-physical power systems using hybrid deep learning","volume":"14","author":"Presekal","year":"2023","journal-title":"IEEE Trans. Smart Grid"},{"issue":"9","key":"10.1016\/j.engappai.2025.113542_bib106","doi-asserted-by":"crossref","first-page":"6003","DOI":"10.1109\/TSMC.2021.3131662","article-title":"A hybrid physics-based data-driven framework for anomaly detection in industrial control systems","volume":"52","author":"Raman","year":"2022","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"1","key":"10.1016\/j.engappai.2025.113542_bib107","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1186\/s13673-019-0175-8","article-title":"Attack detection in water distribution systems using machine learning","volume":"9","author":"Ramotsoela","year":"2019","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"issue":"4","key":"10.1016\/j.engappai.2025.113542_bib108","doi-asserted-by":"crossref","first-page":"4245","DOI":"10.1109\/TSG.2024.3372643","article-title":"Improvise, adapt, overcome: dynamic resiliency against unknown attack vectors in microgrid cybersecurity games","volume":"15","author":"Rath","year":"2024","journal-title":"IEEE Trans. Smart Grid"},{"issue":"3","key":"10.1016\/j.engappai.2025.113542_bib109","doi-asserted-by":"crossref","first-page":"4583","DOI":"10.1109\/TIA.2024.3354228","article-title":"A resilient frequency regulation for enhancing power system security against hybrid cyber-attacks","volume":"60","author":"Saxena","year":"2024","journal-title":"IEEE Trans. Ind. Appl."},{"key":"10.1016\/j.engappai.2025.113542_bib110","series-title":"Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy","first-page":"1","article-title":"High-performance unsupervised anomaly detection for cyber-physical system networks","author":"Schneider","year":"2018"},{"issue":"8","key":"10.1016\/j.engappai.2025.113542_bib111","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3652953","article-title":"A survey on cyber-resilience approaches for cyber-physical systems","volume":"56","author":"Segovia-Ferreira","year":"2024","journal-title":"ACM Comput. Surv."},{"issue":"10","key":"10.1016\/j.engappai.2025.113542_bib112","doi-asserted-by":"crossref","first-page":"7298","DOI":"10.1109\/JIOT.2021.3100461","article-title":"An advanced boundary protection control for the smart water network using semisupervised and deep learning approaches","volume":"9","author":"Sharmeen","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"10.1016\/j.engappai.2025.113542_bib113","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1109\/JSAC.2019.2952017","article-title":"Model-based and data-driven detectors for time synchronization attacks against PMUs","volume":"38","author":"Shereen","year":"2020","journal-title":"IEEE J. Sel. Area. Commun."},{"key":"10.1016\/j.engappai.2025.113542_bib114","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2024.105439","article-title":"Smart infrastructure design: machine learning solutions for securing modern cities","volume":"107","author":"Shuhan","year":"2024","journal-title":"Sustain. Cities Soc."},{"key":"10.1016\/j.engappai.2025.113542_bib115","doi-asserted-by":"crossref","DOI":"10.1016\/j.jwpe.2023.103568","article-title":"Deep H2O: cyber attacks detection in water distribution systems using deep learning","volume":"52","author":"Sikder","year":"2023","journal-title":"J. Water Process Eng."},{"key":"10.1016\/j.engappai.2025.113542_bib116","series-title":"Proceedings of the 17th International Conference on Availability, Reliability and Security, Vienna Austria: ACM","first-page":"1","article-title":"Enhanced anomaly detection for cyber-attack detection in smart water distribution systems","author":"Stojanovi\u0107","year":"2022"},{"issue":"2","key":"10.1016\/j.engappai.2025.113542_bib117","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3379499","article-title":"A taxonomy of supervised learning for IDSs in SCADA environments","volume":"53","author":"Suaboot","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.engappai.2025.113542_bib118","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.neucom.2021.07.101","article-title":"Secure data exchange in industrial internet of things","volume":"484","author":"Sukiasyan","year":"2022","journal-title":"Neurocomputing"},{"issue":"13","key":"10.1016\/j.engappai.2025.113542_bib119","doi-asserted-by":"crossref","first-page":"11365","DOI":"10.1109\/JIOT.2021.3128646","article-title":"Data poisoning attacks on federated machine learning","volume":"9","author":"Sun","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.engappai.2025.113542_bib120","doi-asserted-by":"crossref","DOI":"10.1016\/j.apenergy.2023.122283","article-title":"Cyber\u2013physical anomaly detection for inverter-based microgrid using autoencoder neural network","volume":"355","author":"Tabassum","year":"2024","journal-title":"Appl. Energy"},{"key":"10.1016\/j.engappai.2025.113542_bib121","doi-asserted-by":"crossref","DOI":"10.1016\/j.epsr.2023.109925","article-title":"Artificial intelligence-based detection and mitigation of cyber disruptions in microgrid control","volume":"226","author":"Tabassum","year":"2024","journal-title":"Elec. Power Syst. Res."},{"key":"10.1016\/j.engappai.2025.113542_bib122","series-title":"Texas State University System","article-title":"\u2018DeepBLOC: a Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games\u2019","author":"Tahsini","year":"2020"},{"issue":"3","key":"10.1016\/j.engappai.2025.113542_bib123","doi-asserted-by":"crossref","first-page":"2675","DOI":"10.1109\/TSG.2020.3047864","article-title":"Robust electricity theft detection against data poisoning attacks in smart grids","volume":"12","author":"Takiddin","year":"2021","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1","key":"10.1016\/j.engappai.2025.113542_bib124","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1109\/TSG.2021.3114512","article-title":"Resilience assessment and improvement for cyber-physical power systems under typhoon disasters","volume":"13","author":"Ti","year":"2022","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.engappai.2025.113542_bib125","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.matcom.2024.02.022","article-title":"Event-triggered adaptive secure tracking control for nonlinear cyber\u2013physical systems against unknown deception attacks","volume":"221","author":"Tian","year":"2024","journal-title":"Math. Comput. Simulat."},{"key":"10.1016\/j.engappai.2025.113542_bib127","unstructured":"L. Trakimavi\u010dius, \u2018west must secure Baltic wind, Renewable Energy Sources - CEPA\u2019. Accessed: December. 4, 2024. [Online]. Available: https:\/\/cepa.org\/article\/west-must-secure-baltic-sea-renewable-energy-resources\/."},{"key":"10.1016\/j.engappai.2025.113542_bib128","article-title":"Attention is all you need","author":"Vaswani","year":"2023","journal-title":"arXiv: arXiv:1706.03762"},{"issue":"3","key":"10.1016\/j.engappai.2025.113542_bib129","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MIE.2019.2958039","article-title":"Cyber-physical microgrids: toward future resilient communities","volume":"14","author":"Vu","year":"2020","journal-title":"IEEE Ind. Electron. Mag."},{"issue":"4","key":"10.1016\/j.engappai.2025.113542_bib130","doi-asserted-by":"crossref","first-page":"3447","DOI":"10.1109\/TSG.2020.2970755","article-title":"Multi-agent based attack-resilient system integrity protection for smart grid","volume":"11","author":"Wang","year":"2020","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.engappai.2025.113542_bib131","series-title":"Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","first-page":"5051","article-title":"Interdependent causal networks for root cause localization","author":"Wang","year":"2023"},{"key":"10.1016\/j.engappai.2025.113542_bib132","article-title":"Interdependency matters: graph alignment for multivariate time series anomaly detection","author":"Wang","year":"2024","journal-title":"arXiv: arXiv:2410.08877"},{"issue":"3","key":"10.1016\/j.engappai.2025.113542_bib133","doi-asserted-by":"crossref","first-page":"2476","DOI":"10.1109\/TSG.2019.2956161","article-title":"Cyber-attack recovery strategy for smart grid based on deep reinforcement learning","volume":"11","author":"Wei","year":"2020","journal-title":"IEEE Trans. Smart Grid"},{"issue":"5","key":"10.1016\/j.engappai.2025.113542_bib134","doi-asserted-by":"crossref","first-page":"3154","DOI":"10.1109\/TFUZZ.2024.3364754","article-title":"Attack-resilient dynamic-memory event-triggered control for fuzzy switched systems with persistent dwell-time","volume":"32","author":"Wei","year":"2024","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"12","key":"10.1016\/j.engappai.2025.113542_bib135","doi-asserted-by":"crossref","first-page":"2624","DOI":"10.1080\/00207721.2022.2053893","article-title":"Recent advances in event-triggered security control of networked systems: a survey","volume":"53","author":"Wu","year":"2022","journal-title":"Int. J. Syst. Sci."},{"key":"10.1016\/j.engappai.2025.113542_bib136","series-title":"CATCH: CHANNEL-AWARE MULTIVARIATE TIME SERIES ANOMALY DETECTION VIA FREQUENCY PATCHING","author":"Wu","year":"2025"},{"key":"10.1016\/j.engappai.2025.113542_bib137","article-title":"Anomaly transformer: time series anomaly detection with association discrepancy","author":"Xu","year":"2022","journal-title":"arXiv: arXiv:2110.02642"},{"issue":"3","key":"10.1016\/j.engappai.2025.113542_bib138","doi-asserted-by":"crossref","DOI":"10.1109\/TWC.2020.3037767","article-title":"Intelligent reflecting surface assisted anti-jamming communications: a fast reinforcement learning approach","volume":"20","author":"Yang","year":"2021","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.engappai.2025.113542_bib139","series-title":"Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","first-page":"3033","article-title":"DCdetector: dual attention contrastive representation learning for time series anomaly detection","author":"Yang","year":"2023"},{"key":"10.1016\/j.engappai.2025.113542_bib140","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103825","article-title":"ADT: time series anomaly detection for cyber-physical systems via deep reinforcement learning","volume":"141","author":"Yang","year":"2024","journal-title":"Comput. Secur."},{"issue":"1","key":"10.1016\/j.engappai.2025.113542_bib141","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.dcan.2022.09.008","article-title":"An ensemble deep learning model for cyber threat hunting in industrial internet of things","volume":"9","author":"Yazdinejad","year":"2023","journal-title":"Digit. Commun. Netw."},{"key":"10.1016\/j.engappai.2025.113542_bib142","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2021.106847","article-title":"Using modified prediction interval-based machine learning model to mitigate data attack in microgrid","volume":"129","author":"Ye","year":"2021","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"10.1016\/j.engappai.2025.113542_bib143","article-title":"From prediction to action: interpretable multivariate time series analysis under uncertainty in real world flood-affected water networks","author":"Yin","year":"2025","journal-title":"SSRN"},{"key":"10.1016\/j.engappai.2025.113542_bib144","doi-asserted-by":"crossref","first-page":"126481","DOI":"10.1016\/j.jenvman.2025.126481","article-title":"Addressing data sharing challenges for leakage management in water distribution networks \u2013 An MCDM-based assessment of barriers and solutions","volume":"391","author":"Yin","year":"2025","journal-title":"J. Environ. Manage."},{"issue":"3","key":"10.1016\/j.engappai.2025.113542_bib145","doi-asserted-by":"crossref","first-page":"1653","DOI":"10.1109\/TNSM.2020.2987085","article-title":"Attack graph-based moving target defense in software-defined networks","volume":"17","author":"Yoon","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"7","key":"10.1016\/j.engappai.2025.113542_bib146","doi-asserted-by":"crossref","first-page":"3271","DOI":"10.1109\/TII.2018.2825243","article-title":"Online false data injection attack detection with wavelet transform and deep neural networks","volume":"14","author":"Yu","year":"2018","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"3","key":"10.1016\/j.engappai.2025.113542_bib147","doi-asserted-by":"crossref","first-page":"3001","DOI":"10.1109\/TIE.2023.3269465","article-title":"Optimal resilient tracking control for networked systems with multichannels under attacks","volume":"71","author":"Yu","year":"2024","journal-title":"IEEE Trans. Ind. Electron."},{"key":"10.1016\/j.engappai.2025.113542_bib148","first-page":"1","article-title":"Incomplete information-based resilient strategy design for cyber-physical systems under stochastic communication protocol","author":"Yuan","year":"2024","journal-title":"IEEE Trans. Ind. Electron."},{"key":"10.1016\/j.engappai.2025.113542_bib149","doi-asserted-by":"crossref","DOI":"10.1016\/j.apenergy.2022.119688","article-title":"Resilience enhancement of multi-agent reinforcement learning-based demand response against adversarial attacks","volume":"324","author":"Zeng","year":"2022","journal-title":"Appl. Energy"},{"key":"10.1016\/j.engappai.2025.113542_bib150","article-title":"cnulab\/HiAD","author":"Zhang","year":"2025","journal-title":"Python"},{"issue":"2","key":"10.1016\/j.engappai.2025.113542_bib151","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1109\/TSG.2019.2928168","article-title":"Cyber physical security analytics for transactive energy systems","volume":"11","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.engappai.2025.113542_bib152","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.isatra.2021.01.036","article-title":"A survey on attack detection, estimation and control of industrial cyber\u2013physical systems","volume":"116","author":"Zhang","year":"2021","journal-title":"ISA Trans."},{"issue":"5s","key":"10.1016\/j.engappai.2025.113542_bib153","doi-asserted-by":"crossref","first-page":"79:1","DOI":"10.1145\/3477010","article-title":"Real-time attack-recovery for cyber-physical systems using linear-quadratic regulator","volume":"20","author":"Zhang","year":"2021","journal-title":"ACM Trans. Embed. Comput. Syst."},{"issue":"11","key":"10.1016\/j.engappai.2025.113542_bib154","doi-asserted-by":"crossref","first-page":"4829","DOI":"10.1109\/TSE.2023.3309330","article-title":"Constructing cyber-physical system testing suites using active sensor fuzzing","volume":"49","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/j.engappai.2025.113542_bib155","series-title":"CAUSALITY-INSPIRED SPATIAL-TEMPORAL EXPLA- NATIONS FOR DYNAMIC GRAPH NEURAL NETWORKS","author":"Zhao","year":"2024"},{"issue":"4","key":"10.1016\/j.engappai.2025.113542_bib156","doi-asserted-by":"crossref","first-page":"2253","DOI":"10.1109\/TPWRD.2020.3038065","article-title":"Cyber-resilience enhancement and protection for uneconomic power dispatch under cyber-attacks","volume":"36","author":"Zhao","year":"2021","journal-title":"IEEE Trans. Power Deliv."},{"issue":"4","key":"10.1016\/j.engappai.2025.113542_bib157","doi-asserted-by":"crossref","first-page":"3105","DOI":"10.1109\/TPWRS.2020.3043757","article-title":"A cyber-secured operation for water-energy nexus","volume":"36","author":"Zhao","year":"2021","journal-title":"IEEE Trans. Power Syst."},{"key":"10.1016\/j.engappai.2025.113542_bib158","series-title":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"1","article-title":"Attention-driven causal discovery: from transformer matrices to granger causal graphs for non-stationary time-series data","author":"Zhu","year":"2025"},{"key":"10.1016\/j.engappai.2025.113542_bib159","series-title":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","first-page":"899","article-title":"Adversarial attacks on time-series intrusion detection for industrial control systems","author":"Zizzo","year":"2020"},{"key":"10.1016\/j.engappai.2025.113542_bib163","unstructured":"Cyber-Physical Systems\/internet of things testbed, NIST, Accessed: December. 1, 2025. [Online]. Available: https:\/\/www.nist.gov\/programs-projects\/cyber-physical-systemsinternet-things-testbed."},{"key":"10.1016\/j.engappai.2025.113542_bib165","unstructured":"Home \u2022 PowerCyberSec: cybersecurity for the smart grid lab \u2022 Iowa State University\u2019. Accessed: December. 1, 2025. [Online]. Available: https:\/\/www.ece.iastate.edu\/powercybersec\/."}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197625035730?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197625035730?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T12:37:39Z","timestamp":1768999059000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0952197625035730"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":154,"alternative-id":["S0952197625035730"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2025.113542","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2026,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Machine learning for resilience analysis: a review of systems under cyberattacks","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.engappai.2025.113542","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"113542"}}