{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T14:13:58Z","timestamp":1776176038980,"version":"3.50.1"},"reference-count":29,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"funder":[{"DOI":"10.13039\/501100013804","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013804","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["PA2025GDSK0059"],"award-info":[{"award-number":["PA2025GDSK0059"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of the Franklin Institute"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.jfranklin.2026.108487","type":"journal-article","created":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T16:36:01Z","timestamp":1770914161000},"page":"108487","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["Game-theoretic approach for adaptive resilient robust control design of mechanical systems with cyberattack and uncertainty"],"prefix":"10.1016","volume":"363","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0251-9733","authenticated-orcid":false,"given":"Hao","family":"Sun","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9654-5399","authenticated-orcid":false,"given":"Aohua","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8431-6453","authenticated-orcid":false,"given":"Shengchao","family":"Zhen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"03","key":"10.1016\/j.jfranklin.2026.108487_bib0001","article-title":"A review of cyber-physical system research relevant to the emerging IT trends: industry 4.0, IoT, big data, and cloud computing","volume":"2","author":"Kim","year":"2017","journal-title":"J. Ind. Integr. Manage."},{"issue":"18","key":"10.1016\/j.jfranklin.2026.108487_bib0002","doi-asserted-by":"crossref","first-page":"12319","DOI":"10.1007\/s00500-021-05926-8","article-title":"Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques","volume":"25","author":"AlZubi","year":"2021","journal-title":"Soft Comput."},{"key":"10.1016\/j.jfranklin.2026.108487_bib0003","first-page":"2019","article-title":"The rise of the digital twin: how healthcare can benefit","volume":"11","author":"Van Houten","year":"2018","journal-title":"Retrieved June"},{"issue":"1","key":"10.1016\/j.jfranklin.2026.108487_bib0004","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1109\/TII.2022.3199481","article-title":"Advancements in industrial cyber-physical systems: an overview and perspectives","volume":"19","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"5","key":"10.1016\/j.jfranklin.2026.108487_bib0005","doi-asserted-by":"crossref","first-page":"3335","DOI":"10.1109\/TII.2020.3011821","article-title":"Systematic assessment of cyber-physical security of energy management system for connected and automated electric vehicles","volume":"17","author":"Guo","year":"2020","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"3","key":"10.1016\/j.jfranklin.2026.108487_bib0006","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1108\/ECAM-10-2019-0578","article-title":"Cyber physical system for safety management in smart construction site","volume":"28","author":"Jiang","year":"2021","journal-title":"Eng. Constr. Archit. Manag."},{"key":"10.1016\/j.jfranklin.2026.108487_bib0007","article-title":"A specialized review on outlook of future cyber-physical power system (CPPS) testbeds for securing electric power grid","volume":"136","author":"Yohanandhan","year":"2022","journal-title":"Int. J. Elect. Power Energy Syst.ems"},{"issue":"3","key":"10.1016\/j.jfranklin.2026.108487_bib0008","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1080\/09636412.2013.816122","article-title":"Stuxnet and the limits of cyber warfare","volume":"22","author":"Lindsay","year":"2013","journal-title":"Secur. Stud."},{"issue":"2","key":"10.1016\/j.jfranklin.2026.108487_bib0009","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/TSUSC.2018.2879670","article-title":"Impact evaluation of malicious control commands in cyber-physical smart grids","volume":"6","author":"Saxena","year":"2018","journal-title":"IEEE Trans. Sustainable Comput."},{"issue":"4","key":"10.1016\/j.jfranklin.2026.108487_bib0010","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1016\/j.dcan.2020.04.007","article-title":"Attacks and defences on intelligent connected vehicles: a survey","volume":"6","author":"Dibaei","year":"2020","journal-title":"Digital Commun. Netw."},{"key":"10.1016\/j.jfranklin.2026.108487_bib0011","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2023.103351","article-title":"A game-theoretic approach of cyberattack resilient constraint-following control for cyber\u2013physical systems","volume":"153","author":"Zhang","year":"2024","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.jfranklin.2026.108487_bib0012","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1007\/s12555-014-0261-7","article-title":"Resilient control in the presence of DoS attack: switched system approach","volume":"13","author":"Yuan","year":"2015","journal-title":"Int. J. Control Autom. Syst."},{"key":"10.1016\/j.jfranklin.2026.108487_bib0013","series-title":"49th IEEE Conference on Decision and Control (CDC)","first-page":"1096","article-title":"Optimal control in the presence of an intelligent jammer with limited actions","author":"Gupta","year":"2010"},{"key":"10.1016\/j.jfranklin.2026.108487_bib0014","series-title":"Hybrid Systems: Computation and Control: 12th International Conference, HSCC 2009, San Francisco, CA, USA, April 13\u201315, 2009. Proceedings 12","first-page":"31","article-title":"Safe and secure networked control systems under denial-of-service attacks","author":"Amin","year":"2009"},{"key":"10.1016\/j.jfranklin.2026.108487_bib0015","doi-asserted-by":"crossref","first-page":"181032","DOI":"10.1109\/ACCESS.2019.2959083","article-title":"Dynamic output feedback control of cyber-physical systems under DoS attacks","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.jfranklin.2026.108487_bib0016","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.ins.2018.02.066","article-title":"A cooperative detection and compensation mechanism against denial-of-service attack for cyber-physical systems","volume":"444","author":"Su","year":"2018","journal-title":"Inf. Sci."},{"issue":"1","key":"10.1016\/j.jfranklin.2026.108487_bib0017","doi-asserted-by":"crossref","first-page":"1362","DOI":"10.1109\/TTE.2021.3102134","article-title":"Attack-resilient lateral stability control for four-wheel-driven EVs considering changed driver behavior under cyber threats","volume":"8","author":"Guo","year":"2021","journal-title":"IEEE Trans. Transp. Electrif."},{"issue":"8","key":"10.1016\/j.jfranklin.2026.108487_bib0018","first-page":"3560","article-title":"A dynamic controller design for trajectory tracking control of wheeled mobile robot under stochastic denial of service attacks","volume":"69","author":"Geng","year":"2022","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"10.1016\/j.jfranklin.2026.108487_bib0019","series-title":"2024 IEEE International Conference on Sensing, Diagnostics, Prognostics, and Control (SDPC)","first-page":"181","article-title":"Secure formation control of multi-agent system under DoS attacks","author":"Li","year":"2024"},{"issue":"1","key":"10.1016\/j.jfranklin.2026.108487_bib0020","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1109\/COMST.2020.3036778","article-title":"Resilient machine learning for networked cyber physical systems: a survey for machine learning security to securing machine learning for CPS","volume":"23","author":"Olowononi","year":"2020","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"6","key":"10.1016\/j.jfranklin.2026.108487_bib0021","doi-asserted-by":"crossref","first-page":"3330","DOI":"10.1109\/TSC.2024.3478729","article-title":"Deep reinforcement learning-Based multi-layer cascaded resilient recovery for cyber-physical systems","volume":"17","author":"Zhong","year":"2024","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.jfranklin.2026.108487_bib0022","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.aej.2023.09.023","article-title":"Deep learning-based intrusion detection approach for securing industrial internet of things","volume":"81","author":"Soliman","year":"2023","journal-title":"Alexandria Eng. J."},{"issue":"6","key":"10.1016\/j.jfranklin.2026.108487_bib0023","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1007\/s11633-021-1306-z","article-title":"Dynamic event-triggered control and estimation: a survey","volume":"18","author":"Ge","year":"2021","journal-title":"Int. J. Autom. Comput."},{"issue":"12","key":"10.1016\/j.jfranklin.2026.108487_bib0024","doi-asserted-by":"crossref","first-page":"13800","DOI":"10.1109\/TCYB.2021.3125851","article-title":"Dynamic event-triggered output feedback control for networked systems subject to multiple cyber attacks","volume":"52","author":"Zha","year":"2021","journal-title":"IEEE Trans. Cybern."},{"issue":"10","key":"10.1016\/j.jfranklin.2026.108487_bib0025","doi-asserted-by":"crossref","first-page":"4349","DOI":"10.1109\/TCSI.2021.3098335","article-title":"Cyber-physical systems with multiple denial-of-service attackers: a game-theoretic framework","volume":"68","author":"Huang","year":"2021","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"10.1016\/j.jfranklin.2026.108487_bib0026","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1016\/j.automatica.2018.11.034","article-title":"SINR-Based multi-channel power schedule under DoS attacks: a stackelberg game approach with incomplete information","volume":"100","author":"Liu","year":"2019","journal-title":"Automatica"},{"key":"10.1016\/j.jfranklin.2026.108487_bib0027","first-page":"1","article-title":"Game theory based attack graph analysis for cyber war strategy","author":"Mishra","year":"2018","journal-title":"INDIACom"},{"issue":"5","key":"10.1016\/j.jfranklin.2026.108487_bib0028","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1080\/00207178608933559","article-title":"On the deterministic performance of uncertain dynamical systems","volume":"43","author":"Chen","year":"1986","journal-title":"Int. J. Contr."},{"key":"10.1016\/j.jfranklin.2026.108487_bib0029","series-title":"Nonlinear systems","author":"Khalil","year":"2006"}],"container-title":["Journal of the Franklin Institute"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0016003226000876?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0016003226000876?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T13:39:30Z","timestamp":1776173970000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0016003226000876"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["S0016003226000876"],"URL":"https:\/\/doi.org\/10.1016\/j.jfranklin.2026.108487","relation":{},"ISSN":["0016-0032"],"issn-type":[{"value":"0016-0032","type":"print"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Game-theoretic approach for adaptive resilient robust control design of mechanical systems with cyberattack and uncertainty","name":"articletitle","label":"Article Title"},{"value":"Journal of the Franklin Institute","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jfranklin.2026.108487","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Franklin Institute. Published by Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"108487"}}