{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T22:05:25Z","timestamp":1772575525921,"version":"3.50.1"},"reference-count":194,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61876075"],"award-info":[{"award-number":["61876075"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Program for Guangdong Introducing Innovative and Enterpreneurial Teams","award":["2017ZT07X386"],"award-info":[{"award-number":["2017ZT07X386"]}]},{"DOI":"10.13039\/501100012234","name":"Shenzhen Peacock Plan","doi-asserted-by":"crossref","award":["KQTD2016112514355531"],"award-info":[{"award-number":["KQTD2016112514355531"]}],"id":[{"id":"10.13039\/501100012234","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100010877","name":"Shenzhen Science and Technology Innovation Commission","doi-asserted-by":"publisher","award":["ZDSYS201703031748284"],"award-info":[{"award-number":["ZDSYS201703031748284"]}],"id":[{"id":"10.13039\/501100010877","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Program for University Key Laboratory of Guangdong Province","award":["2017KSYS008"],"award-info":[{"award-number":["2017KSYS008"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2920317","type":"journal-article","created":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T20:00:07Z","timestamp":1559332807000},"page":"72030-72049","source":"Crossref","is-referenced-by-count":21,"title":["Soft Computing Techniques for Dependable Cyber-Physical Systems"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9924-3165","authenticated-orcid":false,"given":"Muhammad","family":"Atif","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5662-4777","authenticated-orcid":false,"given":"Siddique","family":"Latif","sequence":"additional","affiliation":[]},{"given":"Rizwan","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Adnan K.","family":"Kiani","sequence":"additional","affiliation":[]},{"given":"Junaid","family":"Qadir","sequence":"additional","affiliation":[]},{"given":"Adeel","family":"Baig","sequence":"additional","affiliation":[]},{"given":"Hisao","family":"Ishibuchi","sequence":"additional","affiliation":[]},{"given":"Waseem","family":"Abbas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.1998.673280"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2004.08.013"},{"key":"ref171","first-page":"19","article-title":"Rough Petri net and its application in multi-state system reliability estimate","volume":"11","author":"yuan","year":"2007","journal-title":"Acta Armamentarii"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1002\/qre.1500"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/ISUMA.2003.1236158"},{"key":"ref176","volume":"1","author":"langseth","year":"2008","journal-title":"Bayesian Networks in Reliability The Good the Bad and the Ugly"},{"key":"ref175","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1145\/2593882.2593900","article-title":"Probabilistic programming","author":"gordon","year":"2014","journal-title":"Proc Future Softw Eng"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2007.03.013"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2005.1408404"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1049\/ip-gtd:20040917"},{"key":"ref169","first-page":"66","article-title":"Substation fault diagnosis method based on rough set theory and neural network model","volume":"16","author":"su","year":"2005","journal-title":"Power Syst Technol"},{"key":"ref39","author":"glaser","year":"2017","journal-title":"U S Hospitals Have Been Hit by the Global Ransomware Attack"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2460747"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1504\/IJISE.2014.060130"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/847416"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.075"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.12.001"},{"key":"ref37","article-title":"A secured health care application architecture for cyber-physical systems","author":"wang","year":"2011","journal-title":"arXiv 1201 0213"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/JPROC.2011.2165270","article-title":"Challenges and research directions in medical cyber&#x2013;physical systems","volume":"100","author":"lee","year":"2012","journal-title":"Proc IEEE"},{"key":"ref35","first-page":"7","article-title":"Green lights forever: Analyzing the security of traffic infrastructure","volume":"14","author":"ghena","year":"2014","journal-title":"Proc WOOT"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6871677"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijsolstr.2008.01.005"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/TPEC.2019.8662138"},{"key":"ref185","article-title":"Research challenges for the security of control systems","author":"c\u00e1rdenas","year":"2008","journal-title":"Proc HotSec"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.11.003"},{"key":"ref183","first-page":"1","article-title":"Specification, analyzing challenges and approaches for cyber-physical systems (CPS)","volume":"18","author":"wan","year":"2010","journal-title":"Eng Lett"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2285032"},{"key":"ref189","doi-asserted-by":"crossref","first-page":"1657","DOI":"10.1016\/S0005-1098(97)00082-4","article-title":"Criteria for robust stability and stabilization of uncertain linear systems with state delay","volume":"33","author":"li","year":"1997","journal-title":"Automatica"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/87.998034"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2017.09.047"},{"key":"ref186","article-title":"Reliability modeling and evaluation of cyber-physical system (CPS) considering communication failures","author":"yang","year":"2018","journal-title":"J Franklin Inst"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1366283.1366295"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2004.06.004"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"150","DOI":"10.3182\/20130522-3-BR-4036.00107","article-title":"Predictive manufacturing system&#x2014;Trends of next-generation production systems","volume":"46","author":"lee","year":"2013","journal-title":"IFAC Proc Volumes"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2322503"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2011.11.001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"ref26","author":"lee","year":"2017","journal-title":"Analysis of the Cyber Attack on the Ukrainian Power Grid"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2240891"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2424155"},{"key":"ref51","first-page":"334","article-title":"Unreliable yet useful-reliability annotations for data in cyber-physical systems","author":"engel","year":"2011","journal-title":"GI-Jahrestagung"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2009.5372973"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2005.05.005"},{"key":"ref156","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/TNET.2008.925944","article-title":"Scalability of network-failure resilience: Analysis using multi-layer probabilistic graphical models","volume":"17","author":"liu","year":"2009","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1115\/1.4000251"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2002.803823"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2005.03.006"},{"key":"ref151","article-title":"Fault section estimation in power systems using genetic algorithm and simulated annealing","volume":"3","author":"fushuan","year":"1994","journal-title":"J Chinese Soc Elect Eng"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/S0026-2714(98)00028-6"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.1999.782657"},{"key":"ref148","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1126\/science.220.4598.671","article-title":"Optimization by simulated annealing","volume":"220","author":"kirkpatrick","year":"1983","journal-title":"Science"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/24.589951"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.04.005"},{"key":"ref58","volume":"157","author":"aliev","year":"2012","journal-title":"Soft Computing and its Applications in Business and Economics"},{"key":"ref57","author":"maddalena","year":"2012","journal-title":"Handbook on Soft Computing for Video Surveillance"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(00)00077-6"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2010.06.002"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363992"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39512-3"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.jnca.2016.11.008","article-title":"Reliability modeling and analysis of communication networks","volume":"78","author":"ahmad","year":"2017","journal-title":"J Netw Comput Appl"},{"key":"ref40","first-page":"7","author":"avizienis","year":"2001","journal-title":"Fundamental Concepts of Dependability"},{"key":"ref167","first-page":"1","article-title":"Identification of malicious activities in industrial Internet of Things based on deep learning models","volume":"41","author":"muna","year":"2018","journal-title":"J Inf Secur Appl"},{"key":"ref166","article-title":"Attack detection and approximation in nonlinear networked control systems using neural networks","author":"niu","year":"0","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.04.101"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.34"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8280915"},{"key":"ref162","first-page":"89","article-title":"Long short term memory networks for anomaly detection in time series","author":"malhotra","year":"2015","journal-title":"Proceedings Presses universitaires de Louvain"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2703842"},{"key":"ref160","first-page":"432","article-title":"Reliability optimization design using hybrid NN-GA with fuzzy logic controller","volume":"85","author":"lee","year":"2002","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"ref4","year":"2008","journal-title":"Berkeley CPS"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"4837","DOI":"10.3390\/s150304837","article-title":"The past, present and future of cyber-physical systems: A focus on models","volume":"15","author":"lee","year":"2015","journal-title":"SENSORS"},{"key":"ref6","first-page":"21","article-title":"An application map for industrial cyber-physical systems","author":"oks","year":"2017","journal-title":"The Industrial Internet of Things"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"ref8","first-page":"4242","article-title":"A survey on concepts, applications, and challenges in cyber-physical systems","volume":"8","author":"gunes","year":"2014","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/1838687.1838709"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/fi5020205"},{"key":"ref49","first-page":"18","article-title":"Transportation cyber-physical systems: Reliability modeling and analysis framework","author":"liu","year":"2008","journal-title":"Proc Nat Workshop Res High-Confidence Transp Cyber-Phys Syst Automot Aviation Rail"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2013.2259433"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2018.05.007"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2018.08.014"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2008.85"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2406860"},{"key":"ref47","volume":"396","author":"rausand","year":"2004","journal-title":"System reliability theory Models statistical methods and applications"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090208"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364710"},{"key":"ref43","first-page":"42","article-title":"Dependable computing: Concepts, limits, challenges","author":"laprie","year":"1995","journal-title":"Proc Int Symp Fault Tolerant Computing"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4102-8_1"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008324530006"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/NABIC.2009.5393690"},{"key":"ref70","author":"goldberg","year":"2006","journal-title":"Genetic Algorithms"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1023\/B:APIN.0000043556.29968.81"},{"key":"ref77","doi-asserted-by":"crossref","DOI":"10.1090\/conm\/001","author":"kindermann","year":"1980","journal-title":"Markov Random Fields and Their Applications"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/959242.959247"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.07.038"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-5833-1"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2008.52"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s005000050002"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.04.041"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2003.08.008"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-012-4448-x"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/91.855914"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s005000050030"},{"key":"ref66","author":"negnevitsky","year":"2005","journal-title":"Artificial Intelligence A Guide to Intelligent Systems"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(78)90029-5"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/0026-2714(89)90627-6"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(91)90143-E"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2043038"},{"key":"ref194","article-title":"Cyber physical systems (CPSS)&#x2014;Opportunities and challenges for improving cyber security","volume":"137","author":"tyagi","year":"2016","journal-title":"Int J Comput Appl"},{"key":"ref95","volume":"1","author":"kaufmann","year":"1975","journal-title":"Introduction to the Theory of Fuzzy Subsets"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(90)90026-3"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2219540"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(95)00385-1"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2008.03.008"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-1403-5_3"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1016\/S0967-0661(97)00051-8"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.4.10.1152-1159"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/BF01001956"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2006.1688371"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45214-0_16"},{"key":"ref96","first-page":"259","article-title":"Intuitionistic fuzzy multi-objective mathematical programming on reliability optimization model","volume":"12","author":"mahapatra","year":"2010","journal-title":"Int J Fuzzy Syst"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2005.11.009"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2005.04.105"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(01)00017-5"},{"key":"ref84","first-page":"239","article-title":"A fuzzy model for early software fault prediction using process maturity and software metrics","volume":"1","author":"pandey","year":"2009","journal-title":"Int J Elect Eng"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2002.801356"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.05.002"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.5772\/6440"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2014.04.002"},{"key":"ref86","volume":"9","author":"pawlak","year":"2012","journal-title":"Rough Sets Theoretical Aspects of Reasoning about Data"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(98)10023-3"},{"key":"ref88","volume":"2","author":"d\u00fcntsch","year":"2000","journal-title":"Rough Set Data Analysis A Road to Non-Invasive Knowledge Discovery"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2005.01.004"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/24.510811"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2008.2011854"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569635"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1045-z"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2005.301242"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00027-9"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2006.130"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2009.01.005"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TDCLA.2006.311428"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2006.04.007"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(00)00088-5"},{"key":"ref136","first-page":"1","article-title":"On SCADA control system command and response injection and intrusion detection","author":"gao","year":"2010","journal-title":"IEEE ECrime Researchers Summit (Ecrime)"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2010.5580713"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.3390\/s91109380"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2009.5178592"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.36"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.3390\/s18041096"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(97)00031-8"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.13182\/NT00-A3149"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1002\/int.10051"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510349"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(03)00085-1"},{"key":"ref1","first-page":"28","article-title":"Cyber-physical systems-concept, challenges and research areas","volume":"14","author":"sanislav","year":"2012","journal-title":"Journal of Control Engineering and Applied Informatics"},{"key":"ref145","first-page":"467","article-title":"Use of a genetic algorithm to optimize a combinatorial reliability design problem","author":"coit","year":"1994","journal-title":"Proc 3rd IIE Research Conf"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2005.1408345"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ESTS.2009.4906519"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHM.2013.6621411"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2009.5069339"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2003.808744"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2004.03.028"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2004.08.023"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2014.07.036"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2004.832816"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2005.12.001"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2008606"},{"key":"ref10","author":"ashby","year":"1961","journal-title":"An Introduction to Cybernetics"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2731741"},{"key":"ref12","volume":"103","author":"chaturvedi","year":"2008","journal-title":"Soft Computing Techniques and Its Applications in Electrical Engineering"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18510\/ijsrtm.2017.542"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/52.329401"},{"key":"ref15","author":"yu","year":"2010","journal-title":"Introduction to Evolutionary Computing"},{"key":"ref16","first-page":"161","article-title":"Cyber-physical systems","volume":"12","author":"baheti","year":"2011","journal-title":"The Impact of Control Technology"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.11.059"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2011.6096958"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2012.07.011"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-4585-36-1_13"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2005.02.025"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1080\/07408170304422"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2007.10.028"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/24.664006"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2005.860946"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2006.06.006"},{"key":"ref121","article-title":"Online cyber-attack detection in smart grid: A reinforcement learning approach","author":"kurt","year":"0","journal-title":"IEEE Trans Smart Grid"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.02.028"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2885530"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08727458.pdf?arnumber=8727458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T18:26:13Z","timestamp":1643307973000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8727458\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":194,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2920317","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}