{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:50:29Z","timestamp":1766159429085,"version":"build-2065373602"},"reference-count":81,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Universidad Central del Valle del Cauca (UCEVA)","award":["PI-1300-50.2-2022-27"],"award-info":[{"award-number":["PI-1300-50.2-2022-27"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Modern industrial automation supported by Cyber\u2013Physical Systems (CPSs) requires high flexibility, which is achieved through increased interconnection between modules. This interconnection introduces a layer of symmetry into the design and operation of CPSs, balancing the distribution of tasks and resources across the system and streamlining the flow of information. However, this adaptability also exposes control systems to security threats, particularly through novel communication links that are vulnerable to cyberattacks. Traditional strategies may have limitations in these applications. This research proposes a design approach for control applications supported by CPSs that incorporates cyberattack detection and tolerance strategies. Using a modular and adaptive approach, the system is partitioned into microservices for scalability and resilience, allowing structural symmetry to be maintained. Schedulability assessments ensure that critical timing constraints are met, improving overall system symmetry and performance. Advanced cyberattack detection and isolation systems generate alarms and facilitate rapid response with replicas of affected components. These replicas enable the system to recover from and tolerate cyberattacks, maintaining uninterrupted operation and preserving the balanced structure of the system. In conclusion, the proposed approach addresses the security challenges in CPS-based control applications and provides an integrated and robust approach to protect industrial automation systems from cyber threats. A case study conducted at a juice production facility in Colima, M\u00e9xico, demonstrated how the architecture can be applied to complex processes such as pH control, from simulation to industrial implementation. The study highlighted a plug-and-play approach, starting with component definitions and relationships, and extending to technology integration, thereby reinforcing symmetry and efficiency within the system.<\/jats:p>","DOI":"10.3390\/sym16060684","type":"journal-article","created":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T10:06:01Z","timestamp":1717409161000},"page":"684","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Design Procedure for Real-Time Cyber\u2013Physical Systems Tolerant to Cyberattacks"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8951-5259","authenticated-orcid":false,"given":"Carlos M.","family":"Paredes","sequence":"first","affiliation":[{"name":"Facultad de Ingenier\u00eda, Universidad de San Buenaventura, Cali 760030, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2618-0834","authenticated-orcid":false,"given":"Diego","family":"Mart\u00ednez Castro","sequence":"additional","affiliation":[{"name":"Facultad de Ingenier\u00eda, Universidad Aut\u00f3noma de Occidente, Cali 760030, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6400-4164","authenticated-orcid":false,"given":"Apolinar","family":"Gonz\u00e1lez Potes","sequence":"additional","affiliation":[{"name":"Facultad de Ingenier\u00eda Mec\u00e1nica y El\u00e9ctrica, Universidad de Colima, Colima 28400, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8664-6416","authenticated-orcid":false,"given":"Andr\u00e9s","family":"Rey Piedrahita","sequence":"additional","affiliation":[{"name":"Facultad de Ingenier\u00eda, Unidad Central del Valle del Cauca, Tulu\u00e1 763022, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1352-4949","authenticated-orcid":false,"given":"Vrani","family":"Ibarra Junquera","sequence":"additional","affiliation":[{"name":"Facultad de Ciencias Qu\u00edmicas, Universidad de Colima, Colima 28400, Mexico"}]}],"member":"1968","published-online":{"date-parts":[[2024,6,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"104056","DOI":"10.1016\/j.compind.2023.104056","article-title":"Integrated process safety and process security risk assessment of industrial cyber-physical systems in chemical plants","volume":"155","author":"Yuan","year":"2024","journal-title":"Comput. Ind."},{"doi-asserted-by":"crossref","unstructured":"Abdelrahman, M., Nguyen, T.L., Kharchouf, I., and Mohammed, O. (2023). A Hybrid Physical Co-Simulation Smart Grid Testbed for Testing and Impact Analysis of Cyber-Attacks on Power Systems: Framework and Attack Scenarios. Energies, 16.","key":"ref_2","DOI":"10.3390\/en16237771"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","article-title":"Cyber-Physical Systems Security\u2014A Survey","volume":"4","author":"Humayed","year":"2017","journal-title":"IEEE Internet Things J."},{"doi-asserted-by":"crossref","unstructured":"Segovia-Ferreira, M., Rubio Hernan, J., Cavalli, A., and Garcia-Alfaro, J. (2023). Cyber-Resilience Approaches for Cyber-Physical Systems. arXiv.","key":"ref_4","DOI":"10.1145\/3652953"},{"doi-asserted-by":"crossref","unstructured":"Shoukry, Y. (2016, January 11\u201314). SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks. Proceedings of the 2016 ACM\/IEEE 7th International Conference on Cyber-Physical Systems, ICCPS 2016\u2014Proceedings, Vienna, Austria.","key":"ref_5","DOI":"10.1109\/ICCPS.2016.7479119"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"103540","DOI":"10.1016\/j.jnca.2022.103540","article-title":"Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations","volume":"209","author":"Hasan","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"Sun, C., Cembrano, G., Puig, V., and Meseguer, J. (2018, January 10). Cyber-Physical Systems for Real-Time Management in the Urban Water Cycle. Proceedings of the 2018 International Workshop on Cyber-Physical Systems for Smart Water Networks (CySWater), Porto, Portugal.","key":"ref_7","DOI":"10.1109\/CySWater.2018.00008"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2518","DOI":"10.1016\/j.matpr.2021.06.400","article-title":"Identification of cyber attacks using machine learning in smart IoT networks","volume":"80","author":"Malathi","year":"2023","journal-title":"Mater. Today Proc."},{"doi-asserted-by":"crossref","unstructured":"Miah, M.S.U., Sarwar, T.B., Islam, S.S., Haque, M.S., Masuduzzaman, M., and Bhowmik, A. (2022, January 27\u201329). An adaptive Medical Cyber-Physical System for post diagnosis patient care using cloud computing and machine learning approach. Proceedings of the 2022 3rd International Conference for Emerging Technology (INCET), Belgaum, India.","key":"ref_9","DOI":"10.1109\/INCET54531.2022.9824032"},{"unstructured":"Diedrich, A. (2023). On Diagnosing Cyber-Physical Systems. [Ph.D. Thesis, Helmut-Schmidt-Universit\u00e4t\/Universit\u00e4t der Bundeswehr Hamburg].","key":"ref_10"},{"unstructured":"Aruv\u00e4li, T., De Marchi, M., Rauch, E., and Matt, D. (2023). International Conference on Axiomatic Design, Springer.","key":"ref_11"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"21670","DOI":"10.1109\/JIOT.2023.3289625","article-title":"A Survey on Cyber-Physical Systems Security","volume":"10","author":"Yu","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/S0024-3795(00)00161-0","article-title":"Symmetric failures in symmetric control systems","volume":"318","author":"Tanaka","year":"2000","journal-title":"Linear Algebra Its Appl."},{"doi-asserted-by":"crossref","unstructured":"Feng, X., Wang, K., Zhang, J., and Guan, J. (2023). A New Measure for Determining the Equivalent Symmetry of Decomposed Subsystems from Large Complex Cyber\u2014Physical Systems. Symmetry, 15.","key":"ref_14","DOI":"10.3390\/sym15010037"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"104738","DOI":"10.1016\/j.pnucene.2023.104738","article-title":"Cyber security in the nuclear industry: A closer look at digital control systems, networks and human factors","volume":"161","author":"Ayodeji","year":"2023","journal-title":"Prog. Nucl. Energy"},{"doi-asserted-by":"crossref","unstructured":"Hu, L., Wang, Z., and Naeem, W. (2016, January 28). Security analysis of stochastic networked control systems under false data injection attacks. Proceedings of the 2016 UKACC International Conference on Control, UKACC Control, Belfast, UK.","key":"ref_16","DOI":"10.1109\/CONTROL.2016.7737519"},{"unstructured":"Silva, M., Puys, M., Thevenon, P.H., and Mocanu, S. (September, January 29). PLC Logic-Based Cybersecurity Risks Identification for ICS. Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, Italy.","key":"ref_17"},{"doi-asserted-by":"crossref","unstructured":"Ge, H., Yue, D., Xie, X., Deng, S., and Zhang, Y. (2017, January 26\u201328). Analysis of cyber physical systems security via networked attacks. Proceedings of the 2017 36th Chinese Control Conference (CCC), Dalian, China.","key":"ref_18","DOI":"10.23919\/ChiCC.2017.8028028"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.ijcip.2015.02.002","article-title":"A survey of cyber security management in industrial control systems","volume":"9","author":"Knowles","year":"2015","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.future.2016.07.016","article-title":"A method for evaluating the consequence propagation of security attacks in cyber\u2014Physical systems","volume":"67","author":"Orojloo","year":"2017","journal-title":"Futur. Gener. Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Chapman, J., Ofner, S., and Pauksztelo, P. (2016, January 7\u201310). Key Factors in Industrial Control System Security. Proceedings of the 2016 IEEE 41st Conference on Local Computer Networks (LCN), Dubai, United Arab Emirates.","key":"ref_21","DOI":"10.1109\/LCN.2016.90"},{"doi-asserted-by":"crossref","unstructured":"Bernieri, G., Conti, M., and Pascucci, F. (2018, January 10\u201313). A Novel Architecture for Cyber-Physical Security in Industrial Control Networks. Proceedings of the 2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI), Palermo, Italy.","key":"ref_22","DOI":"10.1109\/RTSI.2018.8548438"},{"doi-asserted-by":"crossref","unstructured":"Bela, G., Piroska, H., and Roman, A. (2023). E-APTDetect: Early Advanced Persistent Threat Detection in Critical Infrastructures with Dynamic Attestation. Appl. Sci., 13.","key":"ref_23","DOI":"10.3390\/app13063409"},{"key":"ref_24","first-page":"1","article-title":"Distributed Real-Time Anomaly Detection in Networked Industrial Sensing Systems","volume":"62","author":"Chen","year":"2014","journal-title":"IEEE Trans. Ind. Electron."},{"unstructured":"Keijzer, T. (2023). Advances in Safety and Security of Cyber-Physical Systems\u2014Sliding Mode Observers, Coalitional Control and Homomorphic Encryption. [Ph.D. Thesis, Delft University of Technology].","key":"ref_25"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"100356","DOI":"10.1016\/j.ijcip.2020.100356","article-title":"Industrial control system security taxonomic framework with application to a comprehensive incidents survey","volume":"29","author":"Ahmadian","year":"2020","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/j.sysarc.2015.07.007","article-title":"Exploring ICMetrics to detect abnormal program behaviour on embedded devices","volume":"61","author":"Zhai","year":"2015","journal-title":"J. Syst. Archit."},{"doi-asserted-by":"crossref","unstructured":"Chen, Y., Poskitt, C., and Sun, J. (2018, January 20\u201324). Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System. Proceedings of the IEEE Symposium on Security and Privacy, San Francisco, CA, USA.","key":"ref_28","DOI":"10.1109\/SP.2018.00016"},{"doi-asserted-by":"crossref","unstructured":"Breivold, H.P., Jansen, A., Sandstr\u00f6m, K., and Crnkovic, I. (2013, January 3\u20135). Virtualize for Architecture Sustainability in Industrial Automation. Proceedings of the 2013 IEEE 16th International Conference on Computational Science and Engineering, Sydney, Australia.","key":"ref_29","DOI":"10.1109\/CSE.2013.69"},{"unstructured":"International Society of Automation (ISA) (2007). Enterprise-Control System Integration\u2014Part 1\u20135, ISA. Technical Report ANSI\/ISA-95.00.01-2000.","key":"ref_30"},{"doi-asserted-by":"crossref","unstructured":"Hofer, F., Sehr, M., Iannopollo, A., Ugalde, I., Sangiovanni-Vincentelli, A., and Russo, B. (2019). Industrial control via application containers: Migrating from bare-metal to IAAS. arXiv.","key":"ref_31","DOI":"10.1109\/CloudCom.2019.00021"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.sysarc.2018.03.002","article-title":"Container-based architecture for flexible industrial control applications","volume":"84","author":"Goldschmidt","year":"2018","journal-title":"J. Syst. Archit."},{"doi-asserted-by":"crossref","unstructured":"Caliskan, M., Ozsiginan, M., and Kugu, E. (2013, January 9\u201311). Benefits of the virtualization technologies with intrusion detection and prevention systems. Proceedings of the AICT 2013\u20137th International Conference on Application of Information and Communication Technologies, Conference Proceedings, Azerbaijan, Baku.","key":"ref_33","DOI":"10.1109\/ICAICT.2013.6722757"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"277","DOI":"10.4236\/jsea.2012.54033","article-title":"A State-of-the-Art Survey on Real-Time Issues in Embedded Systems Virtualization","volume":"5","author":"Gu","year":"2012","journal-title":"J. Softw. Eng. Appl."},{"doi-asserted-by":"crossref","unstructured":"Bock, Y., Broeckhove, J., and Hellinckx, P. (2015, January 4\u20136). Hierarchical Real-Time Multi-core Scheduling through Virtualization: A Survey. Proceedings of the 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Krakow, Poland.","key":"ref_35","DOI":"10.1109\/3PGCIC.2015.32"},{"doi-asserted-by":"crossref","unstructured":"Tasci, T., Melcher, J., and Verl, A. (2018, January 17\u201320). A Container-based Architecture for Real-Time Control Applications. Proceedings of the 2018 IEEE International Conference on Engineering, Technology and Innovation (ICE\/ITMC), Stuttgart, Germany.","key":"ref_36","DOI":"10.1109\/ICE.2018.8436369"},{"key":"ref_37","first-page":"59","article-title":"Container-based Virtualization for Real-Time Industrial Systems\u2014A Systematic Review","volume":"56","author":"Queiroz","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1109\/TRO.2023.3334642","article-title":"Enabling Kubernetes Orchestration of Mixed-Criticality Software for Autonomous Mobile Robots","volume":"40","author":"Lumpp","year":"2023","journal-title":"IEEE Trans. Robot."},{"unstructured":"Kirkendoll, Z., and Lueck, M. (December, January 28). Real-time Simulation Executive Architecture and Subsystem Containerization. Proceedings of the 2022 Interservice\/Industry Training, Simulation, and Education Conference (I\/ITSEC), Orlando, FL, USA.","key":"ref_39"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s10586-021-03400-6","article-title":"A secure and flexible edge computing scheme for AI-driven industrial IoT","volume":"26","author":"Zhao","year":"2021","journal-title":"Clust. Comput."},{"unstructured":"Struh\u00e1r, V., Behnam, M., Ashjaei, M., and Papadopoulos, A.V. (2020). 2nd Workshop on Fog Computing and the IoT (Fog-IoT 2020), Schloss Dagstuhl\u2013Leibniz-Zentrum f\u00fcr Informatik.","key":"ref_41"},{"doi-asserted-by":"crossref","unstructured":"Breivold, H.P., and Sandstr\u00f6m, K. (2014, January 10\u201313). Virtualize for test environment in industrial automation. Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA), Padova, Italy.","key":"ref_42","DOI":"10.1109\/ETFA.2014.7005089"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1007\/s12008-016-0313-8","article-title":"A modular CPS architecture design based on ROS and Docker","volume":"11","author":"Calvo","year":"2017","journal-title":"Int. J. Interact. Des. Manuf."},{"doi-asserted-by":"crossref","unstructured":"Moga, A., Sivanthi, T., and Franke, C. (2016, January 4\u20138). OS-level virtualization for industrial automation systems: Are we there yet?. Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy.","key":"ref_44","DOI":"10.1145\/2851613.2851737"},{"unstructured":"Melcher, J. (2018). Design and Implementation of a Container-based Architecture for Real-Time Control Applications. [Master\u2019s Thesis, University of Stuttgart, Institute of Software Technology].","key":"ref_45"},{"doi-asserted-by":"crossref","unstructured":"Goldschmidt, T., and Hauck-Stattelmann, S. (September, January 31). Software Containers for Industrial Control. Proceedings of the 2016 42th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Limassol, Cyprus.","key":"ref_46","DOI":"10.1109\/SEAA.2016.23"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"978","DOI":"10.1109\/COMST.2017.2780114","article-title":"Wireless Network Design for Control Systems: A Survey","volume":"20","author":"Park","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"doi-asserted-by":"crossref","unstructured":"Kim, S., and Park, K.J. (2021). A Survey on Machine-Learning Based Security Design for Cyber-Physical Systems. Appl. Sci., 11.","key":"ref_48","DOI":"10.3390\/app11125458"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"5126","DOI":"10.1109\/JSYST.2020.3019939","article-title":"Decentralized Sampled-Data Control for Cyber-Physical Systems Subject to DoS Attacks","volume":"15","author":"Li","year":"2021","journal-title":"IEEE Syst. J."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"2798","DOI":"10.1016\/j.jfranklin.2019.01.005","article-title":"Detection of replay attacks in cyber-physical systems using a frequency-based signature","volume":"356","author":"Rotondo","year":"2019","journal-title":"J. Frankl. Inst."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"109117","DOI":"10.1016\/j.automatica.2020.109117","article-title":"False data injection attacks with complete stealthiness in cyber\u2013physical systems: A self-generated approach","volume":"120","author":"Zhang","year":"2020","journal-title":"Automatica"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"103210","DOI":"10.1016\/j.cose.2023.103210","article-title":"CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders","volume":"129","author":"Catillo","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"1554","DOI":"10.1109\/TSMC.2018.2884952","article-title":"A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks","volume":"49","author":"Peng","year":"2019","journal-title":"IEEE Trans. Syst. Man Cybern. Syst"},{"doi-asserted-by":"crossref","unstructured":"Zhang, H., Wang, X., Ban, L., and Sun, M. (2023). A Novel Detection and Identification Mechanism for Malicious Injection Attacks in Power Systems. Symmetry, 15.","key":"ref_54","DOI":"10.3390\/sym15122104"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"44219","DOI":"10.1109\/ACCESS.2020.2977423","article-title":"A Survey of Network Attacks on Cyber-Physical Systems","volume":"8","author":"Cao","year":"2020","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Zarandi, Z.N., and Sharifi, I. (2020, January 22\u201323). Detection and Identification of Cyber-Attacks in Cyber-Physical Systems Based on Machine Learning Methods. Proceedings of the 2020 11th International Conference on Information and Knowledge Technology (IKT), Tehran, Iran.","key":"ref_56","DOI":"10.1109\/IKT51791.2020.9345627"},{"doi-asserted-by":"crossref","unstructured":"Alsulami, A.A., Abu Al-Haija, Q., Alqahtani, A., and Alsini, R. (2022). Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model. Symmetry, 14.","key":"ref_57","DOI":"10.20944\/preprints202207.0039.v1"},{"doi-asserted-by":"crossref","unstructured":"Zegzhda, D., Pavlenko, E., and Aleksandrova, E. (2021). Modelling Artificial Immunization Processes to Counter Cyberthreats. Symmetry, 13.","key":"ref_58","DOI":"10.3390\/sym13122453"},{"doi-asserted-by":"crossref","unstructured":"Jin, X., and Haddad, W. (2018, January 27\u201329). An Adaptive Control Architecture for Leader-Follower Multiagent Systems with Stochastic Disturbances and Sensor and Actuator Attacks. Proceedings of the 2018 Annual American Control Conference (ACC), Milwaukee, WI, USA.","key":"ref_59","DOI":"10.23919\/ACC.2018.8431914"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"101394","DOI":"10.1016\/j.phycom.2021.101394","article-title":"Physical layer attack identification and localization in cyber-physical grid: An ensemble deep learning based approach","volume":"47","author":"Sakhnini","year":"2021","journal-title":"Phys. Commun."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"108257","DOI":"10.1016\/j.ress.2021.108257","article-title":"An integrated data-driven scheme for the defense of typical cyber\u2013physical attacks","volume":"220","author":"Wu","year":"2021","journal-title":"Reliab. Eng. Syst. Saf."},{"doi-asserted-by":"crossref","unstructured":"Mtukushe, N., Onaolapo, A.K., Aluko, A., and Dorrell, D.G. (2023). Review of Cyberattack Implementation, Detection, and Mitigation Methods in Cyber-Physical Systems. Energies, 16.","key":"ref_62","DOI":"10.3390\/en16135206"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"100965","DOI":"10.1016\/j.jlamp.2024.100965","article-title":"CRYSTAL framework: Cybersecurity assurance for cyber-physical systems","volume":"139","author":"Moradi","year":"2024","journal-title":"J. Log. Algebr. Methods Program."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1016\/j.procir.2018.03.090","article-title":"Modular System Design Approach for Cyber Physical Production Systems","volume":"72","author":"Francalanza","year":"2018","journal-title":"Procedia CIRP"},{"key":"ref_65","first-page":"101781","article-title":"Cyber resilience in industrial networks: A state of the art, challenges, and future directions","volume":"35","author":"Alrumaih","year":"2023","journal-title":"J. King Saud Univ.\u2014Comput. Inf. Sci."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"58192","DOI":"10.1109\/ACCESS.2021.3072040","article-title":"Component-Based Microservices for Flexible and Scalable Automation of Industrial Bioprocesses","volume":"9","author":"Paredes","year":"2021","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Serrano-Maga\u00f1a, H., Gonz\u00e1lez-Potes, A., Ibarra-Junquera, V., Balbastre, P., Mart\u00ednez-Castro, D., and Sim\u00f3, J. (2021). Software Components for Smart Industry Based on Microservices: A Case Study in pH Control Process for the Beverage Industry. Electronics, 10.","key":"ref_67","DOI":"10.3390\/electronics10070763"},{"doi-asserted-by":"crossref","unstructured":"Paredes, C.M., Mart\u00ednez-Castro, D., Ibarra-Junquera, V., and Gonz\u00e1lez-Potes, A. (2021). Detection and Isolation of DoS and Integrity Cyber Attacks in Cyber-Physical Systems with a Neural Network-Based Architecture. Electronics, 10.","key":"ref_68","DOI":"10.3390\/electronics10182238"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1023\/B:TIME.0000045315.61234.1e","article-title":"Real time scheduling theory: A historical perspective","volume":"28","author":"Sha","year":"2004","journal-title":"Real-Time Syst."},{"unstructured":"Liu, J. (2000). Real-Time Systems, Prentice Hall PTR. [1st ed.].","key":"ref_70"},{"unstructured":"Spuri, M. (1996). Holistic Analysis for Deadline Scheduled Real-Time Distributed Systems. Research Report RR-2873, INRIA, Projet REFLECS. [Ph.D. Thesis, Institut National de Recherche en Informatique et en Automatique].","key":"ref_71"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1049\/sej.1993.0034","article-title":"Applying New Scheduling Theory to Static Priority Pre-emptive Scheduling","volume":"8","author":"Audsley","year":"1993","journal-title":"Softw. Eng. J."},{"unstructured":"Albertos, P., Crespo, A., Ripoll, I., Valles, M., and Balbastre, P. (2000, January 12\u201315). RT control scheduling to reduce control performance degrading. Proceedings of the 39th IEEE Conference on Decision and Control (Cat. No.00CH37187), Sydney, Australia.","key":"ref_73"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"2451","DOI":"10.1016\/j.jfranklin.2016.04.011","article-title":"Recent advances on filtering and control for cyber-physical systems under security and resource constraints","volume":"353","author":"Wang","year":"2016","journal-title":"J. Frankl. Inst."},{"doi-asserted-by":"crossref","unstructured":"Sridhar, S., and Manimaran, G. (2010, January 25\u201329). Data integrity attacks and their impacts on SCADA control system. Proceedings of the IEEE PES General Meeting, Minneapolis, MN, USA.","key":"ref_75","DOI":"10.1109\/PES.2010.5590115"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.jprocont.2011.08.001","article-title":"Comparison between backstepping and input\u2013output linearization techniques for pH process control","volume":"22","author":"Nejati","year":"2012","journal-title":"J. Process Control"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.cep.2012.08.003","article-title":"Following an optimal batch bioreactor operations model","volume":"62","year":"2012","journal-title":"Chem. Eng. Process."},{"unstructured":"Slotine, J.J.E., and Li, W. (1991). Applied Nonlinear Control, PRENTICE-HALL.","key":"ref_78"},{"doi-asserted-by":"crossref","unstructured":"Ding, Z. (2013). Nonlinear and Adaptive Control Systems, University of Manchester.","key":"ref_79","DOI":"10.1049\/PBCE084E"},{"doi-asserted-by":"crossref","unstructured":"Griba, N., Hamidi, F., Menighed, K., Boussaid, B., and Abdelkrim, M.N. (2019, January 16\u201318). Synchronization of Chaotic Systems: A survey study. Proceedings of the 2019 International Conference on Signal, Control and Communication (SCC), Hammamet, Tunisia.","key":"ref_80","DOI":"10.1109\/SCC47175.2019.9116133"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"104977","DOI":"10.1016\/j.cnsns.2019.104977","article-title":"Master-slave synchronization via dynamic control","volume":"80","author":"Garcia","year":"2020","journal-title":"Commun. Nonlinear Sci. Numer. Simul."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/6\/684\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:52:58Z","timestamp":1760107978000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/6\/684"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":81,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["sym16060684"],"URL":"https:\/\/doi.org\/10.3390\/sym16060684","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2024,6,3]]}}}