A Review of CPS Design and Vulnerability Analysis Article Swipe
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.53759/181x/jcns202202014
Cyber-Physical Systems (CPS) offer a wide array of applications. Integration of various heterogeneous infrastructures that generate data for intelligent analysis is discussed. The objective of this article is to review CPS and provide a discussion of the system's security flaws. Many earlier investigations have also been properly explained. Because of the increasing usage of CPS in sensitive organizations (e.g., healthcare and connected homes), the requirement for a risk assessment strategy is essential. The major concentration of risk evaluation has shifted from computer risk evaluation to network-based risk analysis as a result of our substantial dependence on the Internet. The goal of CPS vulnerability analysis is to develop a quantitative model for future system protection.
Related Topics
- Type
- review
- Language
- en
- Landing Page
- https://doi.org/10.53759/181x/jcns202202014
- http://anapub.co.ke/journals/jcns/jcns_pdf/2022/jcns_volume_2-issue_3/JCNS202202014.pdf
- OA Status
- hybrid
- Cited By
- 3
- References
- 26
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4288075154
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4288075154Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.53759/181x/jcns202202014Digital Object Identifier
- Title
-
A Review of CPS Design and Vulnerability AnalysisWork title
- Type
-
reviewOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-07-05Full publication date if available
- Authors
-
Andrea Vilán, Peter WalkerList of authors in order
- Landing page
-
https://doi.org/10.53759/181x/jcns202202014Publisher landing page
- PDF URL
-
https://anapub.co.ke/journals/jcns/jcns_pdf/2022/jcns_volume_2-issue_3/JCNS202202014.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://anapub.co.ke/journals/jcns/jcns_pdf/2022/jcns_volume_2-issue_3/JCNS202202014.pdfDirect OA link when available
- Concepts
-
Vulnerability (computing), Vulnerability assessment, Computer science, Risk analysis (engineering), Computer security, Cyber-physical system, The Internet, Risk assessment, Business, World Wide Web, Psychology, Operating system, Psychological resilience, PsychotherapistTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
3Total citation count in OpenAlex
- Citations by year (recent)
-
2023: 3Per-year citation counts (last 5 years)
- References (count)
-
26Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4288075154 |
|---|---|
| doi | https://doi.org/10.53759/181x/jcns202202014 |
| ids.doi | https://doi.org/10.53759/181x/jcns202202014 |
| ids.openalex | https://openalex.org/W4288075154 |
| fwci | 1.13997333 |
| type | review |
| title | A Review of CPS Design and Vulnerability Analysis |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 119 |
| biblio.first_page | 110 |
| topics[0].id | https://openalex.org/T10734 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9995999932289124 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Information and Cyber Security |
| topics[1].id | https://openalex.org/T10400 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9977999925613403 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Network Security and Intrusion Detection |
| topics[2].id | https://openalex.org/T10917 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.9976000189781189 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2207 |
| topics[2].subfield.display_name | Control and Systems Engineering |
| topics[2].display_name | Smart Grid Security and Resilience |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C95713431 |
| concepts[0].level | 2 |
| concepts[0].score | 0.7823790907859802 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q631425 |
| concepts[0].display_name | Vulnerability (computing) |
| concepts[1].id | https://openalex.org/C167063184 |
| concepts[1].level | 3 |
| concepts[1].score | 0.7176666259765625 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1400839 |
| concepts[1].display_name | Vulnerability assessment |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.6615887880325317 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C112930515 |
| concepts[3].level | 1 |
| concepts[3].score | 0.6553752422332764 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q4389547 |
| concepts[3].display_name | Risk analysis (engineering) |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.46919581294059753 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C179768478 |
| concepts[5].level | 2 |
| concepts[5].score | 0.44984009861946106 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1120057 |
| concepts[5].display_name | Cyber-physical system |
| concepts[6].id | https://openalex.org/C110875604 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4371938109397888 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[6].display_name | The Internet |
| concepts[7].id | https://openalex.org/C12174686 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4184207320213318 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q1058438 |
| concepts[7].display_name | Risk assessment |
| concepts[8].id | https://openalex.org/C144133560 |
| concepts[8].level | 0 |
| concepts[8].score | 0.1577599048614502 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q4830453 |
| concepts[8].display_name | Business |
| concepts[9].id | https://openalex.org/C136764020 |
| concepts[9].level | 1 |
| concepts[9].score | 0.14419519901275635 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[9].display_name | World Wide Web |
| concepts[10].id | https://openalex.org/C15744967 |
| concepts[10].level | 0 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q9418 |
| concepts[10].display_name | Psychology |
| concepts[11].id | https://openalex.org/C111919701 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[11].display_name | Operating system |
| concepts[12].id | https://openalex.org/C137176749 |
| concepts[12].level | 2 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q4105337 |
| concepts[12].display_name | Psychological resilience |
| concepts[13].id | https://openalex.org/C542102704 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q183257 |
| concepts[13].display_name | Psychotherapist |
| keywords[0].id | https://openalex.org/keywords/vulnerability |
| keywords[0].score | 0.7823790907859802 |
| keywords[0].display_name | Vulnerability (computing) |
| keywords[1].id | https://openalex.org/keywords/vulnerability-assessment |
| keywords[1].score | 0.7176666259765625 |
| keywords[1].display_name | Vulnerability assessment |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.6615887880325317 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/risk-analysis |
| keywords[3].score | 0.6553752422332764 |
| keywords[3].display_name | Risk analysis (engineering) |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.46919581294059753 |
| keywords[4].display_name | Computer security |
| keywords[5].id | https://openalex.org/keywords/cyber-physical-system |
| keywords[5].score | 0.44984009861946106 |
| keywords[5].display_name | Cyber-physical system |
| keywords[6].id | https://openalex.org/keywords/the-internet |
| keywords[6].score | 0.4371938109397888 |
| keywords[6].display_name | The Internet |
| keywords[7].id | https://openalex.org/keywords/risk-assessment |
| keywords[7].score | 0.4184207320213318 |
| keywords[7].display_name | Risk assessment |
| keywords[8].id | https://openalex.org/keywords/business |
| keywords[8].score | 0.1577599048614502 |
| keywords[8].display_name | Business |
| keywords[9].id | https://openalex.org/keywords/world-wide-web |
| keywords[9].score | 0.14419519901275635 |
| keywords[9].display_name | World Wide Web |
| language | en |
| locations[0].id | doi:10.53759/181x/jcns202202014 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210237821 |
| locations[0].source.issn | 2789-181X, 2789-200X |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2789-181X |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Journal of Computing and Natural Science |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by |
| locations[0].pdf_url | http://anapub.co.ke/journals/jcns/jcns_pdf/2022/jcns_volume_2-issue_3/JCNS202202014.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Journal of Computing and Natural Science |
| locations[0].landing_page_url | https://doi.org/10.53759/181x/jcns202202014 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5020333308 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-0968-0893 |
| authorships[0].author.display_name | Andrea Vilán |
| authorships[0].countries | US |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I181401687 |
| authorships[0].affiliations[0].raw_affiliation_string | American University, Massachusetts Avenue, NW, Washington, DC 20016. |
| authorships[0].institutions[0].id | https://openalex.org/I181401687 |
| authorships[0].institutions[0].ror | https://ror.org/052w4zt36 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I181401687 |
| authorships[0].institutions[0].country_code | US |
| authorships[0].institutions[0].display_name | American University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Andrea Vilan |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | American University, Massachusetts Avenue, NW, Washington, DC 20016. |
| authorships[1].author.id | https://openalex.org/A5064710594 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-9648-3999 |
| authorships[1].author.display_name | Peter Walker |
| authorships[1].countries | US |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I181401687 |
| authorships[1].affiliations[0].raw_affiliation_string | American University, Massachusetts Avenue, NW, Washington, DC 20016. |
| authorships[1].institutions[0].id | https://openalex.org/I181401687 |
| authorships[1].institutions[0].ror | https://ror.org/052w4zt36 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I181401687 |
| authorships[1].institutions[0].country_code | US |
| authorships[1].institutions[0].display_name | American University |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Pamela Walker |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | American University, Massachusetts Avenue, NW, Washington, DC 20016. |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | http://anapub.co.ke/journals/jcns/jcns_pdf/2022/jcns_volume_2-issue_3/JCNS202202014.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | A Review of CPS Design and Vulnerability Analysis |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10734 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9995999932289124 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Information and Cyber Security |
| related_works | https://openalex.org/W2552111085, https://openalex.org/W2089917086, https://openalex.org/W1974343333, https://openalex.org/W2766405666, https://openalex.org/W2590902718, https://openalex.org/W3203035974, https://openalex.org/W2075713005, https://openalex.org/W2983131117, https://openalex.org/W2149599680, https://openalex.org/W2069974967 |
| cited_by_count | 3 |
| counts_by_year[0].year | 2023 |
| counts_by_year[0].cited_by_count | 3 |
| locations_count | 1 |
| best_oa_location.id | doi:10.53759/181x/jcns202202014 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210237821 |
| best_oa_location.source.issn | 2789-181X, 2789-200X |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2789-181X |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Journal of Computing and Natural Science |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | http://anapub.co.ke/journals/jcns/jcns_pdf/2022/jcns_volume_2-issue_3/JCNS202202014.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Journal of Computing and Natural Science |
| best_oa_location.landing_page_url | https://doi.org/10.53759/181x/jcns202202014 |
| primary_location.id | doi:10.53759/181x/jcns202202014 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210237821 |
| primary_location.source.issn | 2789-181X, 2789-200X |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2789-181X |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Journal of Computing and Natural Science |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by |
| primary_location.pdf_url | http://anapub.co.ke/journals/jcns/jcns_pdf/2022/jcns_volume_2-issue_3/JCNS202202014.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Journal of Computing and Natural Science |
| primary_location.landing_page_url | https://doi.org/10.53759/181x/jcns202202014 |
| publication_date | 2022-07-05 |
| publication_year | 2022 |
| referenced_works | https://openalex.org/W1992088011, https://openalex.org/W2144592520, https://openalex.org/W2909004889, https://openalex.org/W3108509204, https://openalex.org/W2969037413, https://openalex.org/W4220978477, https://openalex.org/W2800551203, https://openalex.org/W2601140827, https://openalex.org/W1979340448, https://openalex.org/W4232014048, https://openalex.org/W2916801457, https://openalex.org/W4220904996, https://openalex.org/W3005312959, https://openalex.org/W2789950795, https://openalex.org/W2109785846, https://openalex.org/W2102548545, https://openalex.org/W2086787243, https://openalex.org/W2803154649, https://openalex.org/W3035466593, https://openalex.org/W2584723793, https://openalex.org/W2315451619, https://openalex.org/W4246068085, https://openalex.org/W3014071235, https://openalex.org/W2419134065, https://openalex.org/W3111466602, https://openalex.org/W2887328844 |
| referenced_works_count | 26 |
| abstract_inverted_index.a | 4, 33, 66, 89, 107 |
| abstract_inverted_index.as | 88 |
| abstract_inverted_index.in | 55 |
| abstract_inverted_index.is | 20, 27, 70, 104 |
| abstract_inverted_index.of | 7, 10, 24, 35, 49, 53, 75, 91, 100 |
| abstract_inverted_index.on | 95 |
| abstract_inverted_index.to | 28, 84, 105 |
| abstract_inverted_index.CPS | 30, 54, 101 |
| abstract_inverted_index.The | 22, 72, 98 |
| abstract_inverted_index.and | 31, 60 |
| abstract_inverted_index.for | 17, 65, 110 |
| abstract_inverted_index.has | 78 |
| abstract_inverted_index.our | 92 |
| abstract_inverted_index.the | 36, 50, 63, 96 |
| abstract_inverted_index.Many | 40 |
| abstract_inverted_index.also | 44 |
| abstract_inverted_index.been | 45 |
| abstract_inverted_index.data | 16 |
| abstract_inverted_index.from | 80 |
| abstract_inverted_index.goal | 99 |
| abstract_inverted_index.have | 43 |
| abstract_inverted_index.risk | 67, 76, 82, 86 |
| abstract_inverted_index.that | 14 |
| abstract_inverted_index.this | 25 |
| abstract_inverted_index.wide | 5 |
| abstract_inverted_index.(CPS) | 2 |
| abstract_inverted_index.array | 6 |
| abstract_inverted_index.major | 73 |
| abstract_inverted_index.model | 109 |
| abstract_inverted_index.offer | 3 |
| abstract_inverted_index.usage | 52 |
| abstract_inverted_index.(e.g., | 58 |
| abstract_inverted_index.flaws. | 39 |
| abstract_inverted_index.future | 111 |
| abstract_inverted_index.result | 90 |
| abstract_inverted_index.review | 29 |
| abstract_inverted_index.system | 112 |
| abstract_inverted_index.Because | 48 |
| abstract_inverted_index.Systems | 1 |
| abstract_inverted_index.article | 26 |
| abstract_inverted_index.develop | 106 |
| abstract_inverted_index.earlier | 41 |
| abstract_inverted_index.homes), | 62 |
| abstract_inverted_index.provide | 32 |
| abstract_inverted_index.shifted | 79 |
| abstract_inverted_index.various | 11 |
| abstract_inverted_index.analysis | 19, 87, 103 |
| abstract_inverted_index.computer | 81 |
| abstract_inverted_index.generate | 15 |
| abstract_inverted_index.properly | 46 |
| abstract_inverted_index.security | 38 |
| abstract_inverted_index.strategy | 69 |
| abstract_inverted_index.system's | 37 |
| abstract_inverted_index.Internet. | 97 |
| abstract_inverted_index.connected | 61 |
| abstract_inverted_index.objective | 23 |
| abstract_inverted_index.sensitive | 56 |
| abstract_inverted_index.assessment | 68 |
| abstract_inverted_index.dependence | 94 |
| abstract_inverted_index.discussed. | 21 |
| abstract_inverted_index.discussion | 34 |
| abstract_inverted_index.essential. | 71 |
| abstract_inverted_index.evaluation | 77, 83 |
| abstract_inverted_index.explained. | 47 |
| abstract_inverted_index.healthcare | 59 |
| abstract_inverted_index.increasing | 51 |
| abstract_inverted_index.Integration | 9 |
| abstract_inverted_index.intelligent | 18 |
| abstract_inverted_index.protection. | 113 |
| abstract_inverted_index.requirement | 64 |
| abstract_inverted_index.substantial | 93 |
| abstract_inverted_index.quantitative | 108 |
| abstract_inverted_index.applications. | 8 |
| abstract_inverted_index.concentration | 74 |
| abstract_inverted_index.heterogeneous | 12 |
| abstract_inverted_index.network-based | 85 |
| abstract_inverted_index.organizations | 57 |
| abstract_inverted_index.vulnerability | 102 |
| abstract_inverted_index.Cyber-Physical | 0 |
| abstract_inverted_index.investigations | 42 |
| abstract_inverted_index.infrastructures | 13 |
| cited_by_percentile_year.max | 97 |
| cited_by_percentile_year.min | 96 |
| corresponding_author_ids | https://openalex.org/A5020333308 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| corresponding_institution_ids | https://openalex.org/I181401687 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/9 |
| sustainable_development_goals[0].score | 0.6399999856948853 |
| sustainable_development_goals[0].display_name | Industry, innovation and infrastructure |
| citation_normalized_percentile.value | 0.79676048 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |