2018
DOI: 10.1002/cpe.4850
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive survey on modeling of cyber‐physical systems

Abstract: SummaryModeling Cyber‐physical systems (CPS) is a challenging step that requires a lot of background from both the cyber and physical fields. However, there is a lack of studies in the existing literature that discuss the state of the art in modeling CPS or explore the research gaps in this area. In this paper, we survey existing approaches to modeling CPS. We focus on studying the considered CPS properties. Based on this study, we classify these properties and discuss their importance in different application… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(14 citation statements)
references
References 99 publications
0
13
0
Order By: Relevance
“…CPPS models were classified into time-driven and event-driven systems in [36]. A more generic classification of CPS models was presented in [37], which is divided into three main categories: modeling techniques, modeling requirements, and application domains.…”
Section: A Categories Of Cpps Modelsmentioning
confidence: 99%
“…CPPS models were classified into time-driven and event-driven systems in [36]. A more generic classification of CPS models was presented in [37], which is divided into three main categories: modeling techniques, modeling requirements, and application domains.…”
Section: A Categories Of Cpps Modelsmentioning
confidence: 99%
“…The adoption of hashing is witnessed in improving security over different application variants [31], [32], [33], [34], [35]. The hashing algorithm effectively identifies and validates that a legal person forwards the data received by a user, or the received information is authentic and not altered [36].…”
Section: Sha Familymentioning
confidence: 99%
“…A few years later, on October 2, 2012, the Keccak (as SHA-3) was announced as the competition winner. In 2015, NIST recognized SHA-3 as a standard hash function [32], [33]. Its operation is shown in Fig.…”
Section: Secure Hash Algorithmsmentioning
confidence: 99%
“…The task to model dynamic relationships between u and y in terms of u A and y A (or u B and y B etc) is the central problem of system identification [13]. The task to model and control one CPS in terms of the relationships between u A , y A , x A and sometimes also G A is more complex [14] and typically involves hybrid models with state-dependent dynamic descriptions. This is a central problem in automatic control and CPS engineering.…”
Section: Interoperability Modelmentioning
confidence: 99%