Subtopic Deep Dive

Cyber-Physical-Social Systems
Research Guide

What is Cyber-Physical-Social Systems?

Cyber-Physical-Social Systems (CPSS) integrate cyber, physical, and social components to model human behaviors in networked urban infrastructures like smart cities.

CPSS research focuses on feedback loops, resilience, and interactions in systems combining IoT, control engineering, and social dynamics. Key studies map AI applications in public transport (Jevinger et al., 2023, 47 citations) and assess criticality of railway elements (Řehák et al., 2020, 20 citations). Over 10 papers from 2004-2023 address security, policy, and optimization in these systems.

15
Curated Papers
3
Key Challenges

Why It Matters

CPSS frameworks enable resilience analysis for urban transport against DoS attacks (Dikii et al., 2021) and cybersecurity threats (Milov et al., 2019). They support critical infrastructure protection, as in railway assessments (Řehák et al., 2020), and policy for information networks (Bauer, 2004). Real-world impacts include AI-optimized public transit (Jevinger et al., 2023) and cloud-monitored enterprise networks (Ospanova et al., 2022).

Key Research Challenges

Modeling Antagonistic Interactions

Integrating behaviors of cyber attackers and defenders remains incomplete, focusing often on one side only (Milov et al., 2019). Multi-agent simulations must capture social factors in CPSS. This limits predictive accuracy for smart city security.

Assessing Infrastructure Criticality

Holistic evaluation of railway elements requires combining reliability, vulnerability, and consequences (Řehák et al., 2020). Partial assessments overlook social dependencies. Standardized integral methods are lacking.

Detecting Application-Layer Attacks

DoS attacks in MQTT-based IoT networks overload gateways via message frequency (Dikii et al., 2021). Real-time detection struggles with CPSS scale. Balancing workload and security poses ongoing issues.

Essential Papers

1.

Artificial intelligence for improving public transport: a mapping study

Åse Jevinger, Chong-Ke Zhao, Johanna Persson et al. · 2023 · Public Transport · 47 citations

Abstract The objective of this study is to provide a better understanding of the potential of using Artificial Intelligence (AI) to improve Public Transport (PT), by reviewing research literature. ...

2.

COMPUTATIONAL ASPECTS OF ESTABLISHING UNIVERSAL TABLES OF CRITERION'S IMPORTANCE

S. A. Piyavsky · 2017 · Ontology of Designing · 21 citations

In work “How do we digitize the concept of «more important»” the author had proposed an approach towards decisionmaking in multi-criterial comparison of alternatives that would allow to increase th...

3.

Integral approach to assessing the criticality of railway infrastructure elements

David Řehák, Simona Slivková, Radim Pittner et al. · 2020 · International Journal of Critical Infrastructures · 20 citations

In the last ten years, considerable attention has been paid to analysing and assessing the criticality of railway infrastructure elements.Publications on the subject mostly assess elements only fro...

4.

Development of methodology for modeling the interaction of antagonistic agents in cybersecurity systems

Oleksandr Milov, Олександр Войтко, Ірина Гусарова et al. · 2019 · Eastern-European Journal of Enterprise Technologies · 19 citations

The basic concepts that form the basis of integrated modeling of the behavior of antagonistic agents in cybersecurity systems are identified. It is shown that the emphasis is largely on modeling th...

5.

IEEE Council on Radio-Frequency Identification: History, Present, and Future Vision

Fei‐Yue Wang, Gisele Bennett, Nazanin Bassiri‐Gharb et al. · 2020 · IEEE Journal of Radio Frequency Identification · 14 citations

This article summarizes the history and present state of the IEEE Council on Radio-Frequency Identification (CRFID). The aim, scope, and achievement of CRFID on technical & academic activities, pub...

6.

DoS attacks detection in MQTT networks

Dmitrii Dikii, S.A. Arustamov, A.Yu. Grishentsev · 2021 · Indonesian Journal of Electrical Engineering and Computer Science · 12 citations

<span>The paper considers the problem of protecting the Internet of things infrastructure against denial-of-service (DoS) attacks at the application level. The authors considered parameters t...

7.

Cloud Service for Protecting Computer Networks of Enterprises Using Intelligent Hardware and Software Devices, Based on Raspberry Pi Microcomputers

Ademi B. Ospanova, Aizhan Zharkimbekova, Lazzat Kussepova et al. · 2022 · Acta Polytechnica Hungarica · 12 citations

This paper describes the development of a unified cloud service, for protecting and monitoring corporate computer networks and SOHO-class networks, with intelligent mobile software and hardware cli...

Reading Guide

Foundational Papers

Start with Bauer (2004) for policy limits in complex networks, then Marozas et al. (2013) on multi-criteria access control, providing CPSS governance and security basics.

Recent Advances

Study Jevinger et al. (2023) for AI in transport, Řehák et al. (2020) for criticality, and Dikii et al. (2021) for IoT security, capturing current urban applications.

Core Methods

Core techniques involve AI literature mapping (Jevinger et al., 2023), integral criticality scoring (Řehák et al., 2020), agent-based cybersecurity simulation (Milov et al., 2019), and MQTT parameter analysis (Dikii et al., 2021).

How PapersFlow Helps You Research Cyber-Physical-Social Systems

Discover & Search

PapersFlow's Research Agent uses searchPapers and exaSearch to find CPSS literature like Jevinger et al. (2023) on AI in public transport, then citationGraph reveals connections to Řehák et al. (2020) on infrastructure criticality, while findSimilarPapers uncovers related security papers.

Analyze & Verify

Analysis Agent applies readPaperContent to extract models from Milov et al. (2019), verifies claims with CoVe chain-of-verification, and runs PythonAnalysis for statistical validation of attack frequencies in Dikii et al. (2021) using pandas on citation data. GRADE grading scores evidence strength for resilience metrics.

Synthesize & Write

Synthesis Agent detects gaps in social modeling across Bauer (2004) and recent works, flags contradictions in policy evolution, and uses exportMermaid for feedback loop diagrams. Writing Agent employs latexEditText, latexSyncCitations for Jevinger et al., and latexCompile to produce CPSS review papers.

Use Cases

"Analyze DoS detection methods in MQTT for smart city CPSS."

Research Agent → searchPapers('MQTT DoS CPSS') → Analysis Agent → readPaperContent(Dikii et al. 2021) → runPythonAnalysis(message frequency stats) → GRADE report on detection efficacy.

"Draft LaTeX section on CPSS infrastructure criticality."

Synthesis Agent → gap detection(Řehák et al. 2020 + Milov et al. 2019) → Writing Agent → latexEditText('Criticality models') → latexSyncCitations → latexCompile → PDF with integrated citations.

"Find code for antagonistic agent simulations in cybersecurity."

Research Agent → searchPapers('antagonistic agents CPSS') → Code Discovery → paperExtractUrls(Milov et al. 2019) → paperFindGithubRepo → githubRepoInspect → Python simulation scripts.

Automated Workflows

Deep Research workflow conducts systematic reviews of 50+ CPSS papers, chaining searchPapers → citationGraph → structured report on transport AI trends from Jevinger et al. DeepScan applies 7-step analysis with CoVe checkpoints to verify criticality models in Řehák et al. Theorizer generates theories on social-physical feedback from Bauer (2004) and Dikii et al.

Frequently Asked Questions

What defines Cyber-Physical-Social Systems?

CPSS integrates cyber computing, physical infrastructures, and social human behaviors for applications like smart cities, modeling feedback loops and resilience.

What are key methods in CPSS research?

Methods include AI mapping for transport (Jevinger et al., 2023), integral criticality assessment (Řehák et al., 2020), and antagonistic agent modeling (Milov et al., 2019). MQTT DoS detection uses workload parameters (Dikii et al., 2021).

What are major CPSS papers?

Jevinger et al. (2023, 47 citations) maps AI in public transport; Řehák et al. (2020, 20 citations) assesses railway criticality; Bauer (2004, 11 citations) analyzes network governance.

What open problems exist in CPSS?

Challenges include holistic modeling of antagonist interactions (Milov et al., 2019), scalable DoS detection (Dikii et al., 2021), and integrating social factors in infrastructure policy (Bauer, 2004).

Research Advanced Research in Systems and Signal Processing with AI

PapersFlow provides specialized AI tools for Engineering researchers. Here are the most relevant for this topic:

See how researchers in Engineering use PapersFlow

Field-specific workflows, example queries, and use cases.

Engineering Guide

Start Researching Cyber-Physical-Social Systems with AI

Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.

See how PapersFlow works for Engineering researchers