Subtopic Deep Dive
Cyber-Physical-Social Systems
Research Guide
What is Cyber-Physical-Social Systems?
Cyber-Physical-Social Systems (CPSS) integrate cyber, physical, and social components to model human behaviors in networked urban infrastructures like smart cities.
CPSS research focuses on feedback loops, resilience, and interactions in systems combining IoT, control engineering, and social dynamics. Key studies map AI applications in public transport (Jevinger et al., 2023, 47 citations) and assess criticality of railway elements (Řehák et al., 2020, 20 citations). Over 10 papers from 2004-2023 address security, policy, and optimization in these systems.
Why It Matters
CPSS frameworks enable resilience analysis for urban transport against DoS attacks (Dikii et al., 2021) and cybersecurity threats (Milov et al., 2019). They support critical infrastructure protection, as in railway assessments (Řehák et al., 2020), and policy for information networks (Bauer, 2004). Real-world impacts include AI-optimized public transit (Jevinger et al., 2023) and cloud-monitored enterprise networks (Ospanova et al., 2022).
Key Research Challenges
Modeling Antagonistic Interactions
Integrating behaviors of cyber attackers and defenders remains incomplete, focusing often on one side only (Milov et al., 2019). Multi-agent simulations must capture social factors in CPSS. This limits predictive accuracy for smart city security.
Assessing Infrastructure Criticality
Holistic evaluation of railway elements requires combining reliability, vulnerability, and consequences (Řehák et al., 2020). Partial assessments overlook social dependencies. Standardized integral methods are lacking.
Detecting Application-Layer Attacks
DoS attacks in MQTT-based IoT networks overload gateways via message frequency (Dikii et al., 2021). Real-time detection struggles with CPSS scale. Balancing workload and security poses ongoing issues.
Essential Papers
Artificial intelligence for improving public transport: a mapping study
Åse Jevinger, Chong-Ke Zhao, Johanna Persson et al. · 2023 · Public Transport · 47 citations
Abstract The objective of this study is to provide a better understanding of the potential of using Artificial Intelligence (AI) to improve Public Transport (PT), by reviewing research literature. ...
COMPUTATIONAL ASPECTS OF ESTABLISHING UNIVERSAL TABLES OF CRITERION'S IMPORTANCE
S. A. Piyavsky · 2017 · Ontology of Designing · 21 citations
In work “How do we digitize the concept of «more important»” the author had proposed an approach towards decisionmaking in multi-criterial comparison of alternatives that would allow to increase th...
Integral approach to assessing the criticality of railway infrastructure elements
David Řehák, Simona Slivková, Radim Pittner et al. · 2020 · International Journal of Critical Infrastructures · 20 citations
In the last ten years, considerable attention has been paid to analysing and assessing the criticality of railway infrastructure elements.Publications on the subject mostly assess elements only fro...
Development of methodology for modeling the interaction of antagonistic agents in cybersecurity systems
Oleksandr Milov, Олександр Войтко, Ірина Гусарова et al. · 2019 · Eastern-European Journal of Enterprise Technologies · 19 citations
The basic concepts that form the basis of integrated modeling of the behavior of antagonistic agents in cybersecurity systems are identified. It is shown that the emphasis is largely on modeling th...
IEEE Council on Radio-Frequency Identification: History, Present, and Future Vision
Fei‐Yue Wang, Gisele Bennett, Nazanin Bassiri‐Gharb et al. · 2020 · IEEE Journal of Radio Frequency Identification · 14 citations
This article summarizes the history and present state of the IEEE Council on Radio-Frequency Identification (CRFID). The aim, scope, and achievement of CRFID on technical & academic activities, pub...
DoS attacks detection in MQTT networks
Dmitrii Dikii, S.A. Arustamov, A.Yu. Grishentsev · 2021 · Indonesian Journal of Electrical Engineering and Computer Science · 12 citations
<span>The paper considers the problem of protecting the Internet of things infrastructure against denial-of-service (DoS) attacks at the application level. The authors considered parameters t...
Cloud Service for Protecting Computer Networks of Enterprises Using Intelligent Hardware and Software Devices, Based on Raspberry Pi Microcomputers
Ademi B. Ospanova, Aizhan Zharkimbekova, Lazzat Kussepova et al. · 2022 · Acta Polytechnica Hungarica · 12 citations
This paper describes the development of a unified cloud service, for protecting and monitoring corporate computer networks and SOHO-class networks, with intelligent mobile software and hardware cli...
Reading Guide
Foundational Papers
Start with Bauer (2004) for policy limits in complex networks, then Marozas et al. (2013) on multi-criteria access control, providing CPSS governance and security basics.
Recent Advances
Study Jevinger et al. (2023) for AI in transport, Řehák et al. (2020) for criticality, and Dikii et al. (2021) for IoT security, capturing current urban applications.
Core Methods
Core techniques involve AI literature mapping (Jevinger et al., 2023), integral criticality scoring (Řehák et al., 2020), agent-based cybersecurity simulation (Milov et al., 2019), and MQTT parameter analysis (Dikii et al., 2021).
How PapersFlow Helps You Research Cyber-Physical-Social Systems
Discover & Search
PapersFlow's Research Agent uses searchPapers and exaSearch to find CPSS literature like Jevinger et al. (2023) on AI in public transport, then citationGraph reveals connections to Řehák et al. (2020) on infrastructure criticality, while findSimilarPapers uncovers related security papers.
Analyze & Verify
Analysis Agent applies readPaperContent to extract models from Milov et al. (2019), verifies claims with CoVe chain-of-verification, and runs PythonAnalysis for statistical validation of attack frequencies in Dikii et al. (2021) using pandas on citation data. GRADE grading scores evidence strength for resilience metrics.
Synthesize & Write
Synthesis Agent detects gaps in social modeling across Bauer (2004) and recent works, flags contradictions in policy evolution, and uses exportMermaid for feedback loop diagrams. Writing Agent employs latexEditText, latexSyncCitations for Jevinger et al., and latexCompile to produce CPSS review papers.
Use Cases
"Analyze DoS detection methods in MQTT for smart city CPSS."
Research Agent → searchPapers('MQTT DoS CPSS') → Analysis Agent → readPaperContent(Dikii et al. 2021) → runPythonAnalysis(message frequency stats) → GRADE report on detection efficacy.
"Draft LaTeX section on CPSS infrastructure criticality."
Synthesis Agent → gap detection(Řehák et al. 2020 + Milov et al. 2019) → Writing Agent → latexEditText('Criticality models') → latexSyncCitations → latexCompile → PDF with integrated citations.
"Find code for antagonistic agent simulations in cybersecurity."
Research Agent → searchPapers('antagonistic agents CPSS') → Code Discovery → paperExtractUrls(Milov et al. 2019) → paperFindGithubRepo → githubRepoInspect → Python simulation scripts.
Automated Workflows
Deep Research workflow conducts systematic reviews of 50+ CPSS papers, chaining searchPapers → citationGraph → structured report on transport AI trends from Jevinger et al. DeepScan applies 7-step analysis with CoVe checkpoints to verify criticality models in Řehák et al. Theorizer generates theories on social-physical feedback from Bauer (2004) and Dikii et al.
Frequently Asked Questions
What defines Cyber-Physical-Social Systems?
CPSS integrates cyber computing, physical infrastructures, and social human behaviors for applications like smart cities, modeling feedback loops and resilience.
What are key methods in CPSS research?
Methods include AI mapping for transport (Jevinger et al., 2023), integral criticality assessment (Řehák et al., 2020), and antagonistic agent modeling (Milov et al., 2019). MQTT DoS detection uses workload parameters (Dikii et al., 2021).
What are major CPSS papers?
Jevinger et al. (2023, 47 citations) maps AI in public transport; Řehák et al. (2020, 20 citations) assesses railway criticality; Bauer (2004, 11 citations) analyzes network governance.
What open problems exist in CPSS?
Challenges include holistic modeling of antagonist interactions (Milov et al., 2019), scalable DoS detection (Dikii et al., 2021), and integrating social factors in infrastructure policy (Bauer, 2004).
Research Advanced Research in Systems and Signal Processing with AI
PapersFlow provides specialized AI tools for Engineering researchers. Here are the most relevant for this topic:
AI Literature Review
Automate paper discovery and synthesis across 474M+ papers
Paper Summarizer
Get structured summaries of any paper in seconds
Code & Data Discovery
Find datasets, code repositories, and computational tools
AI Academic Writing
Write research papers with AI assistance and LaTeX support
See how researchers in Engineering use PapersFlow
Field-specific workflows, example queries, and use cases.
Start Researching Cyber-Physical-Social Systems with AI
Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.
See how PapersFlow works for Engineering researchers