Special lssues
Table of Content

AI-enabled Threat Intelligence for Mobile Cyber-Physical Systems

Submission Deadline: 31 May 2022 (closed)

Guest Editors

Dr. Abdul Rehman Javed, Air University, Pakistan.
Dr. Saurabh Singh, Dongguk University, South Korea.
Dr. Mohammad Kamrul Hasan, Universiti Kebangsaan Malaysia, Malaysia.


The large-scale development in Cyber-Physical Systems (CPS), ease of availability, and affordability have drastically increased its usage in the real world. CPS architecture is wide enough to encompass almost all internet-connected smart devices. With a diverse network of mobile nodes known as Mobile Cyber-Physical Systems (MCPS), CPS offers support and responsive administrations to help people in the real world. MCPS that adopt the advantages and extend the application domains of CPS has become popular recently. MCPS has enabled many context-aware applications in different areas such as mobile banking, communication, social interaction, business, transactions, mobile education, vehicular networking systems, real-time traffic information providers, and mobile-robotics systems. The extensive interaction and involvement of real-world entities (i.e., human activities) lead to high threats and attacks. MCPS is subject to various attacks due to their mobility, real-time, and safety constraints, coupled with their reliance on communication mediums. To ensure security, high-security standards and trustworthiness are required for MCPS.

This Special Issue is dedicated to publishing cutting-edge research addressing the various problems and challenges related to Mobile Cyber-Physical Systems (MCPS). This issue focuses on investigating and sharing groundbreaking ideas, approaches, hypotheses, and practices centered around MCPS.


1. AI-enabled threat intelligence and network security for MCPS
2. ML analytics and other security intelligence models for MCPS
3. AI-enabled anomaly detection in MCPS
4. Lightweight security algorithms and protocols for MCPS
5. Digital forensics in MCPS
6. AI-driven data security and privacy for MCPS
7. Digital signature for MCPS
8. Machine and deep learning for malware analysis, intrusion detection, phishing attacks, adversarial attacks, Stealthy attacks, jamming, botnet attacks, malicious URLs, DDOS in MCPS
9. Watermarking for securing MCPS
10. Side-Channel Attacks in MCPS

Share Link