Binu Sudhakaran Pillai1, Raghavendra Kulkarni2, Venkata Satya Suresh kumar Kondeti2, Surendran Rajendran3,*
CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 1141-1166, 2025, DOI:10.32604/cmes.2025.070348
- 30 October 2025
Abstract Future 6G communications will open up opportunities for innovative applications, including Cyber-Physical Systems, edge computing, supporting Industry 5.0, and digital agriculture. While automation is creating efficiencies, it can also create new cyber threats, such as vulnerabilities in trust and malicious node injection. Denial-of-Service (DoS) attacks can stop many forms of operations by overwhelming networks and systems with data noise. Current anomaly detection methods require extensive software changes and only detect static threats. Data collection is important for being accurate, but it is often a slow, tedious, and sometimes inefficient process. This paper proposes a new… More >