Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    A Cyber-Attack Detection System Using Late Fusion Aggregation Enabled Cyber-Net

    P. Shanmuga Prabha*, S. Magesh Kumar

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3101-3119, 2023, DOI:10.32604/iasc.2023.034885

    Abstract Today, securing devices connected to the internet is challenging as security threats are generated through various sources. The protection of cyber-physical systems from external attacks is a primary task. The presented method is planned on the prime motive of detecting cybersecurity attacks and their impacted parameters. The proposed architecture employs the LYSIS dataset and formulates Multi Variant Exploratory Data Analysis (MEDA) through Principle Component Analysis (PCA) and Singular Value Decomposition (SVD) for the extraction of unique parameters. The feature mappings are analyzed with Recurrent 2 Convolutional Neural Network (R2CNN) and Gradient Boost Regression (GBR) to identify the maximum correlation. Novel… More >

  • Open Access

    ARTICLE

    Aquila Optimization with Machine Learning-Based Anomaly Detection Technique in Cyber-Physical Systems

    A. Ramachandran1,*, K. Gayathri2, Ahmed Alkhayyat3, Rami Q. Malik4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2177-2194, 2023, DOI:10.32604/csse.2023.034438

    Abstract Cyber-physical system (CPS) is a concept that integrates every computer-driven system interacting closely with its physical environment. Internet-of-things (IoT) is a union of devices and technologies that provide universal interconnection mechanisms between the physical and digital worlds. Since the complexity level of the CPS increases, an adversary attack becomes possible in several ways. Assuring security is a vital aspect of the CPS environment. Due to the massive surge in the data size, the design of anomaly detection techniques becomes a challenging issue, and domain-specific knowledge can be applied to resolve it. This article develops an Aquila Optimizer with Parameter Tuned… More >

  • Open Access

    ARTICLE

    Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things

    Ahmad O. Aseeri1, Sajjad Hussain Chauhdary2,*, Mohammed Saeed Alkatheiri3, Mohammed A. Alqarni4, Yu Zhuang5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1901-1918, 2023, DOI:10.32604/cmc.2023.028777

    Abstract IoT devices rely on authentication mechanisms to render secure message exchange. During data transmission, scalability, data integrity, and processing time have been considered challenging aspects for a system constituted by IoT devices. The application of physical unclonable functions (PUFs) ensures secure data transmission among the internet of things (IoT) devices in a simplified network with an efficient time-stamped agreement. This paper proposes a secure, lightweight, cost-efficient reinforcement machine learning framework (SLCR-MLF) to achieve decentralization and security, thus enabling scalability, data integrity, and optimized processing time in IoT devices. PUF has been integrated into SLCR-MLF to improve the security of the… More >

  • Open Access

    ARTICLE

    Physical Layer Authentication Using Ensemble Learning Technique in Wireless Communications

    Muhammad Waqas1,3,*, Shehr Bano2, Fatima Hassan2, Shanshan Tu1, Ghulam Abbas2, Ziaul Haq Abbas4

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4489-4499, 2022, DOI:10.32604/cmc.2022.029539

    Abstract Cyber-physical wireless systems have surfaced as an important data communication and networking research area. It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies. Due to their high reliability, sensitivity and connectivity, their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping, spoofing, botnets, man-in-the-middle attack, denial of service (DoS) and distributed denial of service (DDoS) and impersonation. Existing methods use physical layer authentication (PLA), the most promising solution to detect… More >

  • Open Access

    ARTICLE

    Chaotic Sandpiper Optimization Based Virtual Machine Scheduling for Cyber-Physical Systems

    P. Ramadevi1,*, T. Jayasankar1, V. Dinesh2, M. Dhamodaran3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1373-1385, 2023, DOI:10.32604/csse.2023.026603

    Abstract Recently, with the growth of cyber physical systems (CPS), several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively. Besides, the cloud computing (CC) enabled CPS offers huge processing and storage resources for CPS that finds helpful for a range of application areas. At the same time, with the massive development of applications that exist in the CPS environment, the energy utilization of the cloud enabled CPS has gained significant interest. For improving the energy effectiveness of the CC platform, virtualization technologies have been employed for resource management and the applications… More >

  • Open Access

    ARTICLE

    A Novel Anomaly Detection Method in Sensor Based Cyber-Physical Systems

    K. Muthulakshmi1,*, N. Krishnaraj2, R. S. Ravi Sankar3, A. Balakumar4, S. Kanimozhi5, B. Kiruthika6

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2083-2096, 2022, DOI:10.32604/iasc.2022.026628

    Abstract In recent times, Cyber-physical system (CPS) integrates the cyber systems and physical world for performing critical processes that are started from the development in digital electronics. The sensors deployed in CPS are commonly employed for monitoring and controlling processes that are susceptible to anomalies. For identifying and detecting anomalies, an effective anomaly detection system (ADS) is developed. But ADS faces high false alarms and miss detection rate, which led to the degraded performance in CPS applications. This study develops a novel deep learning (DL) approach for anomaly detection in sensor-based CPS using Bidirectional Long Short Term Memory with Red Deer… More >

  • Open Access

    ARTICLE

    Optimal Machine Learning Enabled Intrusion Detection in Cyber-Physical System Environment

    Bassam A. Y. Alqaralleh1,*, Fahad Aldhaban1, Esam A. AlQarallehs2, Ahmad H. Al-Omari3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4691-4707, 2022, DOI:10.32604/cmc.2022.026556

    Abstract Cyber-attacks on cyber-physical systems (CPSs) resulted to sensing and actuation misbehavior, severe damage to physical object, and safety risk. Machine learning (ML) models have been presented to hinder cyberattacks on the CPS environment; however, the non-existence of labelled data from new attacks makes their detection quite interesting. Intrusion Detection System (IDS) is a commonly utilized to detect and classify the existence of intrusions in the CPS environment, which acts as an important part in secure CPS environment. Latest developments in deep learning (DL) and explainable artificial intelligence (XAI) stimulate new IDSs to manage cyberattacks with minimum complexity and high sophistication.… More >

  • Open Access

    ARTICLE

    Energy Aware Secure Cyber-Physical Systems with Clustered Wireless Sensor Networks

    Masoud Alajmi1, Mohamed K. Nour2, Siwar Ben Haj Hassine3, Mimouna Abdullah Alkhonaini4, Manar Ahmed Hamza5,*, Ishfaq Yaseen5, Abu Sarwar Zamani5, Mohammed Rizwanullah5

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5499-5513, 2022, DOI:10.32604/cmc.2022.026187

    Abstract Recently, cyber physical system (CPS) has gained significant attention which mainly depends upon an effective collaboration with computation and physical components. The greatly interrelated and united characteristics of CPS resulting in the development of cyber physical energy systems (CPES). At the same time, the rising ubiquity of wireless sensor networks (WSN) in several application areas makes it a vital part of the design of CPES. Since security and energy efficiency are the major challenging issues in CPES, this study offers an energy aware secure cyber physical systems with clustered wireless sensor networks using metaheuristic algorithms (EASCPS-MA). The presented EASCPS-MA technique… More >

  • Open Access

    ARTICLE

    A Triple Human-Digital Twin Architecture for Cyber-Physical Systems

    Duansen Shangguan*, Liping Chen, Chang Su, Jianwan Ding, Chan Liu

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1557-1578, 2022, DOI:10.32604/cmes.2022.018979

    Abstract With the development of information and communication technology and the advent of the Internet of Things (IoT) era, cyber-physical system (CPS) is becoming the trend of products or systems. The deep integration and real-time interaction between the physical world and the virtual world expand system functions. Although there are some CPS implementation guidelines, the virtual world is still relatively abstract compared to the concrete physical world that can be touched through the IoT. Besides that, human is a non-negligible CPS endogenous interactive intelligent component. In this paper, we propose a triple human-digital twin architecture, where the physical objects and the… More >

  • Open Access

    ARTICLE

    Fault Management Cyber-Physical Systems in Virtual Storage Model

    Kailash Kumar*, Ahmad Abdullah Aljabr

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3781-3801, 2022, DOI:10.32604/cmc.2022.020510

    Abstract On average, every two years, the amount of data existing globally doubles. Software development will be affected and improved by Cyber-Physical Systems (CPS). The number of problems remained even though developments helped Information Technology experts extract better value from their storage investments. Because of poor interoperability between different vendors and devices, countless numbers of Storage Area Networks were created. Network setup used for data storage includes a complex and rigid arrangement of routers, switch, hosts/servers, storage arrays. We have evaluated the performance of routing protocol Transmission Control Protocol (TCP) and Fibre Channel Protocol (FCP) under different network scenario by Network… More >

Displaying 1-10 on page 1 of 12. Per Page  

Share Link