Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (14)
  • Open Access

    ARTICLE

    Hybrid Algorithm-Driven Smart Logistics Optimization in IoT-Based Cyber-Physical Systems

    Abdulwahab Ali Almazroi1,*, Nasir Ayub2

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3921-3942, 2023, DOI:10.32604/cmc.2023.046602

    Abstract Effectively managing complex logistics data is essential for development sustainability and growth, especially in optimizing distribution routes. This article addresses the limitations of current logistics path optimization methods, such as inefficiencies and high operational costs. To overcome these drawbacks, we introduce the Hybrid Firefly-Spotted Hyena Optimization (HFSHO) algorithm, a novel approach that combines the rapid exploration and global search abilities of the Firefly Algorithm (FO) with the localized search and region-exploitation skills of the Spotted Hyena Optimization Algorithm (SHO). HFSHO aims to improve logistics path optimization and reduce operational costs. The algorithm’s effectiveness is systematically assessed through rigorous comparative analyses… More >

  • Open Access

    ARTICLE

    Stochastic Models to Mitigate Sparse Sensor Attacks in Continuous-Time Non-Linear Cyber-Physical Systems

    Borja Bordel Sánchez1,*, Ramón Alcarria2, Tomás Robles1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3189-3218, 2023, DOI:10.32604/cmc.2023.039466

    Abstract Cyber-Physical Systems are very vulnerable to sparse sensor attacks. But current protection mechanisms employ linear and deterministic models which cannot detect attacks precisely. Therefore, in this paper, we propose a new non-linear generalized model to describe Cyber-Physical Systems. This model includes unknown multivariable discrete and continuous-time functions and different multiplicative noises to represent the evolution of physical processes and random effects in the physical and computational worlds. Besides, the digitalization stage in hardware devices is represented too. Attackers and most critical sparse sensor attacks are described through a stochastic process. The reconstruction and protection mechanisms are based on a weighted… More >

  • Open Access

    ARTICLE

    A Cyber-Attack Detection System Using Late Fusion Aggregation Enabled Cyber-Net

    P. Shanmuga Prabha*, S. Magesh Kumar

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3101-3119, 2023, DOI:10.32604/iasc.2023.034885

    Abstract Today, securing devices connected to the internet is challenging as security threats are generated through various sources. The protection of cyber-physical systems from external attacks is a primary task. The presented method is planned on the prime motive of detecting cybersecurity attacks and their impacted parameters. The proposed architecture employs the LYSIS dataset and formulates Multi Variant Exploratory Data Analysis (MEDA) through Principle Component Analysis (PCA) and Singular Value Decomposition (SVD) for the extraction of unique parameters. The feature mappings are analyzed with Recurrent 2 Convolutional Neural Network (R2CNN) and Gradient Boost Regression (GBR) to identify the maximum correlation. Novel… More >

  • Open Access

    ARTICLE

    Aquila Optimization with Machine Learning-Based Anomaly Detection Technique in Cyber-Physical Systems

    A. Ramachandran1,*, K. Gayathri2, Ahmed Alkhayyat3, Rami Q. Malik4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2177-2194, 2023, DOI:10.32604/csse.2023.034438

    Abstract Cyber-physical system (CPS) is a concept that integrates every computer-driven system interacting closely with its physical environment. Internet-of-things (IoT) is a union of devices and technologies that provide universal interconnection mechanisms between the physical and digital worlds. Since the complexity level of the CPS increases, an adversary attack becomes possible in several ways. Assuring security is a vital aspect of the CPS environment. Due to the massive surge in the data size, the design of anomaly detection techniques becomes a challenging issue, and domain-specific knowledge can be applied to resolve it. This article develops an Aquila Optimizer with Parameter Tuned… More >

  • Open Access

    ARTICLE

    Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things

    Ahmad O. Aseeri1, Sajjad Hussain Chauhdary2,*, Mohammed Saeed Alkatheiri3, Mohammed A. Alqarni4, Yu Zhuang5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1901-1918, 2023, DOI:10.32604/cmc.2023.028777

    Abstract IoT devices rely on authentication mechanisms to render secure message exchange. During data transmission, scalability, data integrity, and processing time have been considered challenging aspects for a system constituted by IoT devices. The application of physical unclonable functions (PUFs) ensures secure data transmission among the internet of things (IoT) devices in a simplified network with an efficient time-stamped agreement. This paper proposes a secure, lightweight, cost-efficient reinforcement machine learning framework (SLCR-MLF) to achieve decentralization and security, thus enabling scalability, data integrity, and optimized processing time in IoT devices. PUF has been integrated into SLCR-MLF to improve the security of the… More >

  • Open Access

    ARTICLE

    Physical Layer Authentication Using Ensemble Learning Technique in Wireless Communications

    Muhammad Waqas1,3,*, Shehr Bano2, Fatima Hassan2, Shanshan Tu1, Ghulam Abbas2, Ziaul Haq Abbas4

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4489-4499, 2022, DOI:10.32604/cmc.2022.029539

    Abstract Cyber-physical wireless systems have surfaced as an important data communication and networking research area. It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies. Due to their high reliability, sensitivity and connectivity, their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping, spoofing, botnets, man-in-the-middle attack, denial of service (DoS) and distributed denial of service (DDoS) and impersonation. Existing methods use physical layer authentication (PLA), the most promising solution to detect… More >

  • Open Access

    ARTICLE

    Chaotic Sandpiper Optimization Based Virtual Machine Scheduling for Cyber-Physical Systems

    P. Ramadevi1,*, T. Jayasankar1, V. Dinesh2, M. Dhamodaran3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1373-1385, 2023, DOI:10.32604/csse.2023.026603

    Abstract Recently, with the growth of cyber physical systems (CPS), several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively. Besides, the cloud computing (CC) enabled CPS offers huge processing and storage resources for CPS that finds helpful for a range of application areas. At the same time, with the massive development of applications that exist in the CPS environment, the energy utilization of the cloud enabled CPS has gained significant interest. For improving the energy effectiveness of the CC platform, virtualization technologies have been employed for resource management and the applications… More >

  • Open Access

    ARTICLE

    A Novel Anomaly Detection Method in Sensor Based Cyber-Physical Systems

    K. Muthulakshmi1,*, N. Krishnaraj2, R. S. Ravi Sankar3, A. Balakumar4, S. Kanimozhi5, B. Kiruthika6

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2083-2096, 2022, DOI:10.32604/iasc.2022.026628

    Abstract In recent times, Cyber-physical system (CPS) integrates the cyber systems and physical world for performing critical processes that are started from the development in digital electronics. The sensors deployed in CPS are commonly employed for monitoring and controlling processes that are susceptible to anomalies. For identifying and detecting anomalies, an effective anomaly detection system (ADS) is developed. But ADS faces high false alarms and miss detection rate, which led to the degraded performance in CPS applications. This study develops a novel deep learning (DL) approach for anomaly detection in sensor-based CPS using Bidirectional Long Short Term Memory with Red Deer… More >

  • Open Access

    ARTICLE

    Optimal Machine Learning Enabled Intrusion Detection in Cyber-Physical System Environment

    Bassam A. Y. Alqaralleh1,*, Fahad Aldhaban1, Esam A. AlQarallehs2, Ahmad H. Al-Omari3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4691-4707, 2022, DOI:10.32604/cmc.2022.026556

    Abstract Cyber-attacks on cyber-physical systems (CPSs) resulted to sensing and actuation misbehavior, severe damage to physical object, and safety risk. Machine learning (ML) models have been presented to hinder cyberattacks on the CPS environment; however, the non-existence of labelled data from new attacks makes their detection quite interesting. Intrusion Detection System (IDS) is a commonly utilized to detect and classify the existence of intrusions in the CPS environment, which acts as an important part in secure CPS environment. Latest developments in deep learning (DL) and explainable artificial intelligence (XAI) stimulate new IDSs to manage cyberattacks with minimum complexity and high sophistication.… More >

  • Open Access

    ARTICLE

    Energy Aware Secure Cyber-Physical Systems with Clustered Wireless Sensor Networks

    Masoud Alajmi1, Mohamed K. Nour2, Siwar Ben Haj Hassine3, Mimouna Abdullah Alkhonaini4, Manar Ahmed Hamza5,*, Ishfaq Yaseen5, Abu Sarwar Zamani5, Mohammed Rizwanullah5

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5499-5513, 2022, DOI:10.32604/cmc.2022.026187

    Abstract Recently, cyber physical system (CPS) has gained significant attention which mainly depends upon an effective collaboration with computation and physical components. The greatly interrelated and united characteristics of CPS resulting in the development of cyber physical energy systems (CPES). At the same time, the rising ubiquity of wireless sensor networks (WSN) in several application areas makes it a vital part of the design of CPES. Since security and energy efficiency are the major challenging issues in CPES, this study offers an energy aware secure cyber physical systems with clustered wireless sensor networks using metaheuristic algorithms (EASCPS-MA). The presented EASCPS-MA technique… More >

Displaying 1-10 on page 1 of 14. Per Page