Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (19)
  • Open Access

    REVIEW

    A Review on Security and Privacy Issues Pertaining to Cyber-Physical Systems in the Industry 5.0 Era

    Abdullah Alabdulatif1, Navod Neranjan Thilakarathne2,*, Zaharaddeen Karami Lawal3,4,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3917-3943, 2024, DOI:10.32604/cmc.2024.054150 - 12 September 2024

    Abstract The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems (CPSs) seamlessly integrate physical processes with advanced digital technologies. However, as industries become increasingly interconnected and reliant on smart digital technologies, the intersection of physical and cyber domains introduces novel security considerations, endangering the entire industrial ecosystem. The transition towards a more cooperative setting, including humans and machines in Industry 5.0, together with the growing intricacy and interconnection of CPSs, presents distinct and diverse security and privacy challenges. In this regard, this study provides a comprehensive review of security and privacy concerns pertaining… More >

  • Open Access

    ARTICLE

    Analysis and Modeling of Mobile Phone Activity Data Using Interactive Cyber-Physical Social System

    Farhan Amin, Gyu Sang Choi*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3507-3521, 2024, DOI:10.32604/cmc.2024.053183 - 12 September 2024

    Abstract Mobile networks possess significant information and thus are considered a gold mine for the researcher’s community. The call detail records (CDR) of a mobile network are used to identify the network’s efficacy and the mobile user’s behavior. It is evident from the recent literature that cyber-physical systems (CPS) were used in the analytics and modeling of telecom data. In addition, CPS is used to provide valuable services in smart cities. In general, a typical telecom company has millions of subscribers and thus generates massive amounts of data. From this aspect, data storage, analysis, and processing… More >

  • Open Access

    ARTICLE

    Security Analysis in Smart Agriculture: Insights from a Cyber-Physical System Application

    Ahmed Redha Mahlous*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4781-4803, 2024, DOI:10.32604/cmc.2024.050821 - 20 June 2024

    Abstract Smart agriculture modifies traditional farming practices, and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies. In today’s world where technology is everything, these technologies are utilized to streamline regular tasks and procedures in agriculture, one of the largest and most significant industries in every nation. This research paper stands out from existing literature on smart agriculture security by providing a comprehensive analysis and examination of security issues within smart agriculture systems. Divided into three main sections—security analysis, system architecture and design and risk assessment of Cyber-Physical Systems (CPS) applications—the study delves… More >

  • Open Access

    ARTICLE

    Hybrid Algorithm-Driven Smart Logistics Optimization in IoT-Based Cyber-Physical Systems

    Abdulwahab Ali Almazroi1,*, Nasir Ayub2

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3921-3942, 2023, DOI:10.32604/cmc.2023.046602 - 26 December 2023

    Abstract Effectively managing complex logistics data is essential for development sustainability and growth, especially in optimizing distribution routes. This article addresses the limitations of current logistics path optimization methods, such as inefficiencies and high operational costs. To overcome these drawbacks, we introduce the Hybrid Firefly-Spotted Hyena Optimization (HFSHO) algorithm, a novel approach that combines the rapid exploration and global search abilities of the Firefly Algorithm (FO) with the localized search and region-exploitation skills of the Spotted Hyena Optimization Algorithm (SHO). HFSHO aims to improve logistics path optimization and reduce operational costs. The algorithm’s effectiveness is systematically… More >

  • Open Access

    ARTICLE

    Stochastic Models to Mitigate Sparse Sensor Attacks in Continuous-Time Non-Linear Cyber-Physical Systems

    Borja Bordel Sánchez1,*, Ramón Alcarria2, Tomás Robles1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3189-3218, 2023, DOI:10.32604/cmc.2023.039466 - 08 October 2023

    Abstract Cyber-Physical Systems are very vulnerable to sparse sensor attacks. But current protection mechanisms employ linear and deterministic models which cannot detect attacks precisely. Therefore, in this paper, we propose a new non-linear generalized model to describe Cyber-Physical Systems. This model includes unknown multivariable discrete and continuous-time functions and different multiplicative noises to represent the evolution of physical processes and random effects in the physical and computational worlds. Besides, the digitalization stage in hardware devices is represented too. Attackers and most critical sparse sensor attacks are described through a stochastic process. The reconstruction and protection mechanisms… More >

  • Open Access

    ARTICLE

    A Deep CNN-LSTM-Based Feature Extraction for Cyber-Physical System Monitoring

    Alaa Omran Almagrabi*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2079-2093, 2023, DOI:10.32604/cmc.2023.039683 - 30 August 2023

    Abstract A potential concept that could be effective for multiple applications is a “cyber-physical system” (CPS). The Internet of Things (IoT) has evolved as a research area, presenting new challenges in obtaining valuable data through environmental monitoring. The existing work solely focuses on classifying the audio system of CPS without utilizing feature extraction. This study employs a deep learning method, CNN-LSTM, and two-way feature extraction to classify audio systems within CPS. The primary objective of this system, which is built upon a convolutional neural network (CNN) with Long Short Term Memory (LSTM), is to analyze the… More >

  • Open Access

    ARTICLE

    A Cyber-Attack Detection System Using Late Fusion Aggregation Enabled Cyber-Net

    P. Shanmuga Prabha*, S. Magesh Kumar

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3101-3119, 2023, DOI:10.32604/iasc.2023.034885 - 15 March 2023

    Abstract Today, securing devices connected to the internet is challenging as security threats are generated through various sources. The protection of cyber-physical systems from external attacks is a primary task. The presented method is planned on the prime motive of detecting cybersecurity attacks and their impacted parameters. The proposed architecture employs the LYSIS dataset and formulates Multi Variant Exploratory Data Analysis (MEDA) through Principle Component Analysis (PCA) and Singular Value Decomposition (SVD) for the extraction of unique parameters. The feature mappings are analyzed with Recurrent 2 Convolutional Neural Network (R2CNN) and Gradient Boost Regression (GBR) to More >

  • Open Access

    ARTICLE

    Aquila Optimization with Machine Learning-Based Anomaly Detection Technique in Cyber-Physical Systems

    A. Ramachandran1,*, K. Gayathri2, Ahmed Alkhayyat3, Rami Q. Malik4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2177-2194, 2023, DOI:10.32604/csse.2023.034438 - 09 February 2023

    Abstract Cyber-physical system (CPS) is a concept that integrates every computer-driven system interacting closely with its physical environment. Internet-of-things (IoT) is a union of devices and technologies that provide universal interconnection mechanisms between the physical and digital worlds. Since the complexity level of the CPS increases, an adversary attack becomes possible in several ways. Assuring security is a vital aspect of the CPS environment. Due to the massive surge in the data size, the design of anomaly detection techniques becomes a challenging issue, and domain-specific knowledge can be applied to resolve it. This article develops an… More >

  • Open Access

    ARTICLE

    Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things

    Ahmad O. Aseeri1, Sajjad Hussain Chauhdary2,*, Mohammed Saeed Alkatheiri3, Mohammed A. Alqarni4, Yu Zhuang5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1901-1918, 2023, DOI:10.32604/cmc.2023.028777 - 06 February 2023

    Abstract IoT devices rely on authentication mechanisms to render secure message exchange. During data transmission, scalability, data integrity, and processing time have been considered challenging aspects for a system constituted by IoT devices. The application of physical unclonable functions (PUFs) ensures secure data transmission among the internet of things (IoT) devices in a simplified network with an efficient time-stamped agreement. This paper proposes a secure, lightweight, cost-efficient reinforcement machine learning framework (SLCR-MLF) to achieve decentralization and security, thus enabling scalability, data integrity, and optimized processing time in IoT devices. PUF has been integrated into SLCR-MLF to… More >

  • Open Access

    ARTICLE

    Chaotic Sandpiper Optimization Based Virtual Machine Scheduling for Cyber-Physical Systems

    P. Ramadevi1,*, T. Jayasankar1, V. Dinesh2, M. Dhamodaran3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1373-1385, 2023, DOI:10.32604/csse.2023.026603 - 15 June 2022

    Abstract Recently, with the growth of cyber physical systems (CPS), several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively. Besides, the cloud computing (CC) enabled CPS offers huge processing and storage resources for CPS that finds helpful for a range of application areas. At the same time, with the massive development of applications that exist in the CPS environment, the energy utilization of the cloud enabled CPS has gained significant interest. For improving the energy effectiveness of the CC platform, virtualization technologies have been employed for… More >

Displaying 1-10 on page 1 of 19. Per Page