Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (16)
  • Open Access

    REVIEW

    A Review on Security and Privacy Issues Pertaining to Cyber-Physical Systems in the Industry 5.0 Era

    Abdullah Alabdulatif1, Navod Neranjan Thilakarathne2,*, Zaharaddeen Karami Lawal3,4,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3917-3943, 2024, DOI:10.32604/cmc.2024.054150 - 12 September 2024

    Abstract The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems (CPSs) seamlessly integrate physical processes with advanced digital technologies. However, as industries become increasingly interconnected and reliant on smart digital technologies, the intersection of physical and cyber domains introduces novel security considerations, endangering the entire industrial ecosystem. The transition towards a more cooperative setting, including humans and machines in Industry 5.0, together with the growing intricacy and interconnection of CPSs, presents distinct and diverse security and privacy challenges. In this regard, this study provides a comprehensive review of security and privacy concerns pertaining… More >

  • Open Access

    ARTICLE

    Analysis and Modeling of Mobile Phone Activity Data Using Interactive Cyber-Physical Social System

    Farhan Amin, Gyu Sang Choi*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3507-3521, 2024, DOI:10.32604/cmc.2024.053183 - 12 September 2024

    Abstract Mobile networks possess significant information and thus are considered a gold mine for the researcher’s community. The call detail records (CDR) of a mobile network are used to identify the network’s efficacy and the mobile user’s behavior. It is evident from the recent literature that cyber-physical systems (CPS) were used in the analytics and modeling of telecom data. In addition, CPS is used to provide valuable services in smart cities. In general, a typical telecom company has millions of subscribers and thus generates massive amounts of data. From this aspect, data storage, analysis, and processing… More >

  • Open Access

    ARTICLE

    Hybrid Algorithm-Driven Smart Logistics Optimization in IoT-Based Cyber-Physical Systems

    Abdulwahab Ali Almazroi1,*, Nasir Ayub2

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3921-3942, 2023, DOI:10.32604/cmc.2023.046602 - 26 December 2023

    Abstract Effectively managing complex logistics data is essential for development sustainability and growth, especially in optimizing distribution routes. This article addresses the limitations of current logistics path optimization methods, such as inefficiencies and high operational costs. To overcome these drawbacks, we introduce the Hybrid Firefly-Spotted Hyena Optimization (HFSHO) algorithm, a novel approach that combines the rapid exploration and global search abilities of the Firefly Algorithm (FO) with the localized search and region-exploitation skills of the Spotted Hyena Optimization Algorithm (SHO). HFSHO aims to improve logistics path optimization and reduce operational costs. The algorithm’s effectiveness is systematically… More >

  • Open Access

    ARTICLE

    Stochastic Models to Mitigate Sparse Sensor Attacks in Continuous-Time Non-Linear Cyber-Physical Systems

    Borja Bordel Sánchez1,*, Ramón Alcarria2, Tomás Robles1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3189-3218, 2023, DOI:10.32604/cmc.2023.039466 - 08 October 2023

    Abstract Cyber-Physical Systems are very vulnerable to sparse sensor attacks. But current protection mechanisms employ linear and deterministic models which cannot detect attacks precisely. Therefore, in this paper, we propose a new non-linear generalized model to describe Cyber-Physical Systems. This model includes unknown multivariable discrete and continuous-time functions and different multiplicative noises to represent the evolution of physical processes and random effects in the physical and computational worlds. Besides, the digitalization stage in hardware devices is represented too. Attackers and most critical sparse sensor attacks are described through a stochastic process. The reconstruction and protection mechanisms… More >

  • Open Access

    ARTICLE

    A Cyber-Attack Detection System Using Late Fusion Aggregation Enabled Cyber-Net

    P. Shanmuga Prabha*, S. Magesh Kumar

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3101-3119, 2023, DOI:10.32604/iasc.2023.034885 - 15 March 2023

    Abstract Today, securing devices connected to the internet is challenging as security threats are generated through various sources. The protection of cyber-physical systems from external attacks is a primary task. The presented method is planned on the prime motive of detecting cybersecurity attacks and their impacted parameters. The proposed architecture employs the LYSIS dataset and formulates Multi Variant Exploratory Data Analysis (MEDA) through Principle Component Analysis (PCA) and Singular Value Decomposition (SVD) for the extraction of unique parameters. The feature mappings are analyzed with Recurrent 2 Convolutional Neural Network (R2CNN) and Gradient Boost Regression (GBR) to More >

  • Open Access

    ARTICLE

    Aquila Optimization with Machine Learning-Based Anomaly Detection Technique in Cyber-Physical Systems

    A. Ramachandran1,*, K. Gayathri2, Ahmed Alkhayyat3, Rami Q. Malik4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2177-2194, 2023, DOI:10.32604/csse.2023.034438 - 09 February 2023

    Abstract Cyber-physical system (CPS) is a concept that integrates every computer-driven system interacting closely with its physical environment. Internet-of-things (IoT) is a union of devices and technologies that provide universal interconnection mechanisms between the physical and digital worlds. Since the complexity level of the CPS increases, an adversary attack becomes possible in several ways. Assuring security is a vital aspect of the CPS environment. Due to the massive surge in the data size, the design of anomaly detection techniques becomes a challenging issue, and domain-specific knowledge can be applied to resolve it. This article develops an… More >

  • Open Access

    ARTICLE

    Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things

    Ahmad O. Aseeri1, Sajjad Hussain Chauhdary2,*, Mohammed Saeed Alkatheiri3, Mohammed A. Alqarni4, Yu Zhuang5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1901-1918, 2023, DOI:10.32604/cmc.2023.028777 - 06 February 2023

    Abstract IoT devices rely on authentication mechanisms to render secure message exchange. During data transmission, scalability, data integrity, and processing time have been considered challenging aspects for a system constituted by IoT devices. The application of physical unclonable functions (PUFs) ensures secure data transmission among the internet of things (IoT) devices in a simplified network with an efficient time-stamped agreement. This paper proposes a secure, lightweight, cost-efficient reinforcement machine learning framework (SLCR-MLF) to achieve decentralization and security, thus enabling scalability, data integrity, and optimized processing time in IoT devices. PUF has been integrated into SLCR-MLF to… More >

  • Open Access

    ARTICLE

    Chaotic Sandpiper Optimization Based Virtual Machine Scheduling for Cyber-Physical Systems

    P. Ramadevi1,*, T. Jayasankar1, V. Dinesh2, M. Dhamodaran3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1373-1385, 2023, DOI:10.32604/csse.2023.026603 - 15 June 2022

    Abstract Recently, with the growth of cyber physical systems (CPS), several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively. Besides, the cloud computing (CC) enabled CPS offers huge processing and storage resources for CPS that finds helpful for a range of application areas. At the same time, with the massive development of applications that exist in the CPS environment, the energy utilization of the cloud enabled CPS has gained significant interest. For improving the energy effectiveness of the CC platform, virtualization technologies have been employed for… More >

  • Open Access

    ARTICLE

    Physical Layer Authentication Using Ensemble Learning Technique in Wireless Communications

    Muhammad Waqas1,3,*, Shehr Bano2, Fatima Hassan2, Shanshan Tu1, Ghulam Abbas2, Ziaul Haq Abbas4

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4489-4499, 2022, DOI:10.32604/cmc.2022.029539 - 28 July 2022

    Abstract Cyber-physical wireless systems have surfaced as an important data communication and networking research area. It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies. Due to their high reliability, sensitivity and connectivity, their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping, spoofing, botnets, man-in-the-middle attack, denial of service (DoS) and distributed denial of service (DDoS) and impersonation. Existing methods use physical layer authentication (PLA), the… More >

  • Open Access

    ARTICLE

    A Novel Anomaly Detection Method in Sensor Based Cyber-Physical Systems

    K. Muthulakshmi1,*, N. Krishnaraj2, R. S. Ravi Sankar3, A. Balakumar4, S. Kanimozhi5, B. Kiruthika6

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2083-2096, 2022, DOI:10.32604/iasc.2022.026628 - 25 May 2022

    Abstract In recent times, Cyber-physical system (CPS) integrates the cyber systems and physical world for performing critical processes that are started from the development in digital electronics. The sensors deployed in CPS are commonly employed for monitoring and controlling processes that are susceptible to anomalies. For identifying and detecting anomalies, an effective anomaly detection system (ADS) is developed. But ADS faces high false alarms and miss detection rate, which led to the degraded performance in CPS applications. This study develops a novel deep learning (DL) approach for anomaly detection in sensor-based CPS using Bidirectional Long Short… More >

Displaying 1-10 on page 1 of 16. Per Page