Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

All Works

2023

Intrusion detection

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Self-Healing In Cyber–Physical Systems Using Machine Learning: A Critical Analysis Of Theories And Tools, Obinna Johnphill, Ali Safaa Sadiq, Feras Al-Obeidat, Haider Al-Khateeb, Mohammed Adam Taheir, Omprakash Kaiwartya, Mohammed Ali Jul 2023

Self-Healing In Cyber–Physical Systems Using Machine Learning: A Critical Analysis Of Theories And Tools, Obinna Johnphill, Ali Safaa Sadiq, Feras Al-Obeidat, Haider Al-Khateeb, Mohammed Adam Taheir, Omprakash Kaiwartya, Mohammed Ali

All Works

The rapid advancement of networking, computing, sensing, and control systems has introduced a wide range of cyber threats, including those from new devices deployed during the development of scenarios. With recent advancements in automobiles, medical devices, smart industrial systems, and other technologies, system failures resulting from external attacks or internal process malfunctions are increasingly common. Restoring the system’s stable state requires autonomous intervention through the self-healing process to maintain service quality. This paper, therefore, aims to analyse state of the art and identify where self-healing using machine learning can be applied to cyber–physical systems to enhance security and prevent failures …


A Fog Computing Framework For Intrusion Detection Of Energy-Based Attacks On Uav-Assisted Smart Farming, Junaid Sajid, Kadhim Hayawi, Asad Waqar Malik, Zahid Anwar, Zouheir Trabelsi Mar 2023

A Fog Computing Framework For Intrusion Detection Of Energy-Based Attacks On Uav-Assisted Smart Farming, Junaid Sajid, Kadhim Hayawi, Asad Waqar Malik, Zahid Anwar, Zouheir Trabelsi

All Works

Precision agriculture and smart farming have received significant attention due to the advancements made in remote sensing technology to support agricultural efficiency. In large-scale agriculture, the role of unmanned aerial vehicles (UAVs) has increased in remote monitoring and collecting farm data at regular intervals. However, due to an open environment, UAVs can be hacked to malfunction and report false data. Due to limited battery life and flight times requiring frequent recharging, a compromised UAV wastes precious energy when performing unnecessary functions. Furthermore, it impacts other UAVs competing for charging times at the station, thus disrupting the entire data collection mechanism. …