Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Physical Sciences and Mathematics
Self-Healing In Cyber–Physical Systems Using Machine Learning: A Critical Analysis Of Theories And Tools, Obinna Johnphill, Ali Safaa Sadiq, Feras Al-Obeidat, Haider Al-Khateeb, Mohammed Adam Taheir, Omprakash Kaiwartya, Mohammed Ali
Self-Healing In Cyber–Physical Systems Using Machine Learning: A Critical Analysis Of Theories And Tools, Obinna Johnphill, Ali Safaa Sadiq, Feras Al-Obeidat, Haider Al-Khateeb, Mohammed Adam Taheir, Omprakash Kaiwartya, Mohammed Ali
All Works
The rapid advancement of networking, computing, sensing, and control systems has introduced a wide range of cyber threats, including those from new devices deployed during the development of scenarios. With recent advancements in automobiles, medical devices, smart industrial systems, and other technologies, system failures resulting from external attacks or internal process malfunctions are increasingly common. Restoring the system’s stable state requires autonomous intervention through the self-healing process to maintain service quality. This paper, therefore, aims to analyse state of the art and identify where self-healing using machine learning can be applied to cyber–physical systems to enhance security and prevent failures …
A Fog Computing Framework For Intrusion Detection Of Energy-Based Attacks On Uav-Assisted Smart Farming, Junaid Sajid, Kadhim Hayawi, Asad Waqar Malik, Zahid Anwar, Zouheir Trabelsi
A Fog Computing Framework For Intrusion Detection Of Energy-Based Attacks On Uav-Assisted Smart Farming, Junaid Sajid, Kadhim Hayawi, Asad Waqar Malik, Zahid Anwar, Zouheir Trabelsi
All Works
Precision agriculture and smart farming have received significant attention due to the advancements made in remote sensing technology to support agricultural efficiency. In large-scale agriculture, the role of unmanned aerial vehicles (UAVs) has increased in remote monitoring and collecting farm data at regular intervals. However, due to an open environment, UAVs can be hacked to malfunction and report false data. Due to limited battery life and flight times requiring frequent recharging, a compromised UAV wastes precious energy when performing unnecessary functions. Furthermore, it impacts other UAVs competing for charging times at the station, thus disrupting the entire data collection mechanism. …