Intelligent Systems and Cybersecurity

A special issue of Systems (ISSN 2079-8954). This special issue belongs to the section "Systems Engineering".

Deadline for manuscript submissions: 20 March 2024 | Viewed by 7172

Special Issue Editors

2AI—School of Technology, Instituto Politécnico do Cávado e do Ave, 4750-810 Barcelos, Portugal
Interests: parallel and distributed systems; cyberphysical production systems; production scheduling algorithms; artificial intelligence in cybersecurity
2AI—School of Technology, Instituto Politécnico do Cávado e do Ave, 4750-810 Barcelos, Portugal
Interests: intelligent systems; health systems; machine learning; data science

Special Issue Information

Dear Colleagues,

Intelligent systems are improving our ordinary life through the means of cyberphysical systems, a classical system where physical resources influence computer resources and vice versa, or pure cyber systems, such as cloud computing systems, which consist in computers that process data in remote data centers reachable by mobile devices on the Internet. Both types of systems, cyberphysical and cyber, can make use of artificial intelligence to improve the system outcome. Achieving physical feats such as self-driving cars or cyber-based social impacts such as real-time text translation of pictures in multiple languages are outcomes that would otherwise not be possible if using traditional algorithms.

Although new intelligent algorithms are being developed, there are still some challenges that must be tackled to have a successful working system. Cybersecurity relates to the properties (consider, for example confidentiality, integrity and availability, among others) of the system to maintain its correct working behavior, despite the presence of unexpected events that would otherwise trigger the system into executing unwanted operations. Within this, availability relates to the capability of the system to maintaining the same level of service, without losing the ability to provide proper feedback in useful time, in the face of unexpected events.

This Special Issue welcomes contributions on the challenges to provide an intelligent, secure, and reliable systems, including the following list of topics:

  • Cybersecurity challenges in cyberphysical systems;
  • Artificial intelligence algorithms for improving CPS cybersecurity;
  • Industrial CPS applications for cybersecurity;
  • Challenges of AI and security in cyberphysical production systems;
  • Availability of critical cyberphysical systems;
  • AI for new applications in health systems;
  • Intelligent Systems for medical diagnostics;
  • Privacy and security on AI algorithms;
  • Intelligent systems for data privacy.

Dr. Nuno Lopes
Dr. Joaquim Gonçalves
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Systems is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

30 pages, 6834 KiB  
Article
Enhancing Cloud-Based Security: A Novel Approach for Efficient Cyber-Threat Detection Using GSCSO-IHNN Model
Systems 2023, 11(10), 518; https://doi.org/10.3390/systems11100518 - 16 Oct 2023
Viewed by 1753
Abstract
Developing a simple and efficient attack detection system for ensuring the security of cloud systems against cyberthreats is a crucial and demanding process in the present time. In traditional work, various machine-learning-based detection methodologies have been developed for securing the cloud network. However, [...] Read more.
Developing a simple and efficient attack detection system for ensuring the security of cloud systems against cyberthreats is a crucial and demanding process in the present time. In traditional work, various machine-learning-based detection methodologies have been developed for securing the cloud network. However, those methodologies face the complications of overfitting, complex system design, difficulty understanding, and higher time consumption. Hence, the proposed work contributes to the design and development of an effective security model for detecting cyberthreats from cloud systems. The proposed framework encompasses the modules of preprocessing and normalization, feature extraction, optimization, and prediction. An improved principal component analysis (IPCA) model is used to extract the relevant features from the normalized dataset. Then, a hybrid grasshopper–crow search optimization (GSCSO) is employed to choose the relevant features for training and testing operations. Finally, an isolated heuristic neural network (IHNN) algorithm is used to predict whether the data flow is normal or intrusive. Popular and publicly available datasets such as NSL-KDD, BoT-IoT, KDD Cup’99, and CICIDS 2017 are used for implementing the detection system. For validation, the different performance indicators, such as detection accuracy (AC) and F1-score, are measured and compared with the proposed GSCSO-IHNN system. On average, the GSCO-IHNN system achieved 99.5% ACC and 0.999 F1 scores on these datasets. The results of the performance study show that the GSCSO-IHNN method outperforms the other security models. Ultimately, this research strives to contribute to the ongoing efforts to fortify the security of cloud systems, making them resilient against cyber threats more simply and efficiently. Full article
(This article belongs to the Special Issue Intelligent Systems and Cybersecurity)
Show Figures

Figure 1

Review

Jump to: Research

31 pages, 554 KiB  
Review
Distributed Control of Cyber Physical System on Various Domains: A Critical Review
Systems 2023, 11(4), 208; https://doi.org/10.3390/systems11040208 - 20 Apr 2023
Cited by 4 | Viewed by 4565
Abstract
Cyber-Physical System (CPS) is a symbol of the fourth industrial revolution (4IR) by integrating physical and computational processes which can associate with humans in various ways. In short, the relationship between Cyber networks and the physical component is known as CPS, which is [...] Read more.
Cyber-Physical System (CPS) is a symbol of the fourth industrial revolution (4IR) by integrating physical and computational processes which can associate with humans in various ways. In short, the relationship between Cyber networks and the physical component is known as CPS, which is assisting to incorporate the world and influencing our ordinary life significantly. In terms of practical utilization of CPS interacting abundant difficulties. Currently, CPS is involved in modern society very vastly with many uptrend perspectives. All the new technologies by using CPS are accelerating our journey of innovation. In this paper, we have explained the research areas of 14 important domains of Cyber-Physical Systems (CPS) including aircraft transportation systems, battlefield surveillance, chemical production, energy, agriculture (food supply), healthcare, education, industrial automation, manufacturing, mobile devices, robotics, transportation, and vehicular. We also demonstrated the challenges and future direction of each paper of all domains. Almost all articles have limitations on security, data privacy, and safety. Several projects and new dimensions are mentioned where CPS is the key integration. Consequently, the researchers and academicians will be benefited to update the CPS workspace and it will help them with more research on a specific topic of CPS. 158 papers are studied in this survey as well as among these, 98 papers are directly studied with the 14 domains with challenges and future instruction which is the first survey paper as per the knowledge of authors. Full article
(This article belongs to the Special Issue Intelligent Systems and Cybersecurity)
Show Figures

Figure 1

Back to TopTop