Big data meet cyber-physical systems: A panoramic survey

R Atat, L Liu, J Wu, G Li, C Ye, Y Yang - IEEE Access, 2018 - ieeexplore.ieee.org
The world is witnessing an unprecedented growth of cyber-physical systems (CPS), which
are foreseen to revolutionize our world via creating new services and applications in a …

Enabling cyber‐physical communication in 5G cellular networks: challenges, spatial spectrum sensing, and cyber‐security

R Atat, L Liu, H Chen, J Wu, H Li… - IET Cyber‐Physical …, 2017 - Wiley Online Library
Cyber‐physical systems (CPS) help create new services and applications by revolutionising
our world in different fields through their tight interactions and automated decisions. This is …

Cyber security: New realities for industry 4.0 and society 5.0

A Deshmukh, DS Patil, G Soni… - Handbook of Research on …, 2023 - igi-global.com
Industry 4.0 is a new industrial revolution based on the deployment of billions of internet of
things (IoTs) devices. With this industrial revolution, Society 5.0 is also taking place …

GRBC-based network security functions placement scheme in SDS for 5G security

J Guan, Z Wei, I You - Journal of Network and Computer Applications, 2018 - Elsevier
With the paradigm shift of 5G in terms of computing and infrastructure, 5G security is
confronted with new challenges due to the promising introduction of Software Defined …

A novel technique of cloud security based on hybrid encryption by Blowfish and MD5

A Chauhan, J Gupta - 2017 4th International conference on …, 2017 - ieeexplore.ieee.org
The networks have moved worldwide and information has been considered in the digital
form of bits and bytes. Critical information is stored, refined and sent in digital form on …

Data Mining for Cyber 𠄁Physical Systems

MV Rao, DA Reddy, A Ampavathi… - Data Mining and …, 2022 - Wiley Online Library
Summary The Cyber‐Physical System (CPS) combines corporeal gadgets (ie sensors)
through digital (ie, illuminating) apparatuses to create an elusive structure that returns wisely …

Efficient multi-attribute precedence-based task scheduling for edge computing in geo-distributed cloud environment

C Li, C Zhang, B Ma, Y Luo - Knowledge and Information Systems, 2022 - Springer
In order to realize globalization of cloud computing, joint use of different services of different
cloud providers has become an inevitable trend. The geo-distributed cloud consists of …

An effective classification approach for big data security based on GMPLS/MPLS networks

S Alouneh, F Al-Hawari, I Hababeh… - Security and …, 2018 - Wiley Online Library
The need for effective approaches to handle big data that is characterized by its large
volume, different types, and high velocity is vital and hence has recently attracted the …

Data division and replication approach for improving security and availability of cloud storage

A Londhe, V Bhalerao, S Ghodey… - 2018 Fourth …, 2018 - ieeexplore.ieee.org
Large, distributed network systems such as the Cloud cater to the immense data storage
needs of people around the world. This data stored upon the cloud may be sensitive, which …

Approach for Ensuring Fragmentation and Integrity of Data in SEDuLOUS

AP Singh, A Choudhary - Proceedings of Second International Conference …, 2021 - Springer
With the rapid adoption of cloud services, more and more data are being uploaded on the
cloud platform. These data are under threat from various threat actors constantly researching …