Security and Communication Networks

Security and Defense of Cyber-Physical Systems


Publishing date
01 Jan 2023
Status
Published
Submission deadline
02 Sep 2022

Lead Editor
Guest Editors

1Chengdu University of Information Technology, Chengdu, China

2National University of Singapore, Singapore

3University of Electronic Science and Technology of China, Chengdu, China


Security and Defense of Cyber-Physical Systems

Description

Cyber-physical systems (CPS), relate to a set of physical devices (‘hardware’) controlled by computer-based algorithms, mostly software, and are becoming increasingly important in information technology. However, CPS are prone to various cyber and physical security threats, attacks and challenges, due to their heterogeneous nature, reliance on private and sensitive data, and large-scale deployment. In recent years, common network attacks have assaulted both the software and hardware of CPS as well as data in systems by utilizing the vulnerability and security defects of a network. At the same time, advanced attackers can adopt sophisticated viruses, worms, and other malicious programs and disguise these attacks. Attack initiators may use various novel attack methods, including phishing attacks, water hole attacks etc., in addition to social engineering methods, and in doing so, breach security defense devices deployed in a system, and gradually gain access to an organization.

After penetrating a network, many attackers remain dormant for a long time and collect various information until crucial intelligence has been found. These kinds of behaviors can cause significant economic losses to individuals, companies, and countries. Customized advanced attacks pose an even greater risk and may target cover energy, electricity, finance, national defense, other infrastructure related to a national economy and people’s livelihood, and even a country’s core interests. These attacks threaten to undermine existing international partnerships. In conclusion, advanced attacks, multiple attacks, joint attacks, and customized attack detection in CPS are generating increasing interest in academia.

Thus, this Special Issue is dedicated to showcasing original research and critical articles focusing on innovations and improvements in the areas of advanced attacks, system security, privacy, and trust technology in CPS. We especially welcome submissions relating to detection and defense schemes based on artificial intelligence and big data, including but not limited to theory, design, modeling, configuration, representation, data processing, data analysis, and their applications in CPS. Both original research and review articles are welcome.

Potential topics include but are not limited to the following:

  • Evolvable and scalable CPS architecture
  • Trustworthiness and convergence of large-scale routing in CPS
  • Complex autonomous network management of cross-domain access by CPS users
  • Network intrusion detection and information transmission security
  • Defense technology of intelligent sensor systems
  • Artificial intelligence technology for improvement of network security and efficiency
  • Collaborative learning for network service optimization
  • Cyberspace data security and privacy protection
  • Anonymous communication systems
  • Network protocol vulnerability analysis and mining
  • Host-based intrusion detection system IDS
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.