2021
DOI: 10.1109/access.2021.3072635
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Genetic Algorithm for Safety and Availability Checking in Cyber-Physical Systems

Abstract: Cross-IoT infrastructure access frequently occurs when performing tasks in a distributed computing infrastructure of a cyber-physical system (CPS). The access control technology that ensure secure access cross-IoT infrastructure usually automatically establish relationships between user-attribute/rolepermission. How to efficiently determine whether an automatic authorization access control state satisfies the safety and availability requirements of a system is a huge challenge. Existing work often focuses on a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…The logic behind this dual mutation phase was to improvise the exploration capability of the genetic algorithm. 7 The significant feature points could be originated from imbalanced data, such it requires choosing out original data subset and subjects for the dataset resampling process. This resampling process facilitates evening-out features, equally in a balanced class, and it yields better performance for classifying outcomes.…”
Section: Motivations Of the Studymentioning
confidence: 99%
See 3 more Smart Citations
“…The logic behind this dual mutation phase was to improvise the exploration capability of the genetic algorithm. 7 The significant feature points could be originated from imbalanced data, such it requires choosing out original data subset and subjects for the dataset resampling process. This resampling process facilitates evening-out features, equally in a balanced class, and it yields better performance for classifying outcomes.…”
Section: Motivations Of the Studymentioning
confidence: 99%
“…Hence, intrusion detection design is modeled on machine-learning and big-data technology as well. 7 The technique employs pre-processing of packets, merging data, and malicious data labeling. To sort out the effective detection rate, integration of feature-selection algorithm and supervised-learning technique is carried out.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The introduction of information technology into CPSs increases the risk of system intrusion and may cause serious loss of life and property. Therefore, the safety and security of CPS is crucial 7,8 …”
Section: Introductionmentioning
confidence: 99%