2023
DOI: 10.3390/electronics12081892
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Physical System Security Based on Human Activity Recognition through IoT Cloud Computing

Abstract: Cyber-physical security is vital for protecting key computing infrastructure against cyber attacks. Individuals, corporations, and society can all suffer considerable digital asset losses due to cyber attacks, including data loss, theft, financial loss, reputation harm, company interruption, infrastructure damage, ransomware attacks, and espionage. A cyber-physical attack harms both digital and physical assets. Cyber-physical system security is more challenging than software-level cyber security because it req… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

4
5

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 45 publications
0
5
0
Order By: Relevance
“…The model exhibits an excellent ability to generalize to new instances [49], as shown by the consistently high validation accuracy. The validation accuracy [50] slightly decreases compared to the corresponding training accuracy values, which is typical of a well-generalized model.…”
Section: Results Analysismentioning
confidence: 85%
“…The model exhibits an excellent ability to generalize to new instances [49], as shown by the consistently high validation accuracy. The validation accuracy [50] slightly decreases compared to the corresponding training accuracy values, which is typical of a well-generalized model.…”
Section: Results Analysismentioning
confidence: 85%
“…Weight initialization impacts CNN training and model convergence [53] . Poor weight initialization can cause vanishing gradients, which make learning difficult, stall convergence, and trap the model in a suboptimal local minimum [54] .…”
Section: Proposed Methodologymentioning
confidence: 99%
“…It combines a memory cell to prevent vanishing gradient problems with a tri-gating mechanism to handle long sequences. These gates are defined by Equations ( 3)-( 5), which are input, forget, and output gates, respectively [28].…”
Section: Long Short-term Memory (Lstm) Networkmentioning
confidence: 99%