Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (2,543)

Search Parameters:
Keywords = physical security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 394 KiB  
Article
SMART DShot: Secure Machine-Learning-Based Adaptive Real-Time Timing Correction
by Hyunmin Kim, Zahid Basha Shaik Kadu and Kyusuk Han
Appl. Sci. 2025, 15(15), 8619; https://doi.org/10.3390/app15158619 (registering DOI) - 4 Aug 2025
Abstract
The exponential growth of autonomous systems demands robust security mechanisms that can operate within the extreme constraints of real-time embedded environments. This paper introduces SMART DShot, a groundbreaking machine learning-enhanced framework that transforms the security landscape of unmanned aerial vehicle motor control systems [...] Read more.
The exponential growth of autonomous systems demands robust security mechanisms that can operate within the extreme constraints of real-time embedded environments. This paper introduces SMART DShot, a groundbreaking machine learning-enhanced framework that transforms the security landscape of unmanned aerial vehicle motor control systems through seamless integration of adaptive timing correction and real-time anomaly detection within Digital Shot (DShot) communication protocols. Our approach addresses critical vulnerabilities in Electronic Speed Controller (ESC) interfaces by deploying four synergistic algorithms—Kalman Filter Timing Correction (KFTC), Recursive Least Squares Timing Correction (RLSTC), Fuzzy Logic Timing Correction (FLTC), and Hybrid Adaptive Timing Correction (HATC)—each optimized for specific error characteristics and attack scenarios. Through comprehensive evaluation encompassing 32,000 Monte Carlo test iterations (500 per scenario × 16 scenarios × 4 algorithms) across 16 distinct operational scenarios and PolarFire SoC Field-Programmable Gate Array (FPGA) implementation, we demonstrate exceptional performance with 88.3% attack detection rate, only 2.3% false positive incidence, and substantial vulnerability mitigation reducing Common Vulnerability Scoring System (CVSS) severity from High (7.3) to Low (3.1). Hardware validation on PolarFire SoC confirms practical viability with minimal resource overhead (2.16% Look-Up Table utilization, 16.57 mW per channel) and deterministic sub-10 microsecond execution latency. The Hybrid Adaptive Timing Correction algorithm achieves 31.01% success rate (95% CI: [30.2%, 31.8%]), representing a 26.5% improvement over baseline approaches through intelligent meta-learning-based algorithm selection. Statistical validation using Analysis of Variance confirms significant performance differences (F(3,1996) = 30.30, p < 0.001) with large effect sizes (Cohen’s d up to 4.57), where 64.6% of algorithm comparisons showed large practical significance. SMART DShot establishes a paradigmatic shift from reactive to proactive embedded security, demonstrating that sophisticated artificial intelligence can operate effectively within microsecond-scale real-time constraints while providing comprehensive protection against timing manipulation, de-synchronization, burst interference, replay attacks, coordinated multi-channel attacks, and firmware-level compromises. This work provides essential foundations for trustworthy autonomous systems across critical domains including aerospace, automotive, industrial automation, and cyber–physical infrastructure. These results conclusively demonstrate that ML-enhanced motor control systems can achieve both superior security (88.3% attack detection rate with 2.3% false positives) and operational performance (31.01% timing correction success rate, 26.5% improvement over baseline) simultaneously, establishing SMART DShot as a practical, deployable solution for next-generation autonomous systems. Full article
Show Figures

Figure 1

22 pages, 3023 KiB  
Article
Improving Grain Safety Using Radiation Dose Technologies
by Raushangul Uazhanova, Meruyert Ametova, Zhanar Nabiyeva, Igor Danko, Gulzhan Kurtibayeva, Kamilya Tyutebayeva, Aruzhan Khamit, Dana Myrzamet, Ece Sogut and Maxat Toishimanov
Agriculture 2025, 15(15), 1669; https://doi.org/10.3390/agriculture15151669 - 1 Aug 2025
Viewed by 165
Abstract
Reducing post-harvest losses of cereal crops is a key challenge for ensuring global food security amid the limited arable land and growing population. This study investigates the effectiveness of electron beam irradiation (5 MeV, ILU-10 accelerator) as a physical decontamination method for various [...] Read more.
Reducing post-harvest losses of cereal crops is a key challenge for ensuring global food security amid the limited arable land and growing population. This study investigates the effectiveness of electron beam irradiation (5 MeV, ILU-10 accelerator) as a physical decontamination method for various cereal crops cultivated in Kazakhstan. Samples were irradiated at doses ranging from 1 to 5 kGy, and microbiological indicators—including Quantity of Mesophilic Aerobic and Facultative Anaerobic Microorganisms (QMAFAnM), yeasts, and molds—were quantified according to national standards. Experimental results demonstrated an exponential decline in microbial contamination, with a >99% reduction achieved at doses of 4–5 kGy. The modeled inactivation kinetics showed strong agreement with the experimental data: R2 = 0.995 for QMAFAnM and R2 = 0.948 for mold, confirming the reliability of the exponential decay models. Additionally, key quality parameters—including protein content, moisture, and gluten—were evaluated post-irradiation. The results showed that protein levels remained largely stable across all doses, while slight but statistically insignificant fluctuations were observed in moisture and gluten contents. Principal component analysis and scatterplot matrix visualization confirmed clustering patterns related to radiation dose and crop type. The findings substantiate the feasibility of electron beam treatment as a scalable and safe technology for improving the microbiological quality and storage stability of cereal crops. Full article
(This article belongs to the Section Agricultural Product Quality and Safety)
Show Figures

Figure 1

26 pages, 5549 KiB  
Article
Intrusion Detection and Real-Time Adaptive Security in Medical IoT Using a Cyber-Physical System Design
by Faeiz Alserhani
Sensors 2025, 25(15), 4720; https://doi.org/10.3390/s25154720 (registering DOI) - 31 Jul 2025
Viewed by 218
Abstract
The increasing reliance on Medical Internet of Things (MIoT) devices introduces critical cybersecurity vulnerabilities, necessitating advanced, adaptive defense mechanisms. Recent cyber incidents—such as compromised critical care systems, modified therapeutic device outputs, and fraudulent clinical data inputs—demonstrate that these threats now directly impact life-critical [...] Read more.
The increasing reliance on Medical Internet of Things (MIoT) devices introduces critical cybersecurity vulnerabilities, necessitating advanced, adaptive defense mechanisms. Recent cyber incidents—such as compromised critical care systems, modified therapeutic device outputs, and fraudulent clinical data inputs—demonstrate that these threats now directly impact life-critical aspects of patient security. In this paper, we introduce a machine learning-enabled Cognitive Cyber-Physical System (ML-CCPS), which is designed to identify and respond to cyber threats in MIoT environments through a layered cognitive architecture. The system is constructed on a feedback-looped architecture integrating hybrid feature modeling, physical behavioral analysis, and Extreme Learning Machine (ELM)-based classification to provide adaptive access control, continuous monitoring, and reliable intrusion detection. ML-CCPS is capable of outperforming benchmark classifiers with an acceptable computational cost, as evidenced by its macro F1-score of 97.8% and an AUC of 99.1% when evaluated with the ToN-IoT dataset. Alongside classification accuracy, the framework has demonstrated reliable behaviour under noisy telemetry, maintained strong efficiency in resource-constrained settings, and scaled effectively with larger numbers of connected devices. Comparative evaluations, radar-style synthesis, and ablation studies further validate its effectiveness in real-time MIoT environments and its ability to detect novel attack types with high reliability. Full article
Show Figures

Figure 1

16 pages, 2174 KiB  
Article
TwinFedPot: Honeypot Intelligence Distillation into Digital Twin for Persistent Smart Traffic Security
by Yesin Sahraoui, Abdessalam Mohammed Hadjkouider, Chaker Abdelaziz Kerrache and Carlos T. Calafate
Sensors 2025, 25(15), 4725; https://doi.org/10.3390/s25154725 (registering DOI) - 31 Jul 2025
Viewed by 211
Abstract
The integration of digital twins (DTs) with intelligent traffic systems (ITSs) holds strong potential for improving real-time management in smart cities. However, securing digital twins remains a significant challenge due to the dynamic and adversarial nature of cyber–physical environments. In this work, we [...] Read more.
The integration of digital twins (DTs) with intelligent traffic systems (ITSs) holds strong potential for improving real-time management in smart cities. However, securing digital twins remains a significant challenge due to the dynamic and adversarial nature of cyber–physical environments. In this work, we propose TwinFedPot, an innovative digital twin-based security architecture that combines honeypot-driven data collection with Zero-Shot Learning (ZSL) for robust and adaptive cyber threat detection without requiring prior sampling. The framework leverages Inverse Federated Distillation (IFD) to train the DT server, where edge-deployed honeypots generate semantic predictions of anomalous behavior and upload soft logits instead of raw data. Unlike conventional federated approaches, TwinFedPot reverses the typical knowledge flow by distilling collective intelligence from the honeypots into a central teacher model hosted on the DT. This inversion allows the system to learn generalized attack patterns using only limited data, while preserving privacy and enhancing robustness. Experimental results demonstrate significant improvements in accuracy and F1-score, establishing TwinFedPot as a scalable and effective defense solution for smart traffic infrastructures. Full article
Show Figures

Figure 1

19 pages, 3297 KiB  
Article
Secrecy Rate Maximization via Joint Robust Beamforming and Trajectory Optimization for Mobile User in ISAC-UAV System
by Lvxin Xu, Zhi Zhang and Liuguo Yin
Drones 2025, 9(8), 536; https://doi.org/10.3390/drones9080536 - 30 Jul 2025
Viewed by 128
Abstract
Unmanned aerial vehicles (UAVs) have emerged as a promising platform for integrated sensing and communication (ISAC) due to their mobility and deployment flexibility. By adaptively adjusting their flight trajectories, UAVs can maintain favorable line-of-sight (LoS) communication links and sensing angles, thus enhancing overall [...] Read more.
Unmanned aerial vehicles (UAVs) have emerged as a promising platform for integrated sensing and communication (ISAC) due to their mobility and deployment flexibility. By adaptively adjusting their flight trajectories, UAVs can maintain favorable line-of-sight (LoS) communication links and sensing angles, thus enhancing overall system performance in dynamic and complex environments. However, ensuring physical layer security (PLS) in such UAV-assisted ISAC systems remains a significant challenge, particularly in the presence of mobile users and potential eavesdroppers. This manuscript proposes a joint optimization framework that simultaneously designs robust transmit beamforming and UAV trajectories to secure downlink communication for multiple ground users. At each time slot, the UAV predicts user positions and maximizes the secrecy sum-rate, subject to constraints on total transmit power, multi-target sensing quality, and UAV mobility. To tackle this non-convex problem, we develop an efficient optimization algorithm based on successive convex approximation (SCA) and constrained optimization by linear approximations (COBYLA). Numerical simulations validate that the proposed framework effectively enhances the secrecy performance while maintaining high-quality sensing, achieving near-optimal performance under realistic system constraints. Full article
Show Figures

Figure 1

14 pages, 1081 KiB  
Article
Optical Frequency Comb-Based Continuous-Variable Quantum Secret Sharing Scheme
by Runsheng Peng, Yijun Wang, Hang Zhang, Yun Mao and Ying Guo
Mathematics 2025, 13(15), 2455; https://doi.org/10.3390/math13152455 - 30 Jul 2025
Viewed by 304
Abstract
Quantum secret sharing (QSS) faces inherent limitations in scaling to multi-user networks due to excess noise introduced by highly asymmetric beam splitters (HABSs) in chain-structured topologies. To overcome this challenge, we propose an optical frequency comb-based continuous-variable QSS (OFC CV-QSS) scheme that establishes [...] Read more.
Quantum secret sharing (QSS) faces inherent limitations in scaling to multi-user networks due to excess noise introduced by highly asymmetric beam splitters (HABSs) in chain-structured topologies. To overcome this challenge, we propose an optical frequency comb-based continuous-variable QSS (OFC CV-QSS) scheme that establishes parallel frequency channels between users and the dealer via OFC-generated multi-wavelength carriers. By replacing the chain-structured links with dedicated frequency channels and integrating the Chinese remainder theorem (CRT) with a decentralized architecture, our design eliminates excess noise from all users using HABS while providing mathematical- and physical-layer security. Simulation results demonstrate that the scheme achieves a more than 50% improvement in maximum transmission distance compared to chain-based QSS, with significantly slower performance degradation as users scale to 20. Numerical simulations confirm the feasibility of this theoretical framework for multi-user quantum networks, offering dual-layer confidentiality without compromising key rates. Full article
Show Figures

Figure 1

17 pages, 1353 KiB  
Article
SSB: Smart Contract Security Detection Tool Suitable for Industrial Control Scenarios
by Ci Tao, Shuai He and Xingqiu Shen
Sensors 2025, 25(15), 4695; https://doi.org/10.3390/s25154695 - 30 Jul 2025
Viewed by 265
Abstract
The results of this study highlight the effectiveness of the proposed semantic security detection framework, SSB, in identifying a wide range of vulnerabilities in smart contracts tailored for industrial control scenarios. Compared to existing tools like ZEUS, Securify, and VULTRON, SSB demonstrates superior [...] Read more.
The results of this study highlight the effectiveness of the proposed semantic security detection framework, SSB, in identifying a wide range of vulnerabilities in smart contracts tailored for industrial control scenarios. Compared to existing tools like ZEUS, Securify, and VULTRON, SSB demonstrates superior logical coverage across various vulnerability types, as evidenced by its performance on smart contract samples. This suggests that semantic-based approaches, which integrate domain-specific invariants and runtime monitoring, can address the unique challenges of ICS, such as real-time constraints and semantic consistency between code and physical control logic. The framework’s ability to model industrial invariants—covering security, functionality, consistency, time-related, and resource consumption aspects—provides a robust mechanism to prevent critical errors like unauthorized access or premature equipment operation. However, the lack of real-world ICS validation due to confidentiality constraints limits the generalizability of these findings. Future research should focus on adapting SSB for real industrial deployments, exploring scalability across diverse ICS architectures, and integrating advanced AI techniques for dynamic invariant adjustment. Additionally, addressing cross-chain interoperability and privacy concerns could further enhance the framework’s applicability in complex industrial ecosystems. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

22 pages, 4895 KiB  
Article
Machine Learning-Assisted Secure Random Communication System
by Areeb Ahmed and Zoran Bosnić
Entropy 2025, 27(8), 815; https://doi.org/10.3390/e27080815 - 29 Jul 2025
Viewed by 183
Abstract
Machine learning techniques have revolutionized physical layer security (PLS) and provided opportunities for optimizing the performance and security of modern communication systems. In this study, we propose the first machine learning-assisted random communication system (ML-RCS). It comprises a pretrained decision tree (DT)-based receiver [...] Read more.
Machine learning techniques have revolutionized physical layer security (PLS) and provided opportunities for optimizing the performance and security of modern communication systems. In this study, we propose the first machine learning-assisted random communication system (ML-RCS). It comprises a pretrained decision tree (DT)-based receiver that extracts binary information from the transmitted random noise carrier signals. The ML-RCS employs skewed alpha-stable (α-stable) noise as a random carrier to encode the incoming binary bits securely. The DT model is pretrained on an extensively developed dataset encompassing all the selected parameter combinations to generate and detect the α-stable noise signals. The legitimate receiver leverages the pretrained DT and a predetermined key, specifically the pulse length of a single binary information bit, to securely decode the hidden binary bits. The performance evaluations included the single-bit transmission, confusion matrices, and a bit error rate (BER) analysis via Monte Carlo simulations. The fact that the BER reached 10−3 confirms the ability of the proposed system to establish successful secure communication between a transmitter and legitimate receiver. Additionally, the ML-RCS provides an increased data rate compared to previous random communication systems. From the perspective of security, the confusion matrices and computed false negative rate of 50.2% demonstrate the failure of an eavesdropper to decode the binary bits without access to the predetermined key and the private dataset. These findings highlight the potential ability of unconventional ML-RCSs to promote the development of secure next-generation communication devices with built-in PLSs. Full article
(This article belongs to the Special Issue Wireless Communications: Signal Processing Perspectives, 2nd Edition)
Show Figures

Figure 1

13 pages, 5152 KiB  
Article
FEM-Based Design and Micromachining of a Ratchet Click Mechanism in Mechanical Watch Movements
by Alessandro Metelli, Giuseppe Soardi, Andrea Abeni and Aldo Attanasio
Micromachines 2025, 16(8), 875; https://doi.org/10.3390/mi16080875 - 29 Jul 2025
Viewed by 205
Abstract
The ratchet click mechanism in mechanical watch movements is a micro-component essential to prevent the unwinding of the caliber mainspring, providing secure energy storage during recharging. Despite its geometrical simplicity, the ratchet click undergoes to a complex distribution of stress, elevated strains, and [...] Read more.
The ratchet click mechanism in mechanical watch movements is a micro-component essential to prevent the unwinding of the caliber mainspring, providing secure energy storage during recharging. Despite its geometrical simplicity, the ratchet click undergoes to a complex distribution of stress, elevated strains, and cyclical mechanical deformations, affecting its long-term reliability. Despite being a crucial element in all mechanical watch movements, the non-return system appears to have been overlooked in scientific literature, with no studies available on its design, modeling, and micromachining. In this work, we introduce a novel Finite Element Method (FEM) -based design strategy for the ratchet click, systematically refining its geometry and dimensional parameters to minimize peak stress and improve durability. A mechanical simulation model was created to simulate the boundary conditions, contact interactions, and stress distributions on the part. If compared with the standard component, the optimized design exhibits a decrease in peak stress values. The mechanism was micro-machined, and it was experimentally tested to validate the numerical model outputs. The integrated digital–physical approach not only underscores the scientific contribution of coupling advanced simulation with experimental validation of complex micromechanisms but also provides a generalizable method for enhancing performance of micro-mechanical components while preserving their historical design heritage. Full article
Show Figures

Figure 1

17 pages, 529 KiB  
Article
Coping with Risk: The Three Spheres of Safety in Latin American Investigative Journalism
by Lucia Mesquita, Mathias Felipe de-Lima-Santos and Isabella Gonçalves
Journal. Media 2025, 6(3), 121; https://doi.org/10.3390/journalmedia6030121 - 29 Jul 2025
Viewed by 264
Abstract
Small news media organizations are increasingly reshaping the news media system in Latin America. They are stepping into the role of watchdogs by investigating issues such as corruption scandals that larger outlets sometimes overlook. However, this journalistic work exposes both journalists and their [...] Read more.
Small news media organizations are increasingly reshaping the news media system in Latin America. They are stepping into the role of watchdogs by investigating issues such as corruption scandals that larger outlets sometimes overlook. However, this journalistic work exposes both journalists and their organizations to a range of security threats, including physical violence, legal pressure, and digital attacks. In response, these outlets have developed coping strategies to manage and mitigate such risks. This article presents an exploratory study of the approaches adopted to protect information and data, ensure the safety and well-being of journalists, and maintain organizational continuity. Based on a series of in-depth interviews with leaders of award-winning news organizations for their investigative reporting, the study examines a shift from a competitive newsroom model to a collaborative approach in which information is shared—sometimes across borders—to support investigative reporting and strengthen security practices. We identify strategies implemented by small news organizations to safeguard their journalistic work and propose an integrative model of news safety encompassing the following three areas of security: physical, legal, and digital. This study contributes to the development of the newsafety framework and sheds light on safety practices that support media freedom. Full article
Show Figures

Figure 1

19 pages, 88349 KiB  
Article
Dynamic Assessment of Street Environmental Quality Using Time-Series Street View Imagery Within Daily Intervals
by Puxuan Zhang, Yichen Liu and Yihua Huang
Land 2025, 14(8), 1544; https://doi.org/10.3390/land14081544 - 27 Jul 2025
Viewed by 293
Abstract
Rapid urbanization has intensified global settlement density, significantly increasing the importance of urban street environmental quality, which profoundly affects residents’ physical and psychological well-being. Traditional methods for evaluating urban environmental quality have largely overlooked dynamic perceptual changes occurring throughout the day, resulting in [...] Read more.
Rapid urbanization has intensified global settlement density, significantly increasing the importance of urban street environmental quality, which profoundly affects residents’ physical and psychological well-being. Traditional methods for evaluating urban environmental quality have largely overlooked dynamic perceptual changes occurring throughout the day, resulting in incomplete assessments. To bridge this methodological gap, this study presents an innovative approach combining advanced deep learning techniques with time-series street view imagery (SVI) analysis to systematically quantify spatio-temporal variations in the perceived environmental quality of pedestrian-oriented streets. It further addresses two central questions: how perceived environmental quality varies spatially across sections of a pedestrian-oriented street and how these perceptions fluctuate temporally throughout the day. Utilizing Golden Street, a representative living street in Shanghai’s Changning District, as the empirical setting, street view images were manually collected at 96 sampling points across multiple time intervals within a single day. The collected images underwent semantic segmentation using the DeepLabv3+ model, and emotional scores were quantified through the validated MIT Place Pulse 2.0 dataset across six subjective indicators: “Safe,” “Lively,” “Wealthy,” “Beautiful,” “Depressing,” and “Boring.” Spatial and temporal patterns of these indicators were subsequently analyzed to elucidate their relationships with environmental attributes. This study demonstrates the effectiveness of integrating deep learning models with time-series SVI for assessing urban environmental perceptions, providing robust empirical insights for urban planners and policymakers. The results emphasize the necessity of context-sensitive, temporally adaptive urban design strategies to enhance urban livability and psychological well-being, ultimately contributing to more vibrant, secure, and sustainable pedestrian-oriented urban environments. Full article
(This article belongs to the Special Issue Planning for Sustainable Urban and Land Development, Second Edition)
Show Figures

Figure 1

16 pages, 3829 KiB  
Article
Process Development for Concentrating Valuable Metals Present in the Non-Valorized Solid Fractions from Urban Mining
by Nour-Eddine Menad and Alassane Traoré
Metals 2025, 15(8), 834; https://doi.org/10.3390/met15080834 (registering DOI) - 26 Jul 2025
Viewed by 225
Abstract
Global resource consumption continues to grow each year, exerting increasing pressure on their availability. This trend could lead to a shortage of raw materials in the coming years. Aware of the risks associated with this situation, the European Union has implemented policies and [...] Read more.
Global resource consumption continues to grow each year, exerting increasing pressure on their availability. This trend could lead to a shortage of raw materials in the coming years. Aware of the risks associated with this situation, the European Union has implemented policies and strategies aimed at diversifying its supply sources, including waste recycling. In this context, the present study was conducted with the objective of developing innovative processes to concentrate valuable metals present in the non-recovered fractions of waste electrical and electronic equipment (WEEE). Three types of samples were studied: washing table residues (WTRs), printed circuit boards (PCBs), and powders from cathode-ray tube screens (CRT powders). Several separation techniques, based on the physical properties of the elements, were implemented, including electrostatic separation, magnetic separation, and density and gravity-based separations. The results obtained are promising. For WTRs and PCBs, the recovery rates of targeted metals (Cu, Al, Pb, Zn, Sn) reached approximately 91% and 80%, respectively. In addition to these metals, other valuable metals, present in significant quantities, deserve further exploration. Regarding CRT powders, the performances are also encouraging, with recovery rates of 54.7% for zinc, 57.1% for yttrium, and approximately 71% for europium. Although these results are satisfactory, optimizations are possible to maximize the recovery of these critical elements. The techniques implemented have demonstrated their effectiveness in concentrating target metals in the treated fractions. These results confirm that recycling constitutes a viable alternative to address resource shortages and secure part of the supplies needed for the European Union’s industry. Full article
Show Figures

Figure 1

27 pages, 8383 KiB  
Article
A Resilience Quantitative Assessment Framework for Cyber–Physical Systems: Mathematical Modeling and Simulation
by Zhigang Cao, Hantao Zhao, Yunfan Wang, Chuan He, Ding Zhou and Xiaopeng Han
Appl. Sci. 2025, 15(15), 8285; https://doi.org/10.3390/app15158285 - 25 Jul 2025
Viewed by 127
Abstract
As cyber threats continue to grow in complexity and persistence, resilience has become a critical requirement for cyber–physical systems (CPSs). Resilience quantitative assessment is essential for supporting secure system design and ensuring reliable operation. Although various methods have been proposed for evaluating CPS [...] Read more.
As cyber threats continue to grow in complexity and persistence, resilience has become a critical requirement for cyber–physical systems (CPSs). Resilience quantitative assessment is essential for supporting secure system design and ensuring reliable operation. Although various methods have been proposed for evaluating CPS resilience, major challenges remain in accurately modeling the interaction between cyber and physical domains and in providing structured guidance for resilience-oriented design. This study proposes an integrated CPS resilience assessment framework that combines cyber-layer anomaly modeling based on Markov chains with mathematical modeling of performance degradation and recovery in the physical domain. The framework establishes a structured evaluation process through parameter normalization and cyber–physical coupling, enabling the generation of resilience curves that clearly represent system performance changes under adverse conditions. A case study involving an industrial controller equipped with a diversity-redundancy architecture is conducted to demonstrate the applicability of the proposed method. Modeling and simulation results indicate that the framework effectively reveals key resilience characteristics and supports performance-informed design optimization. Full article
Show Figures

Figure 1

16 pages, 993 KiB  
Review
The Application of Digital Twin Technology in the Development of Intelligent Aquaculture: Status and Opportunities
by Jianlei Chen, Yong Xu, Hao Li, Xinguo Zhao, Yang Su, Chunhao Qi, Keming Qu and Zhengguo Cui
Fishes 2025, 10(8), 363; https://doi.org/10.3390/fishes10080363 - 25 Jul 2025
Viewed by 246
Abstract
Aquaculture is vital for global food security but faces challenges like disease, water quality control, and resource optimization. Digital twin technology, a real-time virtual replica of physical aquaculture systems, emerges as a transformative solution. By integrating sensors and data analytics, it enables monitoring [...] Read more.
Aquaculture is vital for global food security but faces challenges like disease, water quality control, and resource optimization. Digital twin technology, a real-time virtual replica of physical aquaculture systems, emerges as a transformative solution. By integrating sensors and data analytics, it enables monitoring and optimization of water quality, feed efficiency, fish health, and operations. This review explores the current adoption status of digital twins in aquaculture, highlighting applications in real-time monitoring and system optimization. It addresses key implementation challenges, including data integration and scalability, and identifies emerging opportunities for advancing sustainable, intelligent aquaculture practices. Full article
(This article belongs to the Special Issue Application of Artificial Intelligence in Aquaculture)
Show Figures

Figure 1

51 pages, 5654 KiB  
Review
Exploring the Role of Digital Twin and Industrial Metaverse Technologies in Enhancing Occupational Health and Safety in Manufacturing
by Arslan Zahid, Aniello Ferraro, Antonella Petrillo and Fabio De Felice
Appl. Sci. 2025, 15(15), 8268; https://doi.org/10.3390/app15158268 - 25 Jul 2025
Viewed by 385
Abstract
The evolution of Industry 4.0 and the emerging paradigm of Industry 5.0 have introduced disruptive technologies that are reshaping modern manufacturing environments. Among these, Digital Twin (DT) and Industrial Metaverse (IM) technologies are increasingly recognized for their potential to enhance Occupational Health and [...] Read more.
The evolution of Industry 4.0 and the emerging paradigm of Industry 5.0 have introduced disruptive technologies that are reshaping modern manufacturing environments. Among these, Digital Twin (DT) and Industrial Metaverse (IM) technologies are increasingly recognized for their potential to enhance Occupational Health and Safety (OHS). However, a comprehensive understanding of how these technologies integrate to support OHS in manufacturing remains limited. This study systematically explores the transformative role of DT and IM in creating immersive, intelligent, and human-centric safety ecosystems. Following the PRISMA guidelines, a Systematic Literature Review (SLR) of 75 peer-reviewed studies from the SCOPUS and Web of Science databases was conducted. The review identifies key enabling technologies such as Virtual Reality (VR), Augmented Reality (AR), Extended Reality (XR), Internet of Things (IoT), Artificial Intelligence (AI), Cyber-Physical Systems (CPS), and Collaborative Robots (COBOTS), and highlights their applications in real-time monitoring, immersive safety training, and predictive hazard mitigation. A conceptual framework is proposed, illustrating a synergistic digital ecosystem that integrates predictive analytics, real-time monitoring, and immersive training to enhance the OHS. The findings highlight both the transformative benefits and the key adoption challenges of these technologies, including technical complexities, data security, privacy, ethical concerns, and organizational resistance. This study provides a foundational framework for future research and practical implementation in Industry 5.0. Full article
Show Figures

Figure 1

Back to TopTop