Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (14,840)

Search Parameters:
Keywords = systems security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
28 pages, 1328 KiB  
Review
Security Issues in IoT-Based Wireless Sensor Networks: Classifications and Solutions
by Dung T. Nguyen, Mien L. Trinh, Minh T. Nguyen, Thang C. Vu, Tao V. Nguyen, Long Q. Dinh and Mui D. Nguyen
Future Internet 2025, 17(8), 350; https://doi.org/10.3390/fi17080350 (registering DOI) - 1 Aug 2025
Abstract
In recent years, the Internet of Things (IoT) has experienced considerable developments and has played an important role in various domains such as industry, agriculture, healthcare, transportation, and environment, especially for smart cities. Along with that, wireless sensor networks (WSNs) are considered to [...] Read more.
In recent years, the Internet of Things (IoT) has experienced considerable developments and has played an important role in various domains such as industry, agriculture, healthcare, transportation, and environment, especially for smart cities. Along with that, wireless sensor networks (WSNs) are considered to be important components of the IoT system (WSN-IoT) to create smart applications and automate processes. As the number of connected IoT devices increases, privacy and security issues become more complicated due to their external working environments and limited resources. Hence, solutions need to be updated to ensure that data and user privacy are protected from threats and attacks. To support the safety and reliability of such systems, in this paper, security issues in the WSN-IoT are addressed and classified as identifying security challenges and requirements for different kinds of attacks in either WSNs or IoT systems. In addition, security solutions corresponding to different types of attacks are provided, analyzed, and evaluated. We provide different comparisons and classifications based on specific goals and applications that hopefully can suggest suitable solutions for specific purposes in practical. We also suggest some research directions to support new security mechanisms. Full article
Show Figures

Figure 1

21 pages, 2608 KiB  
Article
Quality and Quantity Losses of Tomatoes Grown by Small-Scale Farmers Under Different Production Systems
by Tintswalo Molelekoa, Edwin M. Karoney, Nazareth Siyoum, Jarishma K. Gokul and Lise Korsten
Horticulturae 2025, 11(8), 884; https://doi.org/10.3390/horticulturae11080884 (registering DOI) - 1 Aug 2025
Abstract
Postharvest losses amongst small-scale farmers in developing countries are high due to inadequate resources and infrastructure. Among the various affected crops, tomatoes are particularly vulnerable; however, studies on postharvest losses of most fruits and vegetables are limited. Therefore, this study aimed to assess [...] Read more.
Postharvest losses amongst small-scale farmers in developing countries are high due to inadequate resources and infrastructure. Among the various affected crops, tomatoes are particularly vulnerable; however, studies on postharvest losses of most fruits and vegetables are limited. Therefore, this study aimed to assess postharvest tomato losses under different production systems within the small-scale supply chain using the indirect assessment (questionnaires and interviews) and direct quantification of losses. Farmers reported tomato losses due to insects (82.35%), cracks, bruises, and deformities (70.58%), and diseases (64.71%). Chemical sprays were the main form of pest and disease control reported by all farmers. The direct quantification sampling data revealed that 73.07% of the tomatoes were substandard at the farm level, with 47.92% and 25.15% categorized as medium-quality and poor-quality, respectively. The primary contributors to the losses were decay (39.92%), mechanical damage (31.32%), and blotchiness (27.99%). Postharvest losses were significantly higher under open-field production systems compared to closed tunnels. The fungi associated with decay were mainly Geotrichum, Fusarium spp., and Alternaria spp. These findings demonstrate the main drivers behind postharvest losses, which in turn highlight the critical need for intervention through training and support, including the use of postharvest loss reduction technologies to enhance food security. Full article
(This article belongs to the Section Postharvest Biology, Quality, Safety, and Technology)
Show Figures

Graphical abstract

31 pages, 9518 KiB  
Article
FPGA Implementation of Secure Image Transmission System Using 4D and 5D Fractional-Order Memristive Chaotic Oscillators
by Jose-Cruz Nuñez-Perez, Opeyemi-Micheal Afolabi, Vincent Ademola Adeyemi, Yuma Sandoval-Ibarra and Esteban Tlelo-Cuautle
Fractal Fract. 2025, 9(8), 506; https://doi.org/10.3390/fractalfract9080506 (registering DOI) - 31 Jul 2025
Abstract
With the rapid proliferation of real-time digital communication, particularly in multimedia applications, securing transmitted image data has become a vital concern. While chaotic systems have shown strong potential for cryptographic use, most existing approaches rely on low-dimensional, integer-order architectures, limiting their complexity and [...] Read more.
With the rapid proliferation of real-time digital communication, particularly in multimedia applications, securing transmitted image data has become a vital concern. While chaotic systems have shown strong potential for cryptographic use, most existing approaches rely on low-dimensional, integer-order architectures, limiting their complexity and resistance to attacks. Advances in fractional calculus and memristive technologies offer new avenues for enhancing security through more complex and tunable dynamics. However, the practical deployment of high-dimensional fractional-order memristive chaotic systems in hardware remains underexplored. This study addresses this gap by presenting a secure image transmission system implemented on a field-programmable gate array (FPGA) using a universal high-dimensional memristive chaotic topology with arbitrary-order dynamics. The design leverages four- and five-dimensional hyperchaotic oscillators, analyzed through bifurcation diagrams and Lyapunov exponents. To enable efficient hardware realization, the chaotic dynamics are approximated using the explicit fractional-order Runge–Kutta (EFORK) method with the Caputo fractional derivative, implemented in VHDL. Deployed on the Xilinx Artix-7 AC701 platform, synchronized master–slave chaotic generators drive a multi-stage stream cipher. This encryption process supports both RGB and grayscale images. Evaluation shows strong cryptographic properties: correlation of −6.1081 × 10−5, entropy of 7.9991, NPCR of 99.9776%, UACI of 33.4154%, and a key space of 21344, confirming high security and robustness. Full article
25 pages, 2082 KiB  
Article
XTTS-Based Data Augmentation for Profanity Keyword Recognition in Low-Resource Speech Scenarios
by Shin-Chi Lai, Yi-Chang Zhu, Szu-Ting Wang, Yen-Ching Chang, Ying-Hsiu Hung, Jhen-Kai Tang and Wen-Kai Tsai
Appl. Syst. Innov. 2025, 8(4), 108; https://doi.org/10.3390/asi8040108 (registering DOI) - 31 Jul 2025
Abstract
As voice cloning technology rapidly advances, the risk of personal voices being misused by malicious actors for fraud or other illegal activities has significantly increased, making the collection of speech data increasingly challenging. To address this issue, this study proposes a data augmentation [...] Read more.
As voice cloning technology rapidly advances, the risk of personal voices being misused by malicious actors for fraud or other illegal activities has significantly increased, making the collection of speech data increasingly challenging. To address this issue, this study proposes a data augmentation method based on XText-to-Speech (XTTS) synthesis to tackle the challenges of small-sample, multi-class speech recognition, using profanity as a case study to achieve high-accuracy keyword recognition. Two models were therefore evaluated: a CNN model (Proposed-I) and a CNN-Transformer hybrid model (Proposed-II). Proposed-I leverages local feature extraction, improving accuracy on a real human speech (RHS) test set from 55.35% without augmentation to 80.36% with XTTS-enhanced data. Proposed-II integrates CNN’s local feature extraction with Transformer’s long-range dependency modeling, further boosting test set accuracy to 88.90% while reducing the parameter count by approximately 41%, significantly enhancing computational efficiency. Compared to a previously proposed incremental architecture, the Proposed-II model achieves an 8.49% higher accuracy while reducing parameters by about 98.81% and MACs by about 98.97%, demonstrating exceptional resource efficiency. By utilizing XTTS and public corpora to generate a novel keyword speech dataset, this study enhances sample diversity and reduces reliance on large-scale original speech data. Experimental analysis reveals that an optimal synthetic-to-real speech ratio of 1:5 significantly improves the overall system accuracy, effectively addressing data scarcity. Additionally, the Proposed-I and Proposed-II models achieve accuracies of 97.54% and 98.66%, respectively, in distinguishing real from synthetic speech, demonstrating their strong potential for speech security and anti-spoofing applications. Full article
(This article belongs to the Special Issue Advancements in Deep Learning and Its Applications)
38 pages, 1539 KiB  
Article
Research on the Characteristics and Influencing Factors of Virtual Water Trade Networks in Chinese Provinces
by Guangyao Deng, Siqian Hou and Keyu Di
Sustainability 2025, 17(15), 6972; https://doi.org/10.3390/su17156972 (registering DOI) - 31 Jul 2025
Abstract
Promoting the sustainable development of virtual water trade is of great significance to safeguarding China’s water resource security and balanced regional economic growth. This study analyzes the virtual water trade network among 31 Chinese provinces based on multi-regional input–output tables from 2012, 2015, [...] Read more.
Promoting the sustainable development of virtual water trade is of great significance to safeguarding China’s water resource security and balanced regional economic growth. This study analyzes the virtual water trade network among 31 Chinese provinces based on multi-regional input–output tables from 2012, 2015, and 2017, using total trade decomposition, social network analysis, and exponential random graph models. The key findings are as follows: (1) The total virtual water trade volume remains stable, with Xinjiang, Jiangsu, and Guangdong as the core regions, while remote areas such as Shaanxi and Gansu have lower trade volumes. The primary industry dominates, and it is driven by simple value chains. (2) Provinces such as Xinjiang, Heilongjiang, and Jiangsu form the network’s core. Network density and symmetry increased from 2012 to 2015 but declined slightly in 2017, with efficiency peaking and then dropping, and the clustering coefficient decreased annually. Four economic sectors exhibit distinct interactions: frequent two-way flows in Sector 1, significant inflows in Sector 2, prominent net spillovers in Sector 3, and key brokers in Sector 4. (3) The network evolved from a core-periphery structure with weak ties to a stable, heterogeneous, and resilient system. (4) Influencing factors, such asper capita water resources, economic development, and population, significantly impact trade. Similarities in economic levels, population, and water endowments promote trade, while spatial distance has a limited effect, with geographic proximity showing a significant negative impact on long-distance trade. Full article
24 pages, 2410 KiB  
Article
Predictive Modeling and Simulation of CO2 Trapping Mechanisms: Insights into Efficiency and Long-Term Sequestration Strategies
by Oluchi Ejehu, Rouzbeh Moghanloo and Samuel Nashed
Energies 2025, 18(15), 4071; https://doi.org/10.3390/en18154071 (registering DOI) - 31 Jul 2025
Abstract
This study presents a comprehensive analysis of CO2 trapping mechanisms in subsurface reservoirs by integrating numerical reservoir simulations, geochemical modeling, and machine learning techniques to enhance the design and evaluation of carbon capture and storage (CCS) strategies. A two-dimensional reservoir model was [...] Read more.
This study presents a comprehensive analysis of CO2 trapping mechanisms in subsurface reservoirs by integrating numerical reservoir simulations, geochemical modeling, and machine learning techniques to enhance the design and evaluation of carbon capture and storage (CCS) strategies. A two-dimensional reservoir model was developed to simulate CO2 injection dynamics under realistic geomechanical and geochemical conditions, incorporating four primary trapping mechanisms: residual, solubility, mineralization, and structural trapping. To improve computational efficiency without compromising accuracy, advanced machine learning models, including random forest, gradient boosting, and decision trees, were deployed as smart proxy models for rapid prediction of trapping behavior across multiple scenarios. Simulation outcomes highlight the critical role of hysteresis, aquifer dynamics, and producer well placement in enhancing CO2 trapping efficiency and maintaining long-term storage stability. To support the credibility of the model, a qualitative validation framework was implemented by comparing simulation results with benchmarked field studies and peer-reviewed numerical models. These comparisons confirm that the modeled mechanisms and trends align with established CCS behavior in real-world systems. Overall, the study demonstrates the value of combining traditional reservoir engineering with data-driven approaches to optimize CCS performance, offering scalable, reliable, and secure solutions for long-term carbon sequestration. Full article
Show Figures

Figure 1

22 pages, 4399 KiB  
Article
Deep Learning-Based Fingerprint–Vein Biometric Fusion: A Systematic Review with Empirical Evaluation
by Sarah Almuwayziri, Abeer Al-Nafjan, Hessah Aljumah and Mashael Aldayel
Appl. Sci. 2025, 15(15), 8502; https://doi.org/10.3390/app15158502 (registering DOI) - 31 Jul 2025
Abstract
User authentication is crucial for safeguarding access to digital systems and services. Biometric authentication serves as a strong and user-friendly alternative to conventional security methods such as passwords and PINs, which are often susceptible to breaches. This study proposes a deep learning-based multimodal [...] Read more.
User authentication is crucial for safeguarding access to digital systems and services. Biometric authentication serves as a strong and user-friendly alternative to conventional security methods such as passwords and PINs, which are often susceptible to breaches. This study proposes a deep learning-based multimodal biometric system that combines fingerprint (FP) and finger vein (FV) modalities to improve accuracy and security. The system explores three fusion strategies: feature-level fusion (combining feature vectors from each modality), score-level fusion (integrating prediction scores from each modality), and a hybrid approach that leverages both feature and score information. The implementation involved five pretrained convolutional neural network (CNN) models: two unimodal (FP-only and FV-only) and three multimodal models corresponding to each fusion strategy. The models were assessed using the NUPT-FPV dataset, which consists of 33,600 images collected from 140 subjects with a dual-mode acquisition device in varied environmental conditions. The results indicate that the hybrid-level fusion with a dominant score weight (0.7 score, 0.3 feature) achieved the highest accuracy (99.79%) and the lowest equal error rate (EER = 0.0018), demonstrating superior robustness. Overall, the results demonstrate that integrating deep learning with multimodal fusion is highly effective for advancing scalable and accurate biometric authentication solutions suitable for real-world deployments. Full article
Show Figures

Figure 1

24 pages, 4753 KiB  
Article
A Secure Satellite Transmission Technique via Directional Variable Polarization Modulation with MP-WFRFT
by Zhiyu Hao, Zukun Lu, Xiangjun Li, Xiaoyu Zhao, Zongnan Li and Xiaohui Liu
Aerospace 2025, 12(8), 690; https://doi.org/10.3390/aerospace12080690 (registering DOI) - 31 Jul 2025
Abstract
Satellite communications are pivotal to global Internet access, connectivity, and the advancement of information warfare. Despite these importance, the open nature of satellite channels makes them vulnerable to eavesdropping, making the enhancement of interception resistance in satellite communications a critical issue in both [...] Read more.
Satellite communications are pivotal to global Internet access, connectivity, and the advancement of information warfare. Despite these importance, the open nature of satellite channels makes them vulnerable to eavesdropping, making the enhancement of interception resistance in satellite communications a critical issue in both academic and industrial circles. Within the realm of satellite communications, polarization modulation and quadrature techniques are essential for information transmission and interference suppression. To boost electromagnetic countermeasures in complex battlefield scenarios, this paper integrates multi-parameter weighted-type fractional Fourier transform (MP-WFRFT) with directional modulation (DM) algorithms, building upon polarization techniques. Initially, the operational mechanisms of the polarization-amplitude-phase modulation (PAPM), MP-WFRFT, and DM algorithms are elucidated. Secondly, it introduces a novel variable polarization-amplitude-phase modulation (VPAPM) scheme that integrates variable polarization with amplitude-phase modulation. Subsequently, leveraging the VPAPM modulation scheme, an exploration of the anti-interception capabilities of MP-WFRFT through parameter adjustment is presented. Rooted in an in-depth analysis of simulation data, the anti-scanning capabilities of MP-WFRFT are assessed in terms of scale vectors in the horizontal and vertical direction. Finally, exploiting the potential of the robust anti-scanning capabilities of MP-WFRFT and the directional property of antenna arrays in DM, the paper proposes a secure transmission technique employing directional variable polarization modulation with MP-WFRFT. The performance simulation analysis demonstrates that the integration of MP-WFRFT and DM significantly outperforms individual secure transmission methods, improving anti-interception performance by at least an order of magnitude at signal-to-noise ratios above 10 dB. Consequently, this approach exhibits considerable potential and engineering significance for its application within satellite communication systems. Full article
(This article belongs to the Section Astronautics & Space Science)
Show Figures

Figure 1

31 pages, 434 KiB  
Article
A Unified Method for Selecting Parameters and Primitive Elements in 2 × 2 Matrix Fields for Cryptographic Protocols
by Alimzhan Baikenov, Emil Faure, Anatoly Shcherba, Viktor Khaliavka, Sakhybay Tynymbayev and Olga Abramkina
Symmetry 2025, 17(8), 1212; https://doi.org/10.3390/sym17081212 (registering DOI) - 31 Jul 2025
Abstract
This paper introduces a novel method for selecting parameters of finite fields formed by 2 × 2 matrices over a finite field of integers modulo a prime p. The method aims to simultaneously determine both the field parameters and primitive elements, thereby [...] Read more.
This paper introduces a novel method for selecting parameters of finite fields formed by 2 × 2 matrices over a finite field of integers modulo a prime p. The method aims to simultaneously determine both the field parameters and primitive elements, thereby optimizing the construction of cryptographic algorithms. The proposed approach leverages the properties of quadratic residues and non-residues, simplifying the process of finding matrix field parameters while maintaining computational efficiency. The method is particularly effective when the prime number p is either a Mersenne prime or (p + 1)/2 is also a prime. This study demonstrates that the resulting matrix fields can be practically computed, offering a high degree of flexibility for cryptographic protocols such as key agreement and secure data transmission. Compared to previous methods, the new method reduces the parameter search space and provides a structured way to identify primitive elements without the need for a separate search procedure. The findings have significant implications for the development of efficient cryptographic systems using matrix-based finite fields. Full article
(This article belongs to the Section Computer)
21 pages, 2909 KiB  
Article
Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks
by Amarudin Daulay, Kalamullah Ramli, Ruki Harwahyu, Taufik Hidayat and Bernardi Pranggono
Mathematics 2025, 13(15), 2471; https://doi.org/10.3390/math13152471 (registering DOI) - 31 Jul 2025
Abstract
Malware evolution presents growing security threats for resource-constrained Internet of Medical Things (IoMT) devices. Conventional federated learning (FL) often suffers from slow convergence, high communication overhead, and fairness issues in dynamic IoMT environments. In this paper, we propose FedGCL, a secure and efficient [...] Read more.
Malware evolution presents growing security threats for resource-constrained Internet of Medical Things (IoMT) devices. Conventional federated learning (FL) often suffers from slow convergence, high communication overhead, and fairness issues in dynamic IoMT environments. In this paper, we propose FedGCL, a secure and efficient FL framework integrating contrastive graph representation learning for enhanced feature discrimination, a Jain-index-based fairness-aware aggregation mechanism, an adaptive synchronization scheduler to optimize communication rounds, and secure aggregation via homomorphic encryption within a Trusted Execution Environment. We evaluate FedGCL on four benchmark malware datasets (Drebin, Malgenome, Kronodroid, and TUANDROMD) using 5 to 15 graph neural network clients over 20 communication rounds. Our experiments demonstrate that FedGCL achieves 96.3% global accuracy within three rounds and converges to 98.9% by round twenty—reducing required training rounds by 45% compared to FedAvg—while incurring only approximately 10% additional computational overhead. By preserving patient data privacy at the edge, FedGCL enhances system resilience without sacrificing model performance. These results indicate FedGCL’s promise as a secure, efficient, and fair federated malware detection solution for IoMT ecosystems. Full article
Show Figures

Figure 1

26 pages, 2059 KiB  
Article
Integration and Development Path of Smart Grid Technology: Technology-Driven, Policy Framework and Application Challenges
by Tao Wei, Haixia Li and Junfeng Miao
Processes 2025, 13(8), 2428; https://doi.org/10.3390/pr13082428 (registering DOI) - 31 Jul 2025
Abstract
As a key enabling technology for energy transition, the smart grid is propelling the global power system to evolve toward greater efficiency, reliability, and sustainability. Based on the three-dimensional analysis framework of “technology–policy–application”, this study systematically sorts out the technical architecture, regional development [...] Read more.
As a key enabling technology for energy transition, the smart grid is propelling the global power system to evolve toward greater efficiency, reliability, and sustainability. Based on the three-dimensional analysis framework of “technology–policy–application”, this study systematically sorts out the technical architecture, regional development mode, and typical application scenarios of the smart grid, revealing the multi-dimensional challenges that it faces. By using the methods of literature review, cross-national case comparison, and technology–policy collaborative analysis, the differentiated paths of China, the United States, and Europe in the development of smart grids are compared, aiming to promote the integration and development of smart grid technologies. From a technical perspective, this paper proposes a collaborative framework comprising the perception layer, network layer, and decision-making layer. Additionally, it analyzes the integration pathways of critical technologies, including sensors, communication protocols, and artificial intelligence. At the policy level, by comparing the differentiated characteristics in policy orientation and market mechanisms among China, the United States, and Europe, the complementarity between government-led and market-driven approaches is pointed out. At the application level, this study validates the practical value of smart grids in optimizing energy management, enhancing power supply reliability, and promoting renewable energy consumption through case analyses in urban smart energy systems, rural electrification, and industrial sectors. Further research indicates that insufficient technical standardization, data security risks, and the lack of policy coordination are the core bottlenecks restricting the large-scale development of smart grids. This paper proposes that a new type of intelligent and resilient power system needs to be constructed through technological innovation, policy coordination, and international cooperation, providing theoretical references and practical paths for energy transition. Full article
Show Figures

Figure 1

26 pages, 5549 KiB  
Article
Intrusion Detection and Real-Time Adaptive Security in Medical IoT Using a Cyber-Physical System Design
by Faeiz Alserhani
Sensors 2025, 25(15), 4720; https://doi.org/10.3390/s25154720 (registering DOI) - 31 Jul 2025
Abstract
The increasing reliance on Medical Internet of Things (MIoT) devices introduces critical cybersecurity vulnerabilities, necessitating advanced, adaptive defense mechanisms. Recent cyber incidents—such as compromised critical care systems, modified therapeutic device outputs, and fraudulent clinical data inputs—demonstrate that these threats now directly impact life-critical [...] Read more.
The increasing reliance on Medical Internet of Things (MIoT) devices introduces critical cybersecurity vulnerabilities, necessitating advanced, adaptive defense mechanisms. Recent cyber incidents—such as compromised critical care systems, modified therapeutic device outputs, and fraudulent clinical data inputs—demonstrate that these threats now directly impact life-critical aspects of patient security. In this paper, we introduce a machine learning-enabled Cognitive Cyber-Physical System (ML-CCPS), which is designed to identify and respond to cyber threats in MIoT environments through a layered cognitive architecture. The system is constructed on a feedback-looped architecture integrating hybrid feature modeling, physical behavioral analysis, and Extreme Learning Machine (ELM)-based classification to provide adaptive access control, continuous monitoring, and reliable intrusion detection. ML-CCPS is capable of outperforming benchmark classifiers with an acceptable computational cost, as evidenced by its macro F1-score of 97.8% and an AUC of 99.1% when evaluated with the ToN-IoT dataset. Alongside classification accuracy, the framework has demonstrated reliable behaviour under noisy telemetry, maintained strong efficiency in resource-constrained settings, and scaled effectively with larger numbers of connected devices. Comparative evaluations, radar-style synthesis, and ablation studies further validate its effectiveness in real-time MIoT environments and its ability to detect novel attack types with high reliability. Full article
Show Figures

Figure 1

36 pages, 2671 KiB  
Article
DIKWP-Driven Artificial Consciousness for IoT-Enabled Smart Healthcare Systems
by Yucong Duan and Zhendong Guo
Appl. Sci. 2025, 15(15), 8508; https://doi.org/10.3390/app15158508 (registering DOI) - 31 Jul 2025
Abstract
This study presents a DIKWP-driven artificial consciousness framework for IoT-enabled smart healthcare, integrating a Data–Information–Knowledge–Wisdom–Purpose (DIKWP) cognitive architecture with a software-defined IoT infrastructure. The proposed system deploys DIKWP agents at edge and cloud nodes to transform raw sensor data into high-level knowledge and [...] Read more.
This study presents a DIKWP-driven artificial consciousness framework for IoT-enabled smart healthcare, integrating a Data–Information–Knowledge–Wisdom–Purpose (DIKWP) cognitive architecture with a software-defined IoT infrastructure. The proposed system deploys DIKWP agents at edge and cloud nodes to transform raw sensor data into high-level knowledge and purpose-driven actions. This is achieved through a structured DIKWP pipeline—from data acquisition and information processing to knowledge extraction, wisdom inference, and purpose-driven decision-making—that enables semantic reasoning, adaptive goal-driven responses, and privacy-preserving decision-making in healthcare environments. The architecture integrates wearable sensors, edge computing nodes, and cloud services to enable dynamic task orchestration and secure data fusion. For evaluation, a smart healthcare scenario for early anomaly detection (e.g., arrhythmia and fever) was implemented using wearable devices with coordinated edge–cloud analytics. Simulated experiments on synthetic vital sign datasets achieved approximately 98% anomaly detection accuracy and up to 90% reduction in communication overhead compared to cloud-centric solutions. Results also demonstrate enhanced explainability via traceable decisions across DIKWP layers and robust performance under intermittent connectivity. These findings indicate that the DIKWP-driven approach can significantly advance IoT-based healthcare by providing secure, explainable, and adaptive services aligned with clinical objectives and patient-centric care. Full article
(This article belongs to the Special Issue IoT in Smart Cities and Homes, 2nd Edition)
Show Figures

Figure 1

29 pages, 1119 KiB  
Systematic Review
Phishing Attacks in the Age of Generative Artificial Intelligence: A Systematic Review of Human Factors
by Raja Jabir, John Le and Chau Nguyen
AI 2025, 6(8), 174; https://doi.org/10.3390/ai6080174 (registering DOI) - 31 Jul 2025
Abstract
Despite the focus on improving cybersecurity awareness, the number of cyberattacks has increased significantly, leading to huge financial losses, with their risks spreading throughout the world. This is due to the techniques deployed in cyberattacks that mainly aim at exploiting humans, the weakest [...] Read more.
Despite the focus on improving cybersecurity awareness, the number of cyberattacks has increased significantly, leading to huge financial losses, with their risks spreading throughout the world. This is due to the techniques deployed in cyberattacks that mainly aim at exploiting humans, the weakest link in any defence system. The existing literature on human factors in phishing attacks is limited and does not live up to the witnessed advances in phishing attacks, which have become exponentially more dangerous with the introduction of generative artificial intelligence (GenAI). This paper studies the implications of AI advancement, specifically the exploitation of GenAI and human factors in phishing attacks. We conduct a systematic literature review to study different human factors exploited in phishing attacks, potential solutions and preventive measures, and the complexity introduced by GenAI-driven phishing attacks. This paper aims to address the gap in the research by providing a deeper understanding of the evolving landscape of phishing attacks with the application of GenAI and associated human implications, thereby contributing to the field of knowledge to defend against phishing attacks by creating secure digital interactions. Full article
Show Figures

Figure 1

16 pages, 2174 KiB  
Article
TwinFedPot: Honeypot Intelligence Distillation into Digital Twin for Persistent Smart Traffic Security
by Yesin Sahraoui, Abdessalam Mohammed Hadjkouider, Chaker Abdelaziz Kerrache and Carlos T. Calafate
Sensors 2025, 25(15), 4725; https://doi.org/10.3390/s25154725 (registering DOI) - 31 Jul 2025
Abstract
The integration of digital twins (DTs) with intelligent traffic systems (ITSs) holds strong potential for improving real-time management in smart cities. However, securing digital twins remains a significant challenge due to the dynamic and adversarial nature of cyber–physical environments. In this work, we [...] Read more.
The integration of digital twins (DTs) with intelligent traffic systems (ITSs) holds strong potential for improving real-time management in smart cities. However, securing digital twins remains a significant challenge due to the dynamic and adversarial nature of cyber–physical environments. In this work, we propose TwinFedPot, an innovative digital twin-based security architecture that combines honeypot-driven data collection with Zero-Shot Learning (ZSL) for robust and adaptive cyber threat detection without requiring prior sampling. The framework leverages Inverse Federated Distillation (IFD) to train the DT server, where edge-deployed honeypots generate semantic predictions of anomalous behavior and upload soft logits instead of raw data. Unlike conventional federated approaches, TwinFedPot reverses the typical knowledge flow by distilling collective intelligence from the honeypots into a central teacher model hosted on the DT. This inversion allows the system to learn generalized attack patterns using only limited data, while preserving privacy and enhancing robustness. Experimental results demonstrate significant improvements in accuracy and F1-score, establishing TwinFedPot as a scalable and effective defense solution for smart traffic infrastructures. Full article
Show Figures

Figure 1

Back to TopTop