Security, Governance, and Challenges of the New Generation of Cyber-Physical-Social Systems, Volume II

  • 4,056

    Total downloads

  • 27k

    Total views and downloads

About this Research Topic

This Research Topic is still accepting articles.

Background

This Research Topic is Volume II of a series. The previous volume can be found here:
Security, Governance, and Challenges of the New Generation of Cyber-Physical-Social Systems

In recent years, the transformation of devices and systems into intelligent, interconnected entities has given rise to concepts widely recognized as the Internet of Things (IoT) and cyber-physical systems (CPSs). The integration of social networks with CPSs leads to an innovative paradigm known as cyber-physical-social systems (CPSSs). The CPSS, harmonizing the cyber, physical, and social spaces, constitutes the next evolution of intelligent systems. It is founded on the integration of embedded systems, computer networks, control theory, and sensor networks. A typical CPSS is comprised of sensors, controllers, actuators, and communication networks. Its salience is found in the seamless connection of physical devices to the Internet and social networks, thereby imbuing these devices with capabilities such as computation, communication, precise control, remote coordination, and autonomy. The applicability of CPSS spans diverse fields, including intelligent transportation systems, telemedicine, smart grid technology, aerospace, smart home appliances, environmental monitoring, intelligent buildings, defense systems, and weaponry. Thus, CPSS stands as a vital component in a nation's essential infrastructure."

CPSS (Cyber-Physical-Social Systems) exhibit a range of distinctive features, including the amalgamation of human and computer intelligence, the integration across various spatial domains, inherent network heterogeneity, and the incorporation of multi-source information. In the context of CPSS, data serves as a vital link, seamlessly connecting the three principal components: cyber systems, physical mechanisms, and social constructs. The information derived from physical and social systems is conveyed to the corresponding information system via network channels. Simultaneously, this information system reciprocates by supplying feedback to the physical and social domains through meticulous computation and informed decision-making processes. Nevertheless, the heterogeneous nature of CPSS, coupled with their reliance on confidential and sensitive data, and expansive deployment, make them susceptible to an array of security threats. These threats span across the cyber, physical, and social realms, and present significant challenges related to privacy and trust.

This Research Topic is devoted to the presentation of original research and insightful reviews, emphasizing innovations and enhancements within the domains of advanced attacks, system security, privacy, and trust technology in Cyber-Physical Social Systems (CPSS). Particular attention is given to submissions that explore detection and defense strategies employing artificial intelligence and big data. This encompasses a broad array of topics, including but not limited to, theoretical foundations, design methodologies, modeling techniques, configuration approaches, representational frameworks, data processing mechanisms, analytical methods, and their relevant applications within the context of CPSS. Contributions in the form of original research articles as well as comprehensive review pieces are cordially invited.

Potential topics include but are not limited to the following:
• Evolvable and scalable CPSS architecture
• Trustworthiness and convergence of large-scale routing in CPSS
• Complex autonomous network management of cross-domain access by CPSS users
• Network intrusion detection and information transmission security
• Defense technology of intelligent sensor systems
• Artificial intelligence technology for improvement of network security
• Collaborative learning for network service optimization
• Cyberspace data security and privacy protection
• Anonymous communication systems
• Network protocol vulnerability analysis and mining
• Host-based intrusion detection system IDS

Article types and fees

This Research Topic accepts the following article types, unless otherwise specified in the Research Topic description:

  • Brief Research Report
  • Editorial
  • FAIR² Data
  • FAIR² DATA Direct Submission
  • General Commentary
  • Mini Review
  • Original Research
  • Perspective
  • Review

Articles that are accepted for publication by our external editors following rigorous peer review incur a publishing fee charged to Authors, institutions, or funders.

Keywords: -

Important note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.

Topic editors

Manuscripts can be submitted to this Research Topic via the main journal or any other participating journal.

Impact

  • 27kTopic views
  • 20kArticle views
  • 4,056Article downloads
View impact