{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T05:42:10Z","timestamp":1775194930769,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T00:00:00Z","timestamp":1624665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T00:00:00Z","timestamp":1624665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s00500-021-05926-8","type":"journal-article","created":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T18:02:15Z","timestamp":1624730535000},"page":"12319-12332","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":98,"title":["Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques"],"prefix":"10.1007","volume":"25","author":[{"given":"Ahmad Ali","family":"AlZubi","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Al-Maitah","sequence":"additional","affiliation":[]},{"given":"Abdulaziz","family":"Alarifi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,26]]},"reference":[{"issue":"8938","key":"5926_CR1","first-page":"8938","volume":"2252","author":"F Abdali-Mohammadi","year":"2020","unstructured":"Abdali-Mohammadi F, Meqdad MN, Kadry S (2020) Development of an IoT-based and cloud-based disease prediction and diagnosis system for healthcare using machine learning algorithms. Int J ArtifIntell ISSN 2252(8938):8938","journal-title":"Int J ArtifIntell ISSN"},{"key":"5926_CR3","doi-asserted-by":"crossref","unstructured":"Al-Maitah M, AlZubi AA, Alarifi A (2019) An optimal storage utilization technique for IoT devices using sequential machine learning. Comput Netw 152:98-105","DOI":"10.1016\/j.comnet.2019.01.025"},{"issue":"3","key":"5926_CR4","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1504\/IJITST.2019.101827","volume":"9","author":"MN Al-Mhiqani","year":"2019","unstructured":"Al-Mhiqani MN, Ahmad R, Abidin ZZ, Ali NS, Abdulkareem KH (2019) Review of cyber attacks classifications and threats analysis in cyber-physical systems. Int J Technol Secur Trans 9(3):282\u2013298","journal-title":"Int J Technol Secur Trans"},{"key":"5926_CR2","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.comcom.2019.08.002","volume":"148","author":"AA AlZubi","year":"2019","unstructured":"AlZubi AA (2019) An optimal sensor placement algorithm (O-SPA) for improving tracking precision of human activity in real-world healthcare systems. Comput Commun 148:98\u2013105","journal-title":"Comput Commun"},{"key":"5926_CR7","doi-asserted-by":"publisher","first-page":"20596","DOI":"10.1109\/ACCESS.2018.2817615","volume":"6","author":"M Elhoseny","year":"2018","unstructured":"Elhoseny M, Ram\u00edrez-Gonz\u00e1lez G, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596\u201320608","journal-title":"IEEE Access"},{"key":"5926_CR8","doi-asserted-by":"crossref","unstructured":"Farivar F, Haghighi MS, Jolfaei A, Alazab M (2019) Artificial intelligence for detection, estimation, and compensation of malicious attacks in nonlinear cyber-physical systems and industrial IoT. .IEEE Trans Ind Inform 16(4):2716\u20132725","DOI":"10.1109\/TII.2019.2956474"},{"key":"5926_CR9","doi-asserted-by":"crossref","unstructured":"Gopalakrishnan T, Ruby D, Al-Turjman F, Gupta D, Pustokhina IV, Pustokhin DA, Shankar K (2020) Deep learning enabled data offloading withcyberattack detection model in mobile edge computing systems. IEEE Access 8:185938\u2013185949","DOI":"10.1109\/ACCESS.2020.3030726"},{"key":"5926_CR10","doi-asserted-by":"crossref","unstructured":"Gupta R, Tanwar S, Al-Turjman F, Italiya P, Nauman A, Kim SW (2020) Smart contract privacy protection using AI in cyber-physical systems: tools, techniques and challenges. IEEE Access 8:24746\u201324772","DOI":"10.1109\/ACCESS.2020.2970576"},{"issue":"4","key":"5926_CR11","doi-asserted-by":"publisher","first-page":"3063","DOI":"10.1007\/s11227-019-03075-2","volume":"76","author":"MS Haghighi","year":"2020","unstructured":"Haghighi MS, Farivar F, Jolfaei A, Tadayon MH (2020) Intelligent robust control for cyber-physical systems of rotary gantry type under denial of service attack. J Supercomput 76(4):3063\u20133085","journal-title":"J Supercomput"},{"key":"5926_CR12","doi-asserted-by":"crossref","unstructured":"Hassan MU, Rehmani MH, Chen J (2019) Differential privacy techniques for cyber physical systems: a survey. IEEE Commun Surv Tutor 22(1):746\u2013789","DOI":"10.1109\/COMST.2019.2944748"},{"key":"5926_CR13","doi-asserted-by":"crossref","unstructured":"Iqbal R, Doctor F, More B, Mahmudand S, Yousuf U (2020) big data analytics and computational intelligence for cyber\u2013physical systems: recent trends and state of the art applications. Future Gener Comput Syst 105:766\u2013778","DOI":"10.1016\/j.future.2017.10.021"},{"key":"5926_CR14","doi-asserted-by":"crossref","unstructured":"Khan F, Ahamed J, Kadry S, Ramasamy LK (2020) Detecting malicious URLs using binary classification through ada boost algorithm. Int J Electr Comput Eng (2088\u20138708) 10","DOI":"10.11591\/ijece.v10i1.pp997-1005"},{"key":"5926_CR15","unstructured":"Kurde S, Shimpi J, Pawar R, Tingare B (2019) Cyber physical systems (CPS) and design automation for healthcare system: a new era of cyber computation for healthcare system. Structure 6(12)"},{"key":"5926_CR17","doi-asserted-by":"publisher","first-page":"65520","DOI":"10.1109\/ACCESS.2020.2985089","volume":"8","author":"SJ Lee","year":"2020","unstructured":"Lee SJ, Yoo PD, Asyhari AT, Jhi Y, Chermak L, Yeunand CY, Taha K (2020) IMPACT: Impersonation attack detection via edge computing using deep autoencoder and feature abstraction. IEEE Access 8:65520\u201365529","journal-title":"IEEE Access"},{"key":"5926_CR18","doi-asserted-by":"crossref","unstructured":"Marques G, Miranda N, Kumar Bhoi A, Garcia-Zapirain B, Hamrioui S, de la Torre D\u00edez I (2020) Internet of things and enhanced living environments: measuring and mapping air quality using cyber-physical systems and mobile computing technologies. Sensors 20(3):720","DOI":"10.3390\/s20030720"},{"key":"5926_CR19","doi-asserted-by":"publisher","first-page":"1258","DOI":"10.1016\/j.future.2018.06.007","volume":"108","author":"W Meng","year":"2020","unstructured":"Meng W, Li W, Wang Y, Au MH (2020) Detecting insider attacks in medical cyber\u2013physical networks based on behavioral profiling. Futur Gener Comput Syst 108:1258\u20131266","journal-title":"Futur Gener Comput Syst"},{"key":"5926_CR20","doi-asserted-by":"publisher","first-page":"158481","DOI":"10.1109\/ACCESS.2019.2945682","volume":"7","author":"M Poongodi","year":"2020","unstructured":"Poongodi M, Vijayakumar V, Al-Turjman F, Hamdi M, Ma M (2020) Intrusion prevention system for DDoS attack on VANET Withre CAPTCHA controller using information based metrics. IEEE Access 7:158481\u2013158491","journal-title":"IEEE Access"},{"key":"5926_CR21","doi-asserted-by":"crossref","unstructured":"Qi L, Chen Y, Yuan Y, Fu S, Zhang X, Xu X (2020) A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems. World Wide Web 23(2):1275\u20131297","DOI":"10.1007\/s11280-019-00684-y"},{"issue":"9","key":"5926_CR22","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1109\/JBHI.2020.2973467","volume":"24","author":"H Qiu","year":"2020","unstructured":"Qiu H, Qiu M, Liu M, Memmi G (2020) Secure health data sharing for medical cyber-physical systems for the healthcare 4.0. IEEE J Biomed Health Inform 24(9):2499\u20132505","journal-title":"IEEE J Biomed Health Inform"},{"issue":"10","key":"5926_CR23","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/s10916-018-1045-z","volume":"42","author":"PM Shakeel","year":"2018","unstructured":"Shakeel PM, Baskar S, Dhulipala VS, Mishra S, Jaber MM (2018) Maintaining security and privacy in health care system using learning based deep-Qnetworks. J Med Syst 42(10):186. https:\/\/doi.org\/10.1007\/s10916-018-1045-z","journal-title":"J Med Syst"},{"issue":"5","key":"5926_CR24","doi-asserted-by":"publisher","first-page":"1521","DOI":"10.3390\/s20051521","volume":"20","author":"H Shu","year":"2020","unstructured":"Shu H, Qi P, Huang Y, Chen F, Xie D, Sun L (2020) An efficient certificateless aggregate signature scheme for blockchain-based medical cyber physical systems. Sensors 20(5):1521","journal-title":"Sensors"},{"key":"5926_CR25","doi-asserted-by":"crossref","unstructured":"Shuwandy ML, Zaidan BB, Zaidan AA, Albahri AS, Alamoodi AH, Albahri OS, Alazab M (2020) mHealth authentication approach based 3D touchscreen and microphone sensors for real-time remote healthcare monitoring system, comprehensive review, open issues methodological aspects. Comp Sci Rev 38:100300","DOI":"10.1016\/j.cosrev.2020.100300"},{"key":"5926_CR26","unstructured":"Sivakumar R (2020) Cyber victimization: healthcare cyber-physical systems (H-Cpss) vulnerability issues and challenges. Criminol Victimol Through Look Glass 155"},{"issue":"3","key":"5926_CR27","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1504\/IJHPCN.2019.098570","volume":"13","author":"J Sliwa","year":"2019","unstructured":"Sliwa J (2019) Assessing complex evolving cyber-physical systems (case study: smart medical devices). Int J High Perform Comput Networking 13(3):294\u2013303","journal-title":"Int J High Perform Comput Networking"},{"key":"5926_CR28","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.future.2019.12.034","volume":"106","author":"D Tang","year":"2020","unstructured":"Tang D, Tang L, Dai R, Chen J, Li X, Rodrigues JJ (2020) Mf-adaboost: Ldos attack detection based on multi-features and improved adaboost\u2019. Futur Gener Comput Syst 106:347\u2013359","journal-title":"Futur Gener Comput Syst"},{"key":"5926_CR30","doi-asserted-by":"crossref","unstructured":"Verma P, Sood SK, Kaur H (2020) A fog-cloud based cyber physical system for ulcerative colitis diagnosis and stage classification and management. Microprocess Microsyst 72:102929","DOI":"10.1016\/j.micpro.2019.102929"},{"issue":"3","key":"5926_CR31","doi-asserted-by":"publisher","first-page":"1034","DOI":"10.1007\/s11036-018-1060-9","volume":"24","author":"V Vijayakumar","year":"2019","unstructured":"Vijayakumar V, Priyan MK, Ushadevi G, Varatharajan R, Manogaran G, Tarare PV (2019) E-health cloud security using timing enabled proxy re-encryption. Mobile Netw Appl 24(3):1034\u20131045","journal-title":"Mobile Netw Appl"},{"key":"5926_CR32","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.future.2015.10.004","volume":"61","author":"S Wang","year":"2016","unstructured":"Wang S, Lei T, Zhang L, Hsu CH, Yang F (2016) Offloading mobile data traffic for QoS-aware service provision in vehicular cyber-physical systems. Futur Gener Comput Syst 61:118\u2013127","journal-title":"Futur Gener Comput Syst"},{"key":"5926_CR33","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1016\/j.future.2018.06.012","volume":"108","author":"S Wang","year":"2020","unstructured":"Wang S, Guo Y, Li Y, Hsu CH (2020) Cultural distance for service composition in cyber\u2013physical\u2013social system. Futur Gener Comput Syst 108:1049\u20131057","journal-title":"Futur Gener Comput Syst"},{"key":"5926_CR34","doi-asserted-by":"crossref","unstructured":"Wazid M, Reshma Dsouza P, Das AK, Bhat KV, Kumar N, Rodrigues JJ (2019) RAD\u2010EI: a routing attack detection scheme for edge\u2010based internet of things environment. Int J Commun Syst 32(15):e4024","DOI":"10.1002\/dac.4024"},{"key":"5926_CR35","doi-asserted-by":"crossref","unstructured":"weerakkody s, ozel o, mo y, sinopoli b (2017) resilient control in cyber-physical systems: countering uncertainty, constraints, and adversarial behavior. Found Trends\u00ae Syst Control 7(1\u20132):1\u2013252","DOI":"10.1561\/2600000018"},{"key":"5926_CR36","doi-asserted-by":"crossref","unstructured":"Wu D, Zhu H, Zhu Y, Chang V, He C, Hsu CH, Huang Z (2020) Anomaly detection based on RBM-LSTM neural network for CPS in advanced driver assistance system. ACM Trans Cyber-Phys Sys 4(3):1\u201317","DOI":"10.1145\/3377408"},{"issue":"5","key":"5926_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-020-1527-7","volume":"44","author":"Z Xu","year":"2020","unstructured":"Xu Z, He D, Vijayakumar P, Choo KKR, Li L (2020) Efficient NTRU lattice-based certificateless signature scheme for medical cyber-physical systems. J Med Syst 44(5):1\u20138","journal-title":"J Med Syst"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-05926-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-021-05926-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-05926-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T11:17:07Z","timestamp":1629199027000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-021-05926-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,26]]},"references-count":33,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["5926"],"URL":"https:\/\/doi.org\/10.1007\/s00500-021-05926-8","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,26]]},"assertion":[{"value":"31 May 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}