{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:28:42Z","timestamp":1740122922904,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"26","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11042-023-15172-9","type":"journal-article","created":{"date-parts":[[2023,4,3]],"date-time":"2023-04-03T06:15:52Z","timestamp":1680502552000},"page":"40085-40103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A novel embedded system for cyber-physical system using crypto mechanism"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2924-8459","authenticated-orcid":false,"given":"S. M. K.","family":"Chaitanya","sequence":"first","affiliation":[]},{"given":"Nagadeepa","family":"Choppakatla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,1]]},"reference":[{"key":"15172_CR1","doi-asserted-by":"publisher","first-page":"208195","DOI":"10.1109\/ACCESS.2020.3036713","volume":"8","author":"H Abbas","year":"2020","unstructured":"Abbas H, Suguri H, Yan Z, Allen W, Hei XS (2020) IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems. IEEE Access 8:208195\u2013208198. https:\/\/doi.org\/10.1109\/ACCESS.2020.3036713","journal-title":"IEEE Access"},{"key":"15172_CR2","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.cose.2017.04.005","volume":"68","author":"Y Ashibani","year":"2017","unstructured":"Ashibani Y, Mahmoud QH (2017) Cyber physical systems security: Analysis, challenges and solutions. Comput Secur 68:81\u201397. https:\/\/doi.org\/10.1016\/j.cose.2017.04.005","journal-title":"Comput Secur"},{"key":"15172_CR3","doi-asserted-by":"publisher","unstructured":"Barkalov A, Titarenko L, Mazurkiewicz M (2019) Foundations of embedded systems. Springer International Publishing, Cham, Switzerland, Vol. 195. https:\/\/doi.org\/10.1007\/978-3-030-11961-4","DOI":"10.1007\/978-3-030-11961-4"},{"key":"15172_CR4","doi-asserted-by":"publisher","first-page":"54371","DOI":"10.1109\/ACCESS.2020.2981415","volume":"8","author":"U Bodkhe","year":"2020","unstructured":"Bodkhe U, Mehta D, Tanwar S et al (2020) A survey on decentralized consensus mechanisms for cyber physical systems. IEEE Access 8:54371\u201354401. https:\/\/doi.org\/10.1109\/ACCESS.2020.2981415","journal-title":"IEEE Access"},{"issue":"12","key":"15172_CR5","doi-asserted-by":"publisher","first-page":"3337","DOI":"10.1109\/TCSII.2020.2971580","volume":"67","author":"Y Choi","year":"2020","unstructured":"Choi Y, Sim J, Kim LS (2020) CREMON: Cryptography Embedded on the Convolutional Neural Network Accelerator. IEEE Trans Circuits Syst II Express Briefs 67(12):3337\u20133341. https:\/\/doi.org\/10.1109\/TCSII.2020.2971580","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"issue":"4","key":"15172_CR6","doi-asserted-by":"publisher","first-page":"2496","DOI":"10.1109\/TNSM.2020.3007535","volume":"17","author":"G Choudhary","year":"2020","unstructured":"Choudhary G, Astillo PV, You I et al (2020) Lightweight misbehavior detection management of embedded IoT devices in medical cyber physical systems. IEEE Trans Netw Serv Manag 17(4):2496\u20132510. https:\/\/doi.org\/10.1109\/TNSM.2020.3007535","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"15172_CR7","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.comnet.2018.01.039","volume":"134","author":"W Feng","year":"2018","unstructured":"Feng W, Qin Y, Zhao S, Feng D (2018) AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS. Comput Netw 134:167\u2013182. https:\/\/doi.org\/10.1016\/j.comnet.2018.01.039","journal-title":"Comput Netw"},{"issue":"10","key":"15172_CR8","doi-asserted-by":"publisher","first-page":"6553","DOI":"10.1109\/TII.2019.2963728","volume":"16","author":"J Huang","year":"2020","unstructured":"Huang J, Kong L, Dai HN, Ding W et al (2020) Blockchain-based mobile crowdsensing in industrial systems. IEEE Trans Industr Inform 16(10):6553\u20136563. https:\/\/doi.org\/10.1109\/TII.2019.2963728","journal-title":"IEEE Trans Industr Inform"},{"issue":"10","key":"15172_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-019-1445-8","volume":"43","author":"HM Hussien","year":"2019","unstructured":"Hussien HM, Yasin SM, Udzir SNI et al (2019) A systematic review for enabling of develop a blockchain technology in healthcare application: taxonomy, substantially analysis, motivations, challenges, recommendations and future direction. J Med Syst 43(10):1\u201335. https:\/\/doi.org\/10.1007\/s10916-019-1445-8","journal-title":"J Med Syst"},{"key":"15172_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.micpro.2017.10.013","volume":"56","author":"S Janakiraman","year":"2018","unstructured":"Janakiraman S, Thenmozhi K, Rayappan JBB et al (2018) Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller. Microprocess Microsyst 56:1\u201312. https:\/\/doi.org\/10.1016\/j.micpro.2017.10.013","journal-title":"Microprocess Microsyst"},{"key":"15172_CR11","doi-asserted-by":"publisher","first-page":"101739","DOI":"10.1016\/j.sysarc.2020.101739","volume":"107","author":"W Jiang","year":"2020","unstructured":"Jiang W, Wen L, Zhan J, Jiang K (2020) Design optimization of confidentiality-critical cyber physical systems with fault detection. J Syst Archit 107:101739. https:\/\/doi.org\/10.1016\/j.sysarc.2020.101739","journal-title":"J Syst Archit"},{"key":"15172_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2021.3135948","author":"X Jin","year":"2021","unstructured":"Jin X, Jing P, Wu J, Xu J, Su Y (2021) Visual Sentiment Classification via Low-rank Regularization and Label Relaxation. IEEE Trans Cogn Dev Syst. https:\/\/doi.org\/10.1109\/TCDS.2021.3135948","journal-title":"IEEE Trans Cogn Dev Syst"},{"key":"15172_CR13","doi-asserted-by":"publisher","first-page":"40993","DOI":"10.1007\/s11042-022-13001-z","volume":"81","author":"X Jin","year":"2022","unstructured":"Jin X, He Z, Xu J, Wang Y, Su Y (2022) Video splicing detection and localization based on multi-level deep feature fusion and reinforcement learning. Multimed Tools Appl 81:40993\u201341011. https:\/\/doi.org\/10.1007\/s11042-022-13001-z","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"15172_CR14","doi-asserted-by":"publisher","first-page":"7632","DOI":"10.1109\/TCSVT.2022.3180274","volume":"32","author":"X Jin","year":"2022","unstructured":"Jin X, Yi K, Xu J (2022) MoADNet: Mobile Asymmetric Dual-Stream Networks for Real-Time and Lightweight RGB-D Salient Object Detection. IEEE Trans Circuits Syst Video Technol 32(11):7632\u20137645. https:\/\/doi.org\/10.1109\/TCSVT.2022.3180274","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"25","key":"15172_CR15","doi-asserted-by":"publisher","first-page":"35733","DOI":"10.1007\/s11042-021-11126-1","volume":"81","author":"X Jin","year":"2022","unstructured":"Jin X, He Z, Wang Y, Yu J, Xu J (2022) Towards general object-based video forgery detection via dual-stream networks and depth information embedding. Multimed Tools Appl 81(25):35733\u201335749. https:\/\/doi.org\/10.1007\/s11042-021-11126-1","journal-title":"Multimed Tools Appl"},{"key":"15172_CR16","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1016\/j.neucom.2022.04.015","volume":"491","author":"X Jin","year":"2022","unstructured":"Jin X, Guo C, He Z, Xu J, Wang Y, Su Y (2022) FCMNet: Frequency-aware cross-modality attention networks for RGB-D salient object detection. Neurocomputing 491:414\u2013425. https:\/\/doi.org\/10.1016\/j.neucom.2022.04.015","journal-title":"Neurocomputing"},{"key":"15172_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09925-z","author":"D Ko","year":"2020","unstructured":"Ko D, Lee S, Park J (2020) A study on manufacturing facility safety system using multimedia tools for cyber physical systems. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-09925-z","journal-title":"Multimed Tools Appl"},{"key":"15172_CR18","doi-asserted-by":"publisher","first-page":"14031","DOI":"10.1007\/s11042-020-08631-0","volume":"79","author":"AR Kumar","year":"2020","unstructured":"Kumar AR, Sivagami A (2020) Fuzzy based malicious node detection and security-aware multipath routing for wireless multimedia sensor network. Multimed Tools Appl 79:14031\u201314051. https:\/\/doi.org\/10.1007\/s11042-020-08631-0","journal-title":"Multimed Tools Appl"},{"key":"15172_CR19","doi-asserted-by":"publisher","first-page":"100938","DOI":"10.1016\/j.aei.2019.100938","volume":"42","author":"X Li","year":"2019","unstructured":"Li X, Shen GQ, Wu P, Xue F, Chi H, Li CZ (2019) Developing a conceptual framework of smart work packaging for constraints management in prefabrication housing production. Adv Eng Inform 42:100938. https:\/\/doi.org\/10.1016\/j.aei.2019.100938","journal-title":"Adv Eng Inform"},{"key":"15172_CR20","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/j.future.2018.09.002","volume":"92","author":"W Liang","year":"2019","unstructured":"Liang W, Long J, Weng TH et al (2019) TBRS: A trust based recommendation scheme for vehicular CPS network. Future Gener Comput Syst 92:383\u2013398. https:\/\/doi.org\/10.1016\/j.future.2018.09.002","journal-title":"Future Gener Comput Syst"},{"key":"15172_CR21","doi-asserted-by":"publisher","first-page":"29451","DOI":"10.1007\/s11042-020-09379-3","volume":"79","author":"Q Lingfeng","year":"2020","unstructured":"Lingfeng Q, hongjie H, fan C (2020) Security analysis of multiple permutation encryption adopt in reversible data hiding. Multimed Tools Appl 79:29451\u201329471. https:\/\/doi.org\/10.1007\/s11042-020-09379-3","journal-title":"Multimed Tools Appl"},{"issue":"18","key":"15172_CR22","doi-asserted-by":"publisher","first-page":"14753","DOI":"10.1007\/s00521-020-04830-w","volume":"32","author":"S Mahdavifar","year":"2020","unstructured":"Mahdavifar S, Ghorbani AA (2020) DeNNeS: deep embedded neural network expert system for detecting cyber attacks. Neural Comput Appl 32(18):14753\u201314780. https:\/\/doi.org\/10.1007\/s00521-020-04830-w","journal-title":"Neural Comput Appl"},{"issue":"1\u20132","key":"15172_CR23","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1504\/IJICT.2009.026432","volume":"2","author":"VP Nambiar","year":"2009","unstructured":"Nambiar VP, Khalil-Hani M, Zabidi MM (2009) Accelerating the AES encryption function in OpenSSL for embedded systems. Int J Inf Commun Technol 2(1\u20132):83\u201393. https:\/\/doi.org\/10.1504\/IJICT.2009.026432","journal-title":"Int J Inf Commun Technol"},{"key":"15172_CR24","doi-asserted-by":"publisher","first-page":"103068","DOI":"10.1016\/j.micpro.2020.103068","volume":"75","author":"X Niu","year":"2020","unstructured":"Niu X, Yuan X, Zhou Y, Fan H (2020) UAV track planning based on evolution algorithm in embedded system. Microprocess Microsyst 75:103068. https:\/\/doi.org\/10.1016\/j.micpro.2020.103068","journal-title":"Microprocess Microsyst"},{"issue":"1","key":"15172_CR25","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/RITA.2020.2978416","volume":"15","author":"L Ordinez","year":"2020","unstructured":"Ordinez L, Eggly G, Micheletto M et al (2020) Using UML for learning how to design and model cyber-physical systems. IEEE Revista Iberoamericana de Tecnologias del Aprendizaje 15(1):50\u201360. https:\/\/doi.org\/10.1109\/RITA.2020.2978416","journal-title":"IEEE Revista Iberoamericana de Tecnologias del Aprendizaje"},{"key":"15172_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-27562-4_30","author":"F Palumbo","year":"2019","unstructured":"Palumbo F, Fanni T, Sau C et al (2019) Hardware\/software self-adaptation in CPS: the CERBERO project approach. Int Conf Embed Comput Syst Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-27562-4_30","journal-title":"Int Conf Embed Comput Syst Springer, Cham"},{"issue":"1","key":"15172_CR27","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/TDSC.2018.2883057","volume":"18","author":"B Poudel","year":"2018","unstructured":"Poudel B, Munir A (2018) Design and evaluation of a reconfigurable ecu architecture for secure and dependable automotive cps. IEEE Trans Depend Secure Comput 18(1):235\u2013252. https:\/\/doi.org\/10.1109\/TDSC.2018.2883057","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"15172_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11254-8","author":"D Sharma","year":"2021","unstructured":"Sharma D, Selwal A (2021) An intelligent approach for fingerprint presentation attack detection using ensemble learning with improved local image features. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-021-11254-8","journal-title":"Multimed Tools Appl"},{"key":"15172_CR29","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1016\/j.procs.2019.09.101","volume":"158","author":"D Ulas","year":"2019","unstructured":"Ulas D (2019) Digital transformation process and SMEs. Procedia Comput Sci 158:662\u2013671. https:\/\/doi.org\/10.1016\/j.procs.2019.09.101","journal-title":"Procedia Comput Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15172-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15172-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15172-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T09:20:35Z","timestamp":1698052835000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15172-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":29,"journal-issue":{"issue":"26","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["15172"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15172-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,4,1]]},"assertion":[{"value":"14 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All applicable institutional and\/or national guidelines for the care and use of animals were followed.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"For this type of study formal consent is not required.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"The authors declare that they have no potential conflict of interest.\u00a0","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}