首页 > 最新文献

Computers & Electrical Engineering最新文献

英文 中文
HP-ResNeXt: Hybrid Pyramid ResNeXt for Detection of Developmental Dysplasia of the Hip in X-ray Image HP-ResNeXt:混合金字塔ResNeXt在x射线图像中检测髋关节发育不良
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2026-01-22 DOI: 10.1016/j.compeleceng.2026.110942
G.V. Sriramakrishnan , Ashapu Bhavani , V. Srilakshmi , B. Kiran Kumar
Developmental Dysplasia of the Hip (DDH) is a disease which affects newborn babies and young children. In DDH, the acetabulum may be shallow, or the femoral head may not fit correctly, which causes dislocation or instability of the hip joint. The early detection of DDH failed while the symptoms were mild, which led to delayed treatment and caused severe complications. Thus, the Hybrid Pyramid ResNeXt (HP-ResNeXt) is developed for detecting DDH using hip X-radiation (X-ray) images. Hip X-ray images are sourced from a database, and unwanted noise is removed through a Gaussian Adaptive Bilateral Filter (GABF). Then, a noise-free image is passed to the misshapen pelvis landmark detection phase, where Pyramid Non-local UNet (PN-UNet) is used to identify the affected pelvis region. Entropy-based Local Neighborhood Difference Pattern (LNDP) features, and Gray Level Co-Occurrence Matrix (GLCM) are extracted. Finally, the HP-ResNeXt method is applied for DDH detection, which integrates the advantages of Pyramid Network (PyramidNet) and ResNeXt. The newly introduced HP-ResNeXt approach achieved a True Positive Rate (TPR) of 93.272%, a True Negative Rate (TNR) of 92.567%, and an accuracy of 92.588% with a K-value of 8.
髋关节发育不良(DDH)是一种影响新生儿和幼儿的疾病。在DDH中,髋臼可能很浅,或者股骨头可能不合适,这导致髋关节脱位或不稳定。由于DDH症状较轻,未能及早发现,导致治疗延误,造成严重并发症。因此,混合金字塔ResNeXt (HP-ResNeXt)被开发用于使用髋关节x射线(x射线)图像检测DDH。臀部x射线图像来自数据库,并通过高斯自适应双边滤波器(GABF)去除不需要的噪声。然后,将无噪声图像传递到畸形骨盆地标检测阶段,在此阶段使用金字塔非局部UNet (PN-UNet)识别受影响的骨盆区域。提取了基于熵的局部邻域差分模式(LNDP)特征和灰度共生矩阵(GLCM)。最后,将HP-ResNeXt方法应用于DDH检测,该方法融合了金字塔网络(PyramidNet)和ResNeXt的优点。新引入的HP-ResNeXt方法的真阳性率(TPR)为93.272%,真阴性率(TNR)为92.567%,准确率为92.588%,k值为8。
{"title":"HP-ResNeXt: Hybrid Pyramid ResNeXt for Detection of Developmental Dysplasia of the Hip in X-ray Image","authors":"G.V. Sriramakrishnan ,&nbsp;Ashapu Bhavani ,&nbsp;V. Srilakshmi ,&nbsp;B. Kiran Kumar","doi":"10.1016/j.compeleceng.2026.110942","DOIUrl":"10.1016/j.compeleceng.2026.110942","url":null,"abstract":"<div><div>Developmental Dysplasia of the Hip (DDH) is a disease which affects newborn babies and young children. In DDH, the acetabulum may be shallow, or the femoral head may not fit correctly, which causes dislocation or instability of the hip joint. The early detection of DDH failed while the symptoms were mild, which led to delayed treatment and caused severe complications. Thus, the Hybrid Pyramid ResNeXt (HP-ResNeXt) is developed for detecting DDH using hip X-radiation (X-ray) images. Hip X-ray images are sourced from a database, and unwanted noise is removed through a Gaussian Adaptive Bilateral Filter (GABF). Then, a noise-free image is passed to the misshapen pelvis landmark detection phase, where Pyramid Non-local UNet (PN-UNet) is used to identify the affected pelvis region. Entropy-based Local Neighborhood Difference Pattern (LNDP) features, and Gray Level Co-Occurrence Matrix (GLCM) are extracted. Finally, the HP-ResNeXt method is applied for DDH detection, which integrates the advantages of Pyramid Network (PyramidNet) and ResNeXt. The newly introduced HP-ResNeXt approach achieved a True Positive Rate (TPR) of 93.272%, a True Negative Rate (TNR) of 92.567%, and an accuracy of 92.588% with a K-value of 8.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110942"},"PeriodicalIF":4.9,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of radar signals modulation based on SVM using wavelet entropy and empirical mode decomposition entropy 基于小波熵和经验模态分解熵的支持向量机雷达信号调制分类
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2026-01-24 DOI: 10.1016/j.compeleceng.2026.110947
Jihao Zhang, Guangwei Zhang, Ping Li, Chang Liu, Peng Gong
Robust classification of radar signals under low signal-to-noise ratio (SNR) conditions is critical for target recognition, electronic warfare, and radar emitter identification. However, the performance of conventional methods deteriorates severely in noisy environments due to interference and clutter. This paper proposes an effective classification framework based on a Support Vector Machine (SVM) that exploits the joint discriminative power of wavelet entropy and empirical mode decomposition (EMD) entropy. These two entropy measures characterize the intrinsic complexity and time–frequency structure of radar signals corrupted by noise and are combined into a compact two-dimensional feature vector. Extensive experiments on three representative radar modulation types—pulse Doppler (PD), linear frequency modulation (LFM), and pseudo-code phase modulation (PCPM)—demonstrate the robustness of the proposed method over a wide SNR range from −10 dB to 10 dB. The proposed classifier achieves 100% accuracy when the SNR is above 0 dB, maintains 95% accuracy at −5 dB, and still attains 83% accuracy at −10 dB. In comparative tests, it further achieves 56.7% accuracy at −15 dB, outperforming or matching several state-of-the-art SVM-based and deep-learning-based approaches.
低信噪比条件下雷达信号的鲁棒分类对于目标识别、电子战和雷达辐射源识别至关重要。然而,在噪声环境中,由于干扰和杂波的影响,传统方法的性能严重下降。本文提出了一种基于支持向量机的有效分类框架,该框架利用小波熵和经验模态分解熵的联合判别能力。这两个熵测度表征了受噪声干扰的雷达信号的固有复杂性和时频结构,并将其组合成一个紧凑的二维特征向量。在三种代表性雷达调制类型——脉冲多普勒(PD)、线性调频(LFM)和伪码相位调制(PCPM)上进行的大量实验表明,该方法在−10 dB至10 dB的宽信噪比范围内具有鲁棒性。本文提出的分类器在信噪比大于0 dB时达到100%的准确率,在- 5 dB时保持95%的准确率,在- 10 dB时仍然达到83%的准确率。在对比测试中,它在- 15 dB下进一步达到56.7%的准确率,优于或匹配几种最先进的基于svm和基于深度学习的方法。
{"title":"Classification of radar signals modulation based on SVM using wavelet entropy and empirical mode decomposition entropy","authors":"Jihao Zhang,&nbsp;Guangwei Zhang,&nbsp;Ping Li,&nbsp;Chang Liu,&nbsp;Peng Gong","doi":"10.1016/j.compeleceng.2026.110947","DOIUrl":"10.1016/j.compeleceng.2026.110947","url":null,"abstract":"<div><div>Robust classification of radar signals under low signal-to-noise ratio (SNR) conditions is critical for target recognition, electronic warfare, and radar emitter identification. However, the performance of conventional methods deteriorates severely in noisy environments due to interference and clutter. This paper proposes an effective classification framework based on a Support Vector Machine (SVM) that exploits the joint discriminative power of wavelet entropy and empirical mode decomposition (EMD) entropy. These two entropy measures characterize the intrinsic complexity and time–frequency structure of radar signals corrupted by noise and are combined into a compact two-dimensional feature vector. Extensive experiments on three representative radar modulation types—pulse Doppler (PD), linear frequency modulation (LFM), and pseudo-code phase modulation (PCPM)—demonstrate the robustness of the proposed method over a wide SNR range from −10 dB to 10 dB. The proposed classifier achieves 100% accuracy when the SNR is above 0 dB, maintains 95% accuracy at −5 dB, and still attains 83% accuracy at −10 dB. In comparative tests, it further achieves 56.7% accuracy at −15 dB, outperforming or matching several state-of-the-art SVM-based and deep-learning-based approaches.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110947"},"PeriodicalIF":4.9,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of hybrid flow shop scheduling with batch processing and variable sublots via a multi-agent deep reinforcement learning–guided hybrid algorithm 基于多智能体深度强化学习引导的批处理可变子批混合流水车间调度优化
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2026-01-30 DOI: 10.1016/j.compeleceng.2026.110987
Qian Zheng , Yuyan Han , Yuting Wang , Daqing Liu , Mingxiao Ma , Leilei Meng
This paper investigates the Hybrid Flow Shop Scheduling Problem with Batch Processing Machines and Variable Sublots (HFSP-BVS), considering sequence-dependent setup times and transportation times, with the objective of minimizing total tardiness. The complexity of HFSP-BVS lies in the tight coupling among lot sequencing, lot splitting, and machine assignment, making it highly challenging in modern manufacturing environments. To address this problem, a Mixed-Integer Linear Programming (MILP) model is formulated and validated using the Gurobi solver. Subsequently, a hybrid algorithm, MADDQN_IG, is proposed by integrating the Multi-Agent Double Deep Q-Network (MADDQN) with Iterated Greedy (IG). The algorithm incorporates four key components: (1) a triple two-layer initialization strategy; (2) a dual-layer destruction-reconstruction parameter selection agent; (3) a local search strategy selection agent; and (4) a multi-agent DDQN construction and training process. These elements are embedded within a unified framework to enhance search efficiency and optimization depth. Extensive computational experiments on 100 benchmark instances demonstrate that MADDQN_IG consistently outperforms existing advanced algorithms (NCIG, QABC, vCCEA, GA), achieving superior solution quality and robustness within limited computation time. Specifically, under three termination criteria (δ = 100, 200, 300), MADDQN_IG improves the ARDI by 78.57%–98.57% and ranks first in the Friedman test, confirming the effectiveness and adaptability of the proposed framework.
本文研究了具有批处理机和可变子批的混合流水车间调度问题,考虑了顺序相关的设置时间和运输时间,以最小化总延误为目标。HFSP-BVS的复杂性在于批排序、批拆分和机器分配之间的紧密耦合,这使得它在现代制造环境中极具挑战性。为了解决这个问题,提出了一个混合整数线性规划(MILP)模型,并使用Gurobi求解器进行了验证。随后,将Multi-Agent Double Deep Q-Network (MADDQN)算法与迭代贪婪(IG)算法相结合,提出了一种混合算法MADDQN_IG。该算法包含四个关键部分:(1)三层两层初始化策略;(2)双层破坏重建参数选择剂;(3)局部搜索策略选择代理;(4)多智能体DDQN构建和训练过程。这些元素被嵌入到一个统一的框架中,以提高搜索效率和优化深度。在100个基准实例上的大量计算实验表明,MADDQN_IG持续优于现有的高级算法(NCIG、QABC、vCCEA、GA),在有限的计算时间内实现了卓越的解质量和鲁棒性。具体而言,在三个终止准则(δ = 100,200,300)下,MADDQN_IG将ARDI提高了78.57%-98.57%,在Friedman检验中排名第一,证实了所提框架的有效性和适应性。
{"title":"Optimization of hybrid flow shop scheduling with batch processing and variable sublots via a multi-agent deep reinforcement learning–guided hybrid algorithm","authors":"Qian Zheng ,&nbsp;Yuyan Han ,&nbsp;Yuting Wang ,&nbsp;Daqing Liu ,&nbsp;Mingxiao Ma ,&nbsp;Leilei Meng","doi":"10.1016/j.compeleceng.2026.110987","DOIUrl":"10.1016/j.compeleceng.2026.110987","url":null,"abstract":"<div><div>This paper investigates the Hybrid Flow Shop Scheduling Problem with Batch Processing Machines and Variable Sublots (HFSP-BVS), considering sequence-dependent setup times and transportation times, with the objective of minimizing total tardiness. The complexity of HFSP-BVS lies in the tight coupling among lot sequencing, lot splitting, and machine assignment, making it highly challenging in modern manufacturing environments. To address this problem, a Mixed-Integer Linear Programming (MILP) model is formulated and validated using the Gurobi solver. Subsequently, a hybrid algorithm, MADDQN_IG, is proposed by integrating the Multi-Agent Double Deep Q-Network (MADDQN) with Iterated Greedy (IG). The algorithm incorporates four key components: (1) a triple two-layer initialization strategy; (2) a dual-layer destruction-reconstruction parameter selection agent; (3) a local search strategy selection agent; and (4) a multi-agent DDQN construction and training process. These elements are embedded within a unified framework to enhance search efficiency and optimization depth. Extensive computational experiments on 100 benchmark instances demonstrate that MADDQN_IG consistently outperforms existing advanced algorithms (NCIG, QABC, vCCEA, GA), achieving superior solution quality and robustness within limited computation time. Specifically, under three termination criteria (<em><strong>δ</strong></em> = 100, 200, 300), MADDQN_IG improves the ARDI by 78.57%–98.57% and ranks first in the Friedman test, confirming the effectiveness and adaptability of the proposed framework.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110987"},"PeriodicalIF":4.9,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A framework for handling class imbalance in malicious URL dataset 一个处理恶意URL数据集中类不平衡的框架
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2026-01-30 DOI: 10.1016/j.compeleceng.2026.111004
K.G. Raghavendra Narayan , Srijanee Mookherji , Vanga Odelu , Rajendra Prasath
With the advancement of technology, cyberattacks on Internet-based services such as email, e-commerce, social networking, and electronic healthcare are increasing. Since many of these services are accessed through URLs, they have become a primary source for cyberattacks, including phishing and malware. Anti-Phishing Working Group (APWG) reported nearly 1 million phishing attacks in the first quarter of 2025. Early detection of malicious URLs is therefore critical to preventing these threats. Therefore, an efficient detection of malicious URLs is an emerging research problem. However, most ML/DL-based studies focus on overall model accuracy and tend to be biased towards majority classes in imbalanced datasets. In this paper, we propose a machine learning-based malicious URL detection framework specifically designed for imbalanced datasets. We use the ISCX-URL2016 dataset to evaluate model performance across multiple ML algorithms and classbalancing techniques. Our proposed framework, combining the LightGBM classifier with ADASYN oversampling, achieves 99.76% accuracy in multi-class and 99.92% in binary classification. Notably, it shows a 5.93% improvement in detecting phishing URLs, a minority class in the dataset, over existing models. A significant achievement of our approach is its uniform performance across all classes, effectively reducing bias towards majority classes, while existing models fail to achieve it, particularly minority classes. We also validated the proposed model using recent datasets. We further evaluate the framework using various feature selection techniques, demonstrating its effectiveness with fewer features. Additionally, we perform statistical significance testing to validate the reliability of our model, confirming its suitability for real-world applications.
随着技术的进步,针对基于互联网的服务(如电子邮件、电子商务、社交网络和电子医疗保健)的网络攻击正在增加。由于这些服务中的许多都是通过url访问的,因此它们已成为网络攻击的主要来源,包括网络钓鱼和恶意软件。反网络钓鱼工作组(APWG)报告称,2025年第一季度发生了近100万次网络钓鱼攻击。因此,早期检测恶意url对于防止这些威胁至关重要。因此,如何有效地检测恶意url是一个新兴的研究课题。然而,大多数基于ML/ dl的研究关注的是整体模型的准确性,并且倾向于不平衡数据集中的大多数类别。在本文中,我们提出了一个专门针对不平衡数据集设计的基于机器学习的恶意URL检测框架。我们使用ISCX-URL2016数据集来评估跨多种ML算法和类平衡技术的模型性能。我们提出的框架将LightGBM分类器与ADASYN过采样相结合,在多类分类中达到99.76%的准确率,在二元分类中达到99.92%的准确率。值得注意的是,与现有模型相比,它在检测网络钓鱼url(数据集中的少数类)方面提高了5.93%。我们的方法的一个重要成就是它在所有类别中的统一表现,有效地减少了对多数类别的偏见,而现有模型无法实现这一点,特别是少数类别。我们还使用最近的数据集验证了所提出的模型。我们使用各种特征选择技术进一步评估该框架,证明其在较少特征下的有效性。此外,我们执行统计显著性检验来验证我们的模型的可靠性,确认其适用于现实世界的应用。
{"title":"A framework for handling class imbalance in malicious URL dataset","authors":"K.G. Raghavendra Narayan ,&nbsp;Srijanee Mookherji ,&nbsp;Vanga Odelu ,&nbsp;Rajendra Prasath","doi":"10.1016/j.compeleceng.2026.111004","DOIUrl":"10.1016/j.compeleceng.2026.111004","url":null,"abstract":"<div><div>With the advancement of technology, cyberattacks on Internet-based services such as email, e-commerce, social networking, and electronic healthcare are increasing. Since many of these services are accessed through URLs, they have become a primary source for cyberattacks, including phishing and malware. Anti-Phishing Working Group (APWG) reported nearly 1 million phishing attacks in the first quarter of 2025. Early detection of malicious URLs is therefore critical to preventing these threats. Therefore, an efficient detection of malicious URLs is an emerging research problem. However, most ML/DL-based studies focus on overall model accuracy and tend to be biased towards majority classes in imbalanced datasets. In this paper, we propose a machine learning-based malicious URL detection framework specifically designed for imbalanced datasets. We use the ISCX-URL2016 dataset to evaluate model performance across multiple ML algorithms and classbalancing techniques. Our proposed framework, combining the LightGBM classifier with ADASYN oversampling, achieves 99.76% accuracy in multi-class and 99.92% in binary classification. Notably, it shows a 5.93% improvement in detecting phishing URLs, a minority class in the dataset, over existing models. A significant achievement of our approach is its uniform performance across all classes, effectively reducing bias towards majority classes, while existing models fail to achieve it, particularly minority classes. We also validated the proposed model using recent datasets. We further evaluate the framework using various feature selection techniques, demonstrating its effectiveness with fewer features. Additionally, we perform statistical significance testing to validate the reliability of our model, confirming its suitability for real-world applications.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 111004"},"PeriodicalIF":4.9,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive performance benchmarking and comparative analysis of active ransomware threats 主动勒索软件威胁的综合性能基准测试和比较分析
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2026-01-28 DOI: 10.1016/j.compeleceng.2026.110963
Simon R. Davies, Richard Macfarlane
Ransomware remains one of the most pervasive and disruptive cyber threats, with modern variants employing advanced techniques such as high-speed multithreaded encryption, obfuscation, and intermittent encryption to reduce detection opportunities and accelerate impact. Despite extensive research into detection and mitigation, few studies have systematically quantified the execution performance and behavioural characteristics of contemporary ransomware families. This paper fills this critical gap through a comprehensive, rigorous analysis of 29 active crypto-ransomware strains executed under controlled, isolated conditions.
Two purpose-built datasets were developed: one, a verified ransomware corpus of the most active families, and the other, a structured target dataset emulating enterprise file systems. Controlled executions of each ransomware sample provided robust measurements of total execution time, pre-encryption delay, and encryption performance. Key findings include wide variation in encryption speeds (33 MB/s to 2.79 GB/s), distinct preparatory and encryption sequences, and frequent use of intermittent encryption to maximise throughput and evade detection.
This research presents the first contemporary academic reproducible benchmark of ransomware execution performance. Through the release of these curated datasets and detailed empirical measurements, it addresses a critical gap in understanding ransomware behaviour. The study contributes a publicly accessible ransomware sample dataset, a structured benchmarking dataset, and a comparative performance analysis across major ransomware families. These results reveal how modern ransomware balances speed, stealth, and efficiency, highlighting the rapidly shrinking window for detection and response. The work establishes a rigorous benchmark for advancing research and practical defence development.
勒索软件仍然是最普遍和最具破坏性的网络威胁之一,其现代变种采用了高速多线程加密、混淆和间歇性加密等先进技术,以减少检测机会并加速影响。尽管对检测和缓解进行了广泛的研究,但很少有研究系统地量化了当代勒索软件家族的执行性能和行为特征。本文通过对在受控、隔离条件下执行的29种活跃的加密勒索软件进行全面、严格的分析,填补了这一关键空白。开发了两个专门构建的数据集:一个是经过验证的最活跃家族的勒索软件语料库,另一个是模拟企业文件系统的结构化目标数据集。每个勒索软件样本的受控执行提供了总执行时间、预加密延迟和加密性能的可靠测量。主要发现包括加密速度的巨大差异(33 MB/s到2.79 GB/s),不同的准备和加密序列,以及频繁使用间歇性加密来最大化吞吐量和逃避检测。本研究提出了勒索软件执行性能的第一个当代学术可复制基准。通过发布这些精心整理的数据集和详细的经验测量,它解决了理解勒索软件行为的关键差距。该研究提供了一个公开访问的勒索软件样本数据集,一个结构化的基准数据集,以及主要勒索软件家族的比较性能分析。这些结果揭示了现代勒索软件如何平衡速度,隐蔽性和效率,突出了快速缩小的检测和响应窗口。这项工作为推进研究和实际国防发展建立了严格的基准。
{"title":"Comprehensive performance benchmarking and comparative analysis of active ransomware threats","authors":"Simon R. Davies,&nbsp;Richard Macfarlane","doi":"10.1016/j.compeleceng.2026.110963","DOIUrl":"10.1016/j.compeleceng.2026.110963","url":null,"abstract":"<div><div>Ransomware remains one of the most pervasive and disruptive cyber threats, with modern variants employing advanced techniques such as high-speed multithreaded encryption, obfuscation, and intermittent encryption to reduce detection opportunities and accelerate impact. Despite extensive research into detection and mitigation, few studies have systematically quantified the execution performance and behavioural characteristics of contemporary ransomware families. This paper fills this critical gap through a comprehensive, rigorous analysis of 29 active crypto-ransomware strains executed under controlled, isolated conditions.</div><div>Two purpose-built datasets were developed: one, a verified ransomware corpus of the most active families, and the other, a structured target dataset emulating enterprise file systems. Controlled executions of each ransomware sample provided robust measurements of total execution time, pre-encryption delay, and encryption performance. Key findings include wide variation in encryption speeds (33 MB/s to 2.79 GB/s), distinct preparatory and encryption sequences, and frequent use of intermittent encryption to maximise throughput and evade detection.</div><div>This research presents the first contemporary academic reproducible benchmark of ransomware execution performance. Through the release of these curated datasets and detailed empirical measurements, it addresses a critical gap in understanding ransomware behaviour. The study contributes a publicly accessible ransomware sample dataset, a structured benchmarking dataset, and a comparative performance analysis across major ransomware families. These results reveal how modern ransomware balances speed, stealth, and efficiency, highlighting the rapidly shrinking window for detection and response. The work establishes a rigorous benchmark for advancing research and practical defence development.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110963"},"PeriodicalIF":4.9,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An extensive examination of adaptive intelligence in cloud-to-edge systems for Healthcare 5.0 对医疗保健5.0的云到边缘系统中的自适应智能的广泛研究
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2026-02-03 DOI: 10.1016/j.compeleceng.2026.111006
Shamsul Haq, Prabal Verma
Healthcare 5.0 is a transformative paradigm that revolutionizes healthcare delivery and improves patient outcomes through incorporating cutting-edge technologies. In this alignment, the paper describes the understanding of Healthcare 5.0 involving different emerging technologies and their roles in effective decision outcomes with proper examples. In correspondence to the significance of Healthcare 5.0, the paper is preceded by focusing on the importance of cloud and edge computing in such environments. It also covers different tools and techniques, analytical methods and advanced emerging analytical algorithms for disease management and treatment optimization. Consequently, it examines the applications of edge computing with emerging analytical technologies in healthcare, showcasing various use cases such as remote patient monitoring, personalized medicine, intelligent healthcare systems, and data-driven decision support resulting in improved patient care and operational efficiency. Subsequently, the statistical results with the systematic framework are performed on the basis of 563 papers published in reputed journals and organizations for the comprehensive analysis of existing technologies and to identify research solutions and challenges in the development of Smart Healthcare. Finally, we summarize our key findings and propose future directions for research and smart healthcare development.
Healthcare 5.0是一种变革性范例,它通过整合尖端技术彻底改变了医疗保健服务并改善了患者的治疗效果。本文通过适当的示例描述了对涉及不同新兴技术的Healthcare 5.0的理解,以及它们在有效决策结果中的作用。与医疗保健5.0的重要性相对应,本文首先重点介绍了云计算和边缘计算在此类环境中的重要性。它还涵盖了疾病管理和治疗优化的不同工具和技术,分析方法和先进的新兴分析算法。因此,本文探讨了边缘计算与新兴分析技术在医疗保健领域的应用,展示了各种用例,如远程患者监控、个性化医疗、智能医疗保健系统和数据驱动的决策支持,从而改善了患者护理和运营效率。随后,以发表在知名期刊和机构的563篇论文为基础,在系统框架下进行统计结果,对现有技术进行综合分析,找出智慧医疗发展中的研究解决方案和挑战。最后,我们总结了我们的主要发现,并提出了未来的研究方向和智能医疗发展。
{"title":"An extensive examination of adaptive intelligence in cloud-to-edge systems for Healthcare 5.0","authors":"Shamsul Haq,&nbsp;Prabal Verma","doi":"10.1016/j.compeleceng.2026.111006","DOIUrl":"10.1016/j.compeleceng.2026.111006","url":null,"abstract":"<div><div>Healthcare 5.0 is a transformative paradigm that revolutionizes healthcare delivery and improves patient outcomes through incorporating cutting-edge technologies. In this alignment, the paper describes the understanding of Healthcare 5.0 involving different emerging technologies and their roles in effective decision outcomes with proper examples. In correspondence to the significance of Healthcare 5.0, the paper is preceded by focusing on the importance of cloud and edge computing in such environments. It also covers different tools and techniques, analytical methods and advanced emerging analytical algorithms for disease management and treatment optimization. Consequently, it examines the applications of edge computing with emerging analytical technologies in healthcare, showcasing various use cases such as remote patient monitoring, personalized medicine, intelligent healthcare systems, and data-driven decision support resulting in improved patient care and operational efficiency. Subsequently, the statistical results with the systematic framework are performed on the basis of 563 papers published in reputed journals and organizations for the comprehensive analysis of existing technologies and to identify research solutions and challenges in the development of Smart Healthcare. Finally, we summarize our key findings and propose future directions for research and smart healthcare development.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 111006"},"PeriodicalIF":4.9,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146174186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VGPDFL-SkinSeg: Enhancing model generalisation with data diversity via voting-based client selection and gradual pruning for decentralised federated skin lesion segmentation VGPDFL-SkinSeg:通过基于投票的客户端选择和对分散的联邦皮肤病变分割的逐步修剪来增强数据多样性的模型泛化
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2026-02-04 DOI: 10.1016/j.compeleceng.2026.111022
Monika Srivastava , Gautam Kumar , Rishav Singh
In medical imaging, the segmentation of skin lesions plays a vital role in detecting and treating skin cancer. Deep learning demonstrates its efficacy in this process. However, it largely relies on extensive and well-annotated datasets that are often limited by healthcare agencies privacy restrictions and institutional data silos. Federated Learning (FL) emerged as a boon, enabling collaborative training without sharing data. Yet, in a real-world setting, healthcare bodies may possess various computational capacities that can affect the consistency of the FL framework, posing the requirement of generalising the model architecture. This study proposes a Decentralised Federated Learning (DFL) framework to improve model generalisation for Skin Lesion Segmentation (SkinSeg). It incorporates a novel Voting (V)-based client selection mechanism to identify the most suitable local model based on performance metrics and dataset size. The selected model is then subjected to Gradual Pruning (GP) via a modified Lottery Ticket Hypothesis (LTH) to reduce model complexity while preserving segmentation quality. The pruned model is then broadcast to all clients for further training. The VGPDFL-SkinSeg substantially improved over State-Of-The-Art FL frameworks on benchmark datasets HAM10K, ISIC-2016/17/18 and DermIs+DermQuest. It achieved a client-wise average Dice Coefficient (DSC) of 90.09%, 96.60% Accuracy, 82.45% meanIOU, 13.63% HD95 and 5.20% ASSD. Initially, each client starts with different segmentation models, reflecting practical diverse systems, and gradually converges towards homogeneity. The study shows that gradual pruning up to 40% yields better segmentation quality than fixed pruning at the beginning and is consistent with client scaling.
在医学影像学中,皮肤病灶的分割在皮肤癌的检测和治疗中起着至关重要的作用。深度学习在这个过程中证明了它的有效性。然而,它在很大程度上依赖于广泛且注释良好的数据集,这些数据集通常受到医疗机构隐私限制和机构数据孤岛的限制。联邦学习(FL)的出现是一个福音,使协作训练无需共享数据。然而,在现实环境中,医疗保健机构可能拥有各种计算能力,这些计算能力可能会影响FL框架的一致性,从而提出了一般化模型体系结构的要求。本研究提出了一个去中心化联邦学习(DFL)框架来改进皮肤病变分割(SkinSeg)的模型泛化。它结合了一种新颖的基于投票(V)的客户端选择机制,以根据性能指标和数据集大小确定最合适的本地模型。然后,通过改进的彩票假设(LTH)对所选模型进行逐步修剪(GP),以降低模型复杂性,同时保持分割质量。然后将修剪后的模型广播给所有客户进行进一步培训。VGPDFL-SkinSeg在基准数据集HAM10K、ISIC-2016/17/18和DermIs+DermQuest上大大改进了最先进的FL框架。它实现了客户平均骰子系数(DSC)为90.09%,准确率为96.60%,平均ou为82.45%,HD95为13.63%,ASSD为5.20%。最初,每个客户都有不同的细分模型,反映了实际的多样化系统,并逐渐向同质化收敛。研究表明,高达40%的逐渐修剪比开始时的固定修剪产生更好的分割质量,并且与客户端扩展一致。
{"title":"VGPDFL-SkinSeg: Enhancing model generalisation with data diversity via voting-based client selection and gradual pruning for decentralised federated skin lesion segmentation","authors":"Monika Srivastava ,&nbsp;Gautam Kumar ,&nbsp;Rishav Singh","doi":"10.1016/j.compeleceng.2026.111022","DOIUrl":"10.1016/j.compeleceng.2026.111022","url":null,"abstract":"<div><div>In medical imaging, the segmentation of skin lesions plays a vital role in detecting and treating skin cancer. Deep learning demonstrates its efficacy in this process. However, it largely relies on extensive and well-annotated datasets that are often limited by healthcare agencies privacy restrictions and institutional data silos. Federated Learning (FL) emerged as a boon, enabling collaborative training without sharing data. Yet, in a real-world setting, healthcare bodies may possess various computational capacities that can affect the consistency of the FL framework, posing the requirement of generalising the model architecture. This study proposes a Decentralised Federated Learning (DFL) framework to improve model generalisation for Skin Lesion Segmentation (SkinSeg). It incorporates a novel Voting (V)-based client selection mechanism to identify the most suitable local model based on performance metrics and dataset size. The selected model is then subjected to Gradual Pruning (GP) via a modified Lottery Ticket Hypothesis (LTH) to reduce model complexity while preserving segmentation quality. The pruned model is then broadcast to all clients for further training. The VGPDFL-SkinSeg substantially improved over State-Of-The-Art FL frameworks on benchmark datasets HAM10K, ISIC-2016/17/18 and DermIs+DermQuest. It achieved a client-wise average Dice Coefficient (DSC) of 90.09%, 96.60% Accuracy, 82.45% meanIOU, 13.63% HD95 and 5.20% ASSD. Initially, each client starts with different segmentation models, reflecting practical diverse systems, and gradually converges towards homogeneity. The study shows that gradual pruning up to 40% yields better segmentation quality than fixed pruning at the beginning and is consistent with client scaling.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 111022"},"PeriodicalIF":4.9,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146174250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Photovoltaic power forecasting under dynamic weather conditions: An adaptive encoder–decoder framework with feature dimensionality optimization 动态天气条件下的光伏发电功率预测:一种特征维数优化的自适应编码器-解码器框架
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2026-01-20 DOI: 10.1016/j.compeleceng.2026.110988
Jingde Jia , Gang Liu , Yifan Li , Rujian Chen , Yisheng Cao , Gang Xiao , Jianchao Tang
The stochastic and intermittent nature of solar energy poses major challenges for photovoltaic (PV) power forecasting. To address this, we propose a Dynamic Weather-Based Forecasting framework (DWBF) that integrates feature principal component analysis (FPCA) with an adaptive encoder–decoder structure. FPCA is employed to reduce dimensionality while preserving key meteorological information. A convolutional neural network (CNN) with a multi-attention mechanism serves as a shared encoder, capturing global dependencies across weather conditions. Based on solar radiation thresholds, input data is classified into sunny, cloudy, and rainy categories, and the model dynamically selects appropriate decoders: a long short-term memory (LSTM) decoder for sunny days to model stable temporal patterns; a transformer decoder for cloudy days to handle nonlinear variations; and a temporal convolutional network (TCN) decoder for rainy days to process sparse and noisy data. Additionally, Gaussian noise smoothing and adaptive interpolation enhance robustness under data-sparse conditions. Experimental results show that the proposed DWBF consistently outperforms traditional single architecture models across multiple metrics, including root mean square error (RMSE), mean absolute error (MAE), mean absolute percentage error (MAPE), and coefficient of determination (R2). Overall, DWBF offers a flexible, accurate, and efficient solution for PV power forecasting by combining feature selection, weather-adaptive decoding, and targeted optimization.
太阳能的随机性和间歇性给光伏发电(PV)功率预测带来了重大挑战。为了解决这个问题,我们提出了一个基于天气的动态预报框架(DWBF),该框架将特征主成分分析(FPCA)与自适应编码器-解码器结构相结合。FPCA可以在保留关键气象信息的前提下进行降维。具有多注意机制的卷积神经网络(CNN)作为共享编码器,捕获天气条件下的全局依赖关系。基于太阳辐射阈值,将输入数据分为晴天、阴天和雨天三类,模型动态选择合适的解码器:晴天的长短期记忆(LSTM)解码器来模拟稳定的时间模式;一个变压器解码器,用于处理阴天的非线性变化;以及用于雨天处理稀疏和噪声数据的时序卷积网络(TCN)解码器。此外,高斯噪声平滑和自适应插值增强了数据稀疏条件下的鲁棒性。实验结果表明,该方法在均方根误差(RMSE)、平均绝对误差(MAE)、平均绝对百分比误差(MAPE)和决定系数(R2)等多个指标上均优于传统的单架构模型。总体而言,DWBF结合特征选择、天气适应解码和针对性优化,为光伏发电功率预测提供了灵活、准确、高效的解决方案。
{"title":"Photovoltaic power forecasting under dynamic weather conditions: An adaptive encoder–decoder framework with feature dimensionality optimization","authors":"Jingde Jia ,&nbsp;Gang Liu ,&nbsp;Yifan Li ,&nbsp;Rujian Chen ,&nbsp;Yisheng Cao ,&nbsp;Gang Xiao ,&nbsp;Jianchao Tang","doi":"10.1016/j.compeleceng.2026.110988","DOIUrl":"10.1016/j.compeleceng.2026.110988","url":null,"abstract":"<div><div>The stochastic and intermittent nature of solar energy poses major challenges for photovoltaic (PV) power forecasting. To address this, we propose a Dynamic Weather-Based Forecasting framework (DWBF) that integrates feature principal component analysis (FPCA) with an adaptive encoder–decoder structure. FPCA is employed to reduce dimensionality while preserving key meteorological information. A convolutional neural network (CNN) with a multi-attention mechanism serves as a shared encoder, capturing global dependencies across weather conditions. Based on solar radiation thresholds, input data is classified into sunny, cloudy, and rainy categories, and the model dynamically selects appropriate decoders: a long short-term memory (LSTM) decoder for sunny days to model stable temporal patterns; a transformer decoder for cloudy days to handle nonlinear variations; and a temporal convolutional network (TCN) decoder for rainy days to process sparse and noisy data. Additionally, Gaussian noise smoothing and adaptive interpolation enhance robustness under data-sparse conditions. Experimental results show that the proposed DWBF consistently outperforms traditional single architecture models across multiple metrics, including root mean square error (RMSE), mean absolute error (MAE), mean absolute percentage error (MAPE), and coefficient of determination (<span><math><msup><mrow><mi>R</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span>). Overall, DWBF offers a flexible, accurate, and efficient solution for PV power forecasting by combining feature selection, weather-adaptive decoding, and targeted optimization.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110988"},"PeriodicalIF":4.9,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146001853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-driven road inspection with SUD-ROAD: High-resolution LiDAR benchmark and a novel cross-dimensional semantic segmentation pipeline 基于SUD-ROAD的人工智能道路检测:高分辨率激光雷达基准和新型跨维语义分割管道
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2026-01-28 DOI: 10.1016/j.compeleceng.2026.110993
Zhouyan Qiu , Arshia Ghasemlou , Joaquín Martínez-Sánchez , Pedro Arias
Aging transportation infrastructure worldwide demands innovative artificial intelligence (AI) solutions for maintenance and monitoring. In this paper, we introduce SUD-ROAD, a new high-resolution dataset and methodology aimed at modernizing road infrastructure management through AI-driven inspection. SUD-ROAD is a specialized subset of the Santiago Urban Dataset, spanning 1635 meters of urban roadway and containing 57 million 3D LiDAR points labeled into seven semantic classes (road pavement, lane lines, other road markings, manhole covers, drains, cracks, and patching). Exploiting the near-planarity of road surfaces, we project the 3D point cloud onto 2D grids, allowing state-of-the-art image-based models to replace more complex 3D networks. A ConvNeXt segmentation model trained on these 2D representations attains a mean Intersection-over-Union of 0.74 and overall accuracy of 0.97, accurately detecting both large-scale assets and fine-grained defects critical for early intervention. We also analyzed the impact of intensity and geometric properties on segmentation effectiveness across different categories. By enabling real-time, AI-driven condition assessment, our approach supports proactive repairs, extends asset life, and reduces life-cycle costs—advancing the broader goal of safer and more sustainable transportation infrastructure. The dataset can be accessed at the following repository: https://github.com/msqiu/SUD-Road.
全球老化的交通基础设施需要创新的人工智能(AI)解决方案来进行维护和监控。在本文中,我们介绍了SUD-ROAD,这是一种新的高分辨率数据集和方法,旨在通过人工智能驱动的检查实现道路基础设施管理的现代化。sd - road是圣地亚哥城市数据集的一个专门子集,涵盖1635米的城市道路,包含5700万个3D激光雷达点,标记为七个语义类(道路路面、车道线、其他道路标记、井盖、排水管、裂缝和修补)。利用路面的近平面性,我们将3D点云投影到2D网格上,允许最先进的基于图像的模型取代更复杂的3D网络。在这些2D表示上训练的ConvNeXt分割模型获得了0.74的平均交集-over- union和0.97的总体精度,准确地检测了大规模资产和对早期干预至关重要的细粒度缺陷。我们还分析了强度和几何属性对不同类别分割效果的影响。通过实现实时、人工智能驱动的状态评估,我们的方法支持主动维修,延长资产寿命,降低生命周期成本,推进更安全和更可持续的交通基础设施的更广泛目标。该数据集可以通过以下存储库访问:https://github.com/msqiu/SUD-Road。
{"title":"AI-driven road inspection with SUD-ROAD: High-resolution LiDAR benchmark and a novel cross-dimensional semantic segmentation pipeline","authors":"Zhouyan Qiu ,&nbsp;Arshia Ghasemlou ,&nbsp;Joaquín Martínez-Sánchez ,&nbsp;Pedro Arias","doi":"10.1016/j.compeleceng.2026.110993","DOIUrl":"10.1016/j.compeleceng.2026.110993","url":null,"abstract":"<div><div>Aging transportation infrastructure worldwide demands innovative artificial intelligence (AI) solutions for maintenance and monitoring. In this paper, we introduce SUD-ROAD, a new high-resolution dataset and methodology aimed at modernizing road infrastructure management through AI-driven inspection. SUD-ROAD is a specialized subset of the Santiago Urban Dataset, spanning 1635 meters of urban roadway and containing 57 million 3D LiDAR points labeled into seven semantic classes (road pavement, lane lines, other road markings, manhole covers, drains, cracks, and patching). Exploiting the near-planarity of road surfaces, we project the 3D point cloud onto 2D grids, allowing state-of-the-art image-based models to replace more complex 3D networks. A ConvNeXt segmentation model trained on these 2D representations attains a mean Intersection-over-Union of 0.74 and overall accuracy of 0.97, accurately detecting both large-scale assets and fine-grained defects critical for early intervention. We also analyzed the impact of intensity and geometric properties on segmentation effectiveness across different categories. By enabling real-time, AI-driven condition assessment, our approach supports proactive repairs, extends asset life, and reduces life-cycle costs—advancing the broader goal of safer and more sustainable transportation infrastructure. The dataset can be accessed at the following repository: <span><span>https://github.com/msqiu/SUD-Road</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110993"},"PeriodicalIF":4.9,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity in intelligent railway systems: Taxonomy, research trends, challenges, and future directions 智能铁路系统中的网络安全:分类、研究趋势、挑战和未来方向
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2026-01-30 DOI: 10.1016/j.compeleceng.2026.110994
Mays Abukeshek , Mohammed Al-Mhiqani , Simon Parkinson , Saad Khan , George Bearfield
The rapid digitalisation unfolding in railway systems poses new cybersecurity concerns, thereby requiring solutions that will take the necessary steps to defend against tangible emerging threats. This study aims to systematically review the current cybersecurity research landscape within railway systems. Using a systematic protocol, we comprehensively searched five key online databases: IEEE Xplore, Web of Science, Scopus, ACM, and ScienceDirect. These online databases are recognised for their overall broad coverage and the exhibition of relevance to this study's purpose. Our systematic selection process, facilitated through a predetermined set of inclusion and exclusion criteria, resulted in 114 relevant articles. Among them, 51.8% of the articles reviewed also addressed Control System Security Solutions, while 14% of the articles examined Network Security Solutions, and 12.3% addressed Data Protection and Privacy Solutions. 7% of the articles studied Awareness and Training Solutions, while the remaining 14.9% adopted other approaches. Results identified several significant gaps and challenges relating to railway cybersecurity research, which include issues relating to embracing critical technologies, confirming data privacy, and the need for ongoing education and training of railway workers. Additionally, the study indicated a lack of standardised performance measures and the use of testing datasets, which will impact confidence in measuring the effectiveness of cybersecurity solutions. Ultimately, this research paper advances understanding and contributions to the current railway cybersecurity research landscape, while providing critical recommendations for future research. Efforts towards enhancing international collaboration, adopting emergent technologies such as AI and Blockchain and prioritising education and awareness initiatives are some of the most critical emerging next steps related to cybersecurity and resilience of railway systems.
铁路系统的快速数字化发展带来了新的网络安全问题,因此需要采取必要措施来防御切实的新威胁的解决方案。本研究旨在系统回顾当前铁路系统内的网络安全研究现状。使用系统协议,我们全面检索了五个关键在线数据库:IEEE Xplore, Web of Science, Scopus, ACM和ScienceDirect。这些在线数据库因其全面广泛的覆盖范围和与本研究目的相关的展示而得到认可。我们通过一套预先确定的纳入和排除标准,进行了系统的选择过程,产生了114篇相关文章。其中,51.8%的文章涉及控制系统安全解决方案,14%的文章涉及网络安全解决方案,12.3%的文章涉及数据保护和隐私解决方案,7%的文章研究意识和培训解决方案,其余14.9%采用其他方法。结果确定了与铁路网络安全研究相关的几个重大差距和挑战,其中包括与采用关键技术、确认数据隐私以及对铁路工人进行持续教育和培训的必要性有关的问题。此外,该研究表明,缺乏标准化的性能衡量标准和测试数据集的使用,这将影响衡量网络安全解决方案有效性的信心。最后,本研究论文促进了对当前铁路网络安全研究格局的理解和贡献,同时为未来的研究提供了关键建议。努力加强国际合作,采用人工智能和区块链等新兴技术,优先开展教育和提高意识举措,是与网络安全和铁路系统弹性相关的一些最关键的后续步骤。
{"title":"Cybersecurity in intelligent railway systems: Taxonomy, research trends, challenges, and future directions","authors":"Mays Abukeshek ,&nbsp;Mohammed Al-Mhiqani ,&nbsp;Simon Parkinson ,&nbsp;Saad Khan ,&nbsp;George Bearfield","doi":"10.1016/j.compeleceng.2026.110994","DOIUrl":"10.1016/j.compeleceng.2026.110994","url":null,"abstract":"<div><div>The rapid digitalisation unfolding in railway systems poses new cybersecurity concerns, thereby requiring solutions that will take the necessary steps to defend against tangible emerging threats. This study aims to systematically review the current cybersecurity research landscape within railway systems. Using a systematic protocol, we comprehensively searched five key online databases: IEEE Xplore, Web of Science, Scopus, ACM, and ScienceDirect. These online databases are recognised for their overall broad coverage and the exhibition of relevance to this study's purpose. Our systematic selection process, facilitated through a predetermined set of inclusion and exclusion criteria, resulted in 114 relevant articles. Among them, 51.8% of the articles reviewed also addressed Control System Security Solutions, while 14% of the articles examined Network Security Solutions, and 12.3% addressed Data Protection and Privacy Solutions. 7% of the articles studied Awareness and Training Solutions, while the remaining 14.9% adopted other approaches. Results identified several significant gaps and challenges relating to railway cybersecurity research, which include issues relating to embracing critical technologies, confirming data privacy, and the need for ongoing education and training of railway workers. Additionally, the study indicated a lack of standardised performance measures and the use of testing datasets, which will impact confidence in measuring the effectiveness of cybersecurity solutions. Ultimately, this research paper advances understanding and contributions to the current railway cybersecurity research landscape, while providing critical recommendations for future research. Efforts towards enhancing international collaboration, adopting emergent technologies such as AI and Blockchain and prioritising education and awareness initiatives are some of the most critical emerging next steps related to cybersecurity and resilience of railway systems.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110994"},"PeriodicalIF":4.9,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Electrical Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1