Journal of Intelligent Systems and Internet of Things JISIoT 2690-6791 2769-786X 10.54216/JISIoT https://www.americaspg.com/journals/show/3518 2019 2019 Deep Secure: An Integrated Approach to Anomaly Detection and Cryptographic Protection in Industrial Cyber-Physical Systems Information Systems Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia Sameer Sameer Industrial Cyber-Physical System (CPS) signify a noteworthy development in industrial automation and control, combining physical and digital parts in order to improve the efficacy, trustworthiness, and functionality of numerous industrial procedures. Industrial CPS are helpful in a huge range of industries such as transportation, energy, manufacturing, and healthcare.  Intrusion detection systems (IDs) assist as vigilant protectors, constantly observing network and physical modules for any illegal access, variances, or doubtful actions. They deliver initial threat recognition and prevent safety breaks and operating troubles. In addition, cryptographic protection guarantees the privacy, honesty and genuineness of data that spread across Industrial CPS systems. By utilizing innovative encryption and authentication devices, cryptographic solutions defense complex data from capture or damage preserving consistency and confidentiality of dangerous industrial procedures. The combination of these safety actions creates a strong defence device, boosting the flexibility of Industrial CPS besides developing cyber threats and protecting the reliability of vital industrial processes. This article presents a Deep Secure: An Integrated Approach to Intrusion Detection and Cryptographic Protection in Industrial CPS environment. The proposed model aims to integrate intrusion detection and cryptographic-based secure communication protocol for industrial CPS environments. The Deep Secure model comprises two major phases: intrusion detection and secure communication. Primarily, the intrusion detection process comprises a self-attention-based bidirectional long short-term memory (SA-BiLSTM) technique. Besides, the deer hunting optimization algorithm (DHOA) achieve hyperparameter tuning of the SA-BiLSTM technique. Moreover, a secure communication protocol is designed by the use of the ElGamal cryptosystem. The experimental result of the Deep Secure method was tested in terms of dissimilar measures. A comprehensive result analysis highlighted the advanced performance of the Deep Secure method when associated to other current approaches. 2025 2025 41 54 10.54216/JISIoT.150204 https://www.americaspg.com/articleinfo/18/show/3518