Følg
Reza Fotohi
Reza Fotohi
Ph.D. in Computer Engineering, Shahid Beheshti University
Verifisert e-postadresse på sbu.ac.ir - Startside
Tittel
Sitert av
Sitert av
År
Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication
K Mabodi, M Yusefi, S Zandiyan, L Irankhah, R Fotohi
Springer, The Journal of Supercomputing 76 (9), 1-26, 2020
1142020
An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks
R Fotohi, E Nazemi, FS Aliee
Elsevier, Vehicular Communications 26, 100267, 2020
1022020
Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol
R Fotohi, S Firoozi Bari, M Yusefi
Wiley, International Journal of Communication Systems 33 (4), e4234, 2020
1022020
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism
R Fotohi, M Zaminkar
Springer, Wireless Personal Communications 114 (2), 1287–1312, 2020
100*2020
DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system
S Jamali, R Fotohi
Springer, the Journal of Supercomputing 73 (12), 5173-5196, 2017
932017
Defending against wormhole attack in MANET using an artificial immune system
S Jamali, R Fotohi
New Review of Information Networking 21 (2), 79-100, 2016
842016
A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms
R Fotohi, S Firoozi Bari
Springer, The Journal of Supercomputing 76 (9), 6860-6886, 2020
832020
Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system
R Fotohi
Elsevier, Reliability Engineering & System Safety 193, 106675, 2020
762020
A new approach for improvement security against DoS attacks in vehicular ad-hoc network
R Fotohi, Y Ebazadeh, MS Geshlag
International Journal of Advanced Computer Science and Applications 7 (7), 10-16, 2016
76*2016
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles
M Faraji-Biregani, R Fotohi
Springer, The Journal of Supercomputing 77 (5), 5076-5103, 2020
642020
Big data-aware intrusion detection system in communication networks: a deep learning approach
M Mahdavisharif, S Jamali, R Fotohi
Springer, Journal of Grid Computing 19, 1-28, 2021
552021
Securing Communication between Things using Blockchain Technology based on Authentication and SHA-256 to Improving Scalability in Large-Scale IoT
R Fotohi, FS Aliee
Elsevier, Computer Networks 197, 108331, 2021
552021
An Improvement over AODV routing protocol by limiting visited hop count
R Fotohi, S Jamali, F Sarkohaki, S Behzad
International Journal of Information Technology and Computer Science (IJITCS …, 2013
542013
A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem
M Zaminkar, F Sarkohaki, R Fotohi
Wiley, International Journal of Communication Systems 34 (3), e4693, 2021
532021
An efficient routing protocol in mobile ad-hoc networks by using artificial immune system
F Sarkohaki, R Fotohi, V Ashrafian
International Journal of Advanced Computer Science and Applications(IJACSA), 2020
532020
Improvement over the OLSR routing protocol in mobile Ad Hoc networks by eliminating the unnecessary loops
S Behzad, R Fotohi, S Jamali
International Journal of Information Technology and Computer Science (IJITCS …, 2013
502013
NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things
B Seyedi, R Fotohi
Springer, The Journal of Supercomputing, 1-24, 2020
492020
Firoozi Bari, S., & Yusefi, M.(2020). Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol
R Fotohi
Wiley, International Journal of Communication Systems 33 (4), e4234, 2020
48*2020
A firefly algorithm for power management in wireless sensor networks (WSNs)
H Pakdel, R Fotohi
Springer, The Journal of Supercomputing 77 (9), 9411-9432, 2021
432021
A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks
R Fotohi, S Jamali
International journal of Computer Science & Network Solutions 2 (5), 37-56, 2014
422014
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20