Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication K Mabodi, M Yusefi, S Zandiyan, L Irankhah, R Fotohi Springer, The Journal of Supercomputing 76 (9), 1-26, 2020 | 114 | 2020 |
An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks R Fotohi, E Nazemi, FS Aliee Elsevier, Vehicular Communications 26, 100267, 2020 | 102 | 2020 |
Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol R Fotohi, S Firoozi Bari, M Yusefi Wiley, International Journal of Communication Systems 33 (4), e4234, 2020 | 102 | 2020 |
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism R Fotohi, M Zaminkar Springer, Wireless Personal Communications 114 (2), 1287–1312, 2020 | 100* | 2020 |
DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system S Jamali, R Fotohi Springer, the Journal of Supercomputing 73 (12), 5173-5196, 2017 | 93 | 2017 |
Defending against wormhole attack in MANET using an artificial immune system S Jamali, R Fotohi New Review of Information Networking 21 (2), 79-100, 2016 | 84 | 2016 |
A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms R Fotohi, S Firoozi Bari Springer, The Journal of Supercomputing 76 (9), 6860-6886, 2020 | 83 | 2020 |
Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system R Fotohi Elsevier, Reliability Engineering & System Safety 193, 106675, 2020 | 76 | 2020 |
A new approach for improvement security against DoS attacks in vehicular ad-hoc network R Fotohi, Y Ebazadeh, MS Geshlag International Journal of Advanced Computer Science and Applications 7 (7), 10-16, 2016 | 76* | 2016 |
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles M Faraji-Biregani, R Fotohi Springer, The Journal of Supercomputing 77 (5), 5076-5103, 2020 | 64 | 2020 |
Big data-aware intrusion detection system in communication networks: a deep learning approach M Mahdavisharif, S Jamali, R Fotohi Springer, Journal of Grid Computing 19, 1-28, 2021 | 55 | 2021 |
Securing Communication between Things using Blockchain Technology based on Authentication and SHA-256 to Improving Scalability in Large-Scale IoT R Fotohi, FS Aliee Elsevier, Computer Networks 197, 108331, 2021 | 55 | 2021 |
An Improvement over AODV routing protocol by limiting visited hop count R Fotohi, S Jamali, F Sarkohaki, S Behzad International Journal of Information Technology and Computer Science (IJITCS …, 2013 | 54 | 2013 |
A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem M Zaminkar, F Sarkohaki, R Fotohi Wiley, International Journal of Communication Systems 34 (3), e4693, 2021 | 53 | 2021 |
An efficient routing protocol in mobile ad-hoc networks by using artificial immune system F Sarkohaki, R Fotohi, V Ashrafian International Journal of Advanced Computer Science and Applications(IJACSA), 2020 | 53 | 2020 |
Improvement over the OLSR routing protocol in mobile Ad Hoc networks by eliminating the unnecessary loops S Behzad, R Fotohi, S Jamali International Journal of Information Technology and Computer Science (IJITCS …, 2013 | 50 | 2013 |
NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things B Seyedi, R Fotohi Springer, The Journal of Supercomputing, 1-24, 2020 | 49 | 2020 |
Firoozi Bari, S., & Yusefi, M.(2020). Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol R Fotohi Wiley, International Journal of Communication Systems 33 (4), e4234, 2020 | 48* | 2020 |
A firefly algorithm for power management in wireless sensor networks (WSNs) H Pakdel, R Fotohi Springer, The Journal of Supercomputing 77 (9), 9411-9432, 2021 | 43 | 2021 |
A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks R Fotohi, S Jamali International journal of Computer Science & Network Solutions 2 (5), 37-56, 2014 | 42 | 2014 |