Network intrusion detection system: A systematic study of machine learning and deep learning approaches
The rapid advances in the internet and communication fields have resulted in a huge
increase in the network size and the corresponding data. As a result, many novel attacks are …
increase in the network size and the corresponding data. As a result, many novel attacks are …
Detection and classification of multirotor drones in radar sensor networks: A review
Thanks to recent technological advances, a new generation of low-cost, small, unmanned
aerial vehicles (UAVs) is available. Small UAVs, often called drones, are enabling …
aerial vehicles (UAVs) is available. Small UAVs, often called drones, are enabling …
Internet of drones security and privacy issues: Taxonomy and open challenges
Internet of Drones (IoD) is a decentralized network and management framework that links
drones' access to the controlled airspace and provides inter-location navigation services …
drones' access to the controlled airspace and provides inter-location navigation services …
Cyber security intrusion detection for agriculture 4.0: Machine learning-based solutions, datasets, and future directions
In this paper, we review and analyze intrusion detection systems for Agriculture 4.0 cyber
security. Specifically, we present cyber security threats and evaluation metrics used in the …
security. Specifically, we present cyber security threats and evaluation metrics used in the …
Security threats and mitigation techniques in UAV communications: A comprehensive survey
Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new
applications and services, including military and rescue operations, aerial surveillance …
applications and services, including military and rescue operations, aerial surveillance …
Drone forensics and machine learning: Sustaining the investigation process
Drones have been increasingly adopted to address several critical challenges faced by
humanity to provide support and convenience. The technological advances in the broader …
humanity to provide support and convenience. The technological advances in the broader …
A comprehensive collection and analysis model for the drone forensics field
Unmanned aerial vehicles (UAVs) are adaptable and rapid mobile boards that can be
applied to several purposes, especially in smart cities. These involve traffic observation …
applied to several purposes, especially in smart cities. These involve traffic observation …
Boosting the long range sensing potential of lora
Wireless sensing is capable of capturing rich information of human target without requiring
sensors attached to the target. Although promising, two critical issues still exist, ie,(i) limited …
sensors attached to the target. Although promising, two critical issues still exist, ie,(i) limited …
When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription
Wireless security cameras may deter intruders. Accompanying the hardware, consumers
may pay recurring monthly fees for recording videos to the cloud, or use the free tier offering …
may pay recurring monthly fees for recording videos to the cloud, or use the free tier offering …
Toward enhancing web privacy on HTTPS traffic: A novel SuperLearner attack model and an efficient defense approach with adversarial examples
Web privacy-enhancing technologies have been grown to preserve the users' privacy
against sophisticated traffic analysis attacks aimed at inferring sensitive information. An …
against sophisticated traffic analysis attacks aimed at inferring sensitive information. An …