Anomaly-based intrusion detection system for IoT application
Abstract Internet-of-Things (IoT) connects various physical objects through the Internet and it
has a wide application, such as in transportation, military, healthcare, agriculture, and many …
has a wide application, such as in transportation, military, healthcare, agriculture, and many …
A review on c3i systems' security: Vulnerabilities, attacks, and countermeasures
Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in
critical civil and military domains for achieving information superiority, operational efficacy …
critical civil and military domains for achieving information superiority, operational efficacy …
Cluster-based classical routing protocols and authentication algorithms in WSN: a survey based on procedures and methods
RK Yadav, R Mishra - Wireless Personal Communications, 2022 - Springer
Wireless sensor system (WSN) is an assortment of miniature sensor knobs with some
limitations. But in today's world, we are searching for the approach which provides cost …
limitations. But in today's world, we are searching for the approach which provides cost …
Enhanced data accuracy based PATH discovery using backing route selection algorithm in MANET
RP Premanand, A Rajaram - Peer-to-Peer Networking and Applications, 2020 - Springer
Unstable Mobile nodes in the network does not maintain the accuracy of data transmission
at the maximum level since the node's characteristics are updated, then nodes receive …
at the maximum level since the node's characteristics are updated, then nodes receive …
A cooperative watchdog model based on Dempster–Shafer for detecting misbehaving vehicles
In this paper, we address the problem of detecting misbehaving vehicles in Vehicular Ad
Hoc Network (VANET) using Quality of Service Optimized Link State Routing (QoS-OLSR) …
Hoc Network (VANET) using Quality of Service Optimized Link State Routing (QoS-OLSR) …
Security issues in flying ad-hoc networks (FANETS)
Abstract Technological advancements in Unmanned Aerial Vehicles (UAV) encourage the
use of multi-UAV systems in military and civil applications. The most important benefit of the …
use of multi-UAV systems in military and civil applications. The most important benefit of the …
A novel optimally weighted framework of piecewise gamma corrected fractional order masking for satellite image enhancement
A novel image quality enhancement framework is proposed here through a collective
inspiration of the exponential, differential and linear operational behavior of pixel intensities …
inspiration of the exponential, differential and linear operational behavior of pixel intensities …
Secure routing protocol design for UAV ad hoc networks
JA Maxa, MSB Mahmoud… - 2015 IEEE/AIAA 34th …, 2015 - ieeexplore.ieee.org
UAV Ad hoc NETworks (UAANETs) can be defined as a new form of ad hoc networks in
which nodes are Unmanned Aerial Vehicles (UAVs) and Ground Control Station (GCS) …
which nodes are Unmanned Aerial Vehicles (UAVs) and Ground Control Station (GCS) …
[PDF][PDF] Classification of attacks on wireless sensor networks: A survey
Abstract Wireless Sensor Networks (WSN) is one of the fastest rising emerging technologies
that find widespread use in various applications comprising of military, health, agriculture …
that find widespread use in various applications comprising of military, health, agriculture …
Distributed Edge Caching for Zero Trust-Enabled Connected and Automated Vehicles: A Multi-Agent Reinforcement Learning Approach
Zero Trust model enhances the security of wireless network environments, which is thought
to be effectively applicable to Connected and automated vehicles (CAVs). Considering the …
to be effectively applicable to Connected and automated vehicles (CAVs). Considering the …