Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …
technologies and have wide range of applications in our surrounding environment. The …
Blockchain-assisted UAV communication systems: A comprehensive survey
Unmanned aerial vehicles (UAVs) have recently established their capacity to provide cost-
effective and credible solutions for various real-world scenarios. UAVs provide an immense …
effective and credible solutions for various real-world scenarios. UAVs provide an immense …
A survey on security and privacy issues of UAVs
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs),
has witnessed a rapid increase with its large number of airspace users. The tremendous …
has witnessed a rapid increase with its large number of airspace users. The tremendous …
Secure routing for internet of things: A survey
Abstract The Internet of Things (IoT) could be described as the pervasive and global network
which aids and provides a system for the monitoring and control of the physical world …
which aids and provides a system for the monitoring and control of the physical world …
Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …
Routing protocols in ad hoc networks: A survey
Ad hoc wireless networks perform the difficult task of multi-hop communication in an
environment without a dedicated infrastructure, with mobile nodes and changing network …
environment without a dedicated infrastructure, with mobile nodes and changing network …
Ariadne: A secure on-demand routing protocol for ad hoc networks
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Page 1 Ariadne: A
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …
Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks
B Bhushan, G Sahoo - Wireless Personal Communications, 2018 - Springer
Advances in hardware manufacturing technology, wireless communications, micro electro-
mechanical devices and information processing technologies enabled the development of …
mechanical devices and information processing technologies enabled the development of …
[HTML][HTML] Survey on security issues in vehicular ad hoc networks
Abstract Vehicular Ad hoc NETworks are special case of ad hoc networks that, besides
lacking infrastructure, communicating entities move with various accelerations. Accordingly …
lacking infrastructure, communicating entities move with various accelerations. Accordingly …
[BUCH][B] Germ Cell Tumor
A Matin - 2012 - books.google.com
The book aims to provide an overview of current knowledge regarding germ cell tumors. It
deals with the clinical presentations, treatment modalities, the biology and genetics of germ …
deals with the clinical presentations, treatment modalities, the biology and genetics of germ …