Intelligent Detection System Enabled Attack Probability Using Markov Chain in Aerial Networks
暂无分享,去创建一个
Mohammad Dahman Alshehri | Asrin Abdollahi | Ryan Alturki | Mohammed Abdulaziz Ikram | Inam Ullah Khan | Hasan J. Alyamani | Shahzad Khan | I. Khan | M. Alshehri | Ryan Alturki | M. Ikram | Asrin Abdollahi | Shahzad Khan
[1] Gaurav Raj,et al. Surveillance drone for disaster management and military security , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).
[2] Shalini Batra,et al. Tree-Based Attack–Defense Model for Risk Assessment in Multi-UAV Networks , 2019, IEEE Consumer Electronics Magazine.
[3] Tommaso Melodia,et al. Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking , 2018, IEEE Internet of Things Journal.
[4] Thomas Lagkas,et al. A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics , 2020, IEEE Communications Surveys & Tutorials.
[5] Ekram Khan,et al. Aerial surveillance system using UAV , 2016, 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN).
[6] Lui Sha,et al. A Container-based DoS Attack-Resilient Control Framework for Real-Time UAV Systems , 2018, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[7] Mohammad Fathi,et al. An Intrusion Detection System on Ping of Death Attacks in IoT Networks , 2020, Wireless Personal Communications.
[8] Umit Karabiyik,et al. Drone Disrupted Denial of Service Attack (3DOS): Towards an Incident Response and Forensic Analysis of Remotely Piloted Aerial Systems (RPASs) , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).
[9] Mohiuddin Ahmed,et al. False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure , 2020, Complex Adapt. Syst. Model..
[10] Thomas Lagkas,et al. UAV IoT Framework Views and Challenges: Towards Protecting Drones as “Things” , 2018, Sensors.
[11] Inam Ullah Khan,et al. Smart IoT Control-Based Nature Inspired Energy Efficient Routing Protocol for Flying Ad Hoc Network (FANET) , 2020, IEEE Access.
[12] Houbing Song,et al. Data Security and Privacy Issues in Swarms of Drones , 2019, 2019 Integrated Communications, Navigation and Surveillance Conference (ICNS).
[13] Lei Yang,et al. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information , 2018, Sensors.
[14] Anis Laouiti,et al. Multipoint relaying for flooding broadcast messages in mobile wireless networks , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[15] Frank L. Lewis,et al. Security of unmanned aerial vehicle systems against cyber-physical attacks , 2016 .
[16] Ali Safaa Sadiq,et al. Comprehensive Review of Cybercrime Detection Techniques , 2020, IEEE Access.
[17] Calvin Coopmans,et al. Improving communication security of open source UAVs: Encrypting radio control link , 2017, 2017 International Conference on Unmanned Aircraft Systems (ICUAS).
[18] Rao R. Bhavani,et al. UAV based security system for prevention of harassment against woman , 2017, 2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT).