暂无分享,去创建一个
[1] Yueming Cai,et al. Secure Communication in NOMA-Assisted Millimeter-Wave SWIPT UAV Networks , 2020, IEEE Internet of Things Journal.
[2] Bin Zheng,et al. A robust distance-based relay selection for message dissemination in vehicular network , 2018, Wireless Networks.
[3] Reza Fotohi,et al. A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms , 2020, The Journal of Supercomputing.
[4] Reza Fotohi,et al. SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism , 2020, Wirel. Pers. Commun..
[5] Reza Fotohi,et al. Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system , 2020, Reliab. Eng. Syst. Saf..
[6] Jin Wang,et al. ARNS: Adaptive Relay-Node Selection Method for Message Broadcasting in the Internet of Vehicles , 2020, Sensors.
[7] Wei Chen,et al. Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network , 2019 .
[8] Gaige Wang,et al. A Bat Algorithm with Mutation for UCAV Path Planning , 2012, TheScientificWorldJournal.
[9] Chang Zhou,et al. Optimal Coverage Multi-Path Scheduling Scheme with Multiple Mobile Sinks for WSNs , 2020 .
[10] NZ Jhanjhi,et al. UAV’s Applications, Architecture, Security Issues and Attack Scenarios: A Survey , 2020, Intelligent Computing and Innovation on Data Science.
[11] Hong Duan,et al. Path Planning for Uninhabited Combat Aerial Vehicle Using Hybrid Meta-Heuristic DE/BBO Algorithm , 2012 .
[12] Fereidoon Shams Aliee,et al. An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks , 2020, Veh. Commun..
[13] Gaige Wang,et al. A Hybrid Metaheuristic DE/CS Algorithm for UCAV Three-Dimension Path Planning , 2012, TheScientificWorldJournal.
[14] A. F. Adams,et al. The Survey , 2021, Dyslexia in Higher Education.
[15] Inkyu Lee,et al. UAV-Aided Secure Communications With Cooperative Jamming , 2018, IEEE Transactions on Vehicular Technology.
[16] Jie Xu,et al. Secure UAV Communication With Cooperative Jamming and Trajectory Control , 2018, IEEE Communications Letters.
[17] Ing-Ray Chen,et al. Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[18] Chao Li,et al. Protecting Secure Communication Under UAV Smart Attack With Imperfect Channel Estimation , 2018, IEEE Access.
[19] Reza Fotohi,et al. An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks , 2020, Veh. Commun..
[20] Xiaofan He,et al. Secure UAV Communication Networks via Friendly Jamming and Bandwidth Allocation , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[21] Gai-Ge Wang,et al. A modified firefly algorithm for UCAV path planning , 2012 .
[22] Jianyu Zhao,et al. Abnormal Behavior Detection Scheme of UAV Using Recurrent Neural Networks , 2019, IEEE Access.
[23] Reza Fotohi,et al. Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication , 2020, The Journal of Supercomputing.
[24] Nirwan Ansari,et al. A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[25] Suk-Hwan Lee,et al. The Secure UAV Communication Link Based on OTP Encryption Technique , 2019, 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN).
[26] E. Karthikeyan,et al. An intelligent energy efficient cooperative MIMO-AF multi-hop and relay based communications for Unmanned Aerial Vehicular networks , 2020, Comput. Commun..
[27] Sumeet Gupta,et al. Secure Communication in UAV Assisted HetNets: A Proposed Model , 2019, SpaCCS.
[28] Andrey V. Savkin,et al. Energy-Efficient 3D Navigation of a Solar-Powered UAV for Secure Communication in the Presence of Eavesdroppers and No-Fly Zones , 2020, Energies.
[29] Arjan Durresi,et al. A survey: Control plane scalability issues and approaches in Software-Defined Networking (SDN) , 2017, Comput. Networks.
[30] Reza Fotohi,et al. NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things , 2020, The Journal of Supercomputing.
[31] Luo Liu,et al. A hybrid meta-heuristic DE/CS Algorithm for UCAV path planning , 2012 .