Communities
Connect sessions
AI calendar
Organizations
Join Slack
Contact Sales
Search
Open menu
Home
Papers
2001.05354
Cited By
Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication
Journal of Supercomputing (JS), 2020
15 January 2020
Kobra Mabodi
Mehdi Yusefi
Shahram Zandiyan
Leili Irankhah
Reza Fotohi
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication"
9 / 9 papers shown
A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema
Wireless personal communications (Wirel. Pers. Commun.), 2021
Reza Fotohi
Hossein Pakdel
124
24
0
31 Mar 2021
File fragment recognition based on content and statistical features
Multimedia tools and applications (MTA), 2020
Marzieh Masoumi
A. Keshavarz
Reza Fotohi
106
7
0
25 Feb 2021
A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem
International Journal of Communication Systems (IJCS), 2020
Mina Zaminkar
Fateme Sarkohaki
Reza Fotohi
222
45
0
21 Nov 2020
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles
Maryam Faraji-Biregani
Reza Fotohi
259
65
0
03 Nov 2020
An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks
Vehicular Communications (Veh. Commun.), 2020
Reza Fotohi
E. Nazemi
Fereidoon Shams Aliee
AAML
159
97
0
03 Jun 2020
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism
Mina Zaminkar
Reza Fotohi
173
85
0
17 May 2020
Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system
Reliability Engineering & System Safety (RESS), 2020
Reza Fotohi
AAML
131
71
0
01 Mar 2020
Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol
International Journal of Communication Systems (IJCS), 2019
Reza Fotohi
Somayyeh Firoozi Bari
Mehdi Yusefi
AAML
156
87
0
16 Jan 2020
Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures
IEEE Communications Surveys and Tutorials (COMST), 2019
I. Butun
Patrik Österberg
Houbing Song
309
571
0
29 Oct 2019
1
Page 1 of 1