ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.05354
  4. Cited By
Multi-level trust-based intelligence schema for securing of internet of
  things (IoT) against security threats using cryptographic authentication

Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication

Journal of Supercomputing (JS), 2020
15 January 2020
Kobra Mabodi
Mehdi Yusefi
Shahram Zandiyan
Leili Irankhah
Reza Fotohi
ArXiv (abs)PDFHTML

Papers citing "Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication"

9 / 9 papers shown
A Lightweight and Scalable Physical Layer Attack Detection Mechanism for
  the Internet of Things (IoT) Using Hybrid Security Schema
A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security SchemaWireless personal communications (Wirel. Pers. Commun.), 2021
Reza Fotohi
Hossein Pakdel
124
24
0
31 Mar 2021
File fragment recognition based on content and statistical features
File fragment recognition based on content and statistical featuresMultimedia tools and applications (MTA), 2020
Marzieh Masoumi
A. Keshavarz
Reza Fotohi
106
7
0
25 Feb 2021
A method based on encryption and node rating for securing the RPL
  protocol communications in the IoT ecosystem
A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystemInternational Journal of Communication Systems (IJCS), 2020
Mina Zaminkar
Fateme Sarkohaki
Reza Fotohi
222
45
0
21 Nov 2020
Secure communication between UAVs using a method based on smart agents
  in unmanned aerial vehicles
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles
Maryam Faraji-Biregani
Reza Fotohi
259
65
0
03 Nov 2020
An agent-based self-protective method to secure communication between
  UAVs in unmanned aerial vehicle networks
An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networksVehicular Communications (Veh. Commun.), 2020
Reza Fotohi
E. Nazemi
Fereidoon Shams Aliee
AAML
159
97
0
03 Jun 2020
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL
  Protocol-Based Node Rating and Ranking Mechanism
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism
Mina Zaminkar
Reza Fotohi
173
85
0
17 May 2020
Securing of Unmanned Aerial Systems (UAS) against security threats using
  human immune system
Securing of Unmanned Aerial Systems (UAS) against security threats using human immune systemReliability Engineering & System Safety (RESS), 2020
Reza Fotohi
AAML
131
71
0
01 Mar 2020
Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using
  RSA Cryptography Algorithm and Interlock Protocol
Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock ProtocolInternational Journal of Communication Systems (IJCS), 2019
Reza Fotohi
Somayyeh Firoozi Bari
Mehdi Yusefi
AAML
156
87
0
16 Jan 2020
Security of the Internet of Things: Vulnerabilities, Attacks and
  Countermeasures
Security of the Internet of Things: Vulnerabilities, Attacks and CountermeasuresIEEE Communications Surveys and Tutorials (COMST), 2019
I. Butun
Patrik Österberg
Houbing Song
309
571
0
29 Oct 2019
1
Page 1 of 1