ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2003.04984
  4. Cited By
Securing of Unmanned Aerial Systems (UAS) against security threats using
  human immune system

Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system

Reliability Engineering & System Safety (RESS), 2020
1 March 2020
Reza Fotohi
    AAML
ArXiv (abs)PDFHTML

Papers citing "Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system"

12 / 12 papers shown
Securing IoT Communications via Anomaly Traffic Detection: Synergy of Genetic Algorithm and Ensemble Method
Securing IoT Communications via Anomaly Traffic Detection: Synergy of Genetic Algorithm and Ensemble MethodItalian National Conference on Sensors (INS), 2025
Behnam Seyedi
Octavian Postolache
128
4
0
21 Oct 2025
A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of
  Attacks, and Solutions
A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and SolutionsIEEE Communications Surveys and Tutorials (COMST), 2023
Ozlem Ceviz
Pinar Sadioglu
Sevil Sen
311
63
0
25 Jun 2023
File fragment recognition based on content and statistical features
File fragment recognition based on content and statistical featuresMultimedia tools and applications (MTA), 2020
Marzieh Masoumi
A. Keshavarz
Reza Fotohi
113
8
0
25 Feb 2021
A method based on encryption and node rating for securing the RPL
  protocol communications in the IoT ecosystem
A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystemInternational Journal of Communication Systems (IJCS), 2020
Mina Zaminkar
Fateme Sarkohaki
Reza Fotohi
227
45
0
21 Nov 2020
Secure communication between UAVs using a method based on smart agents
  in unmanned aerial vehicles
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles
Maryam Faraji-Biregani
Reza Fotohi
274
65
0
03 Nov 2020
An agent-based self-protective method to secure communication between
  UAVs in unmanned aerial vehicle networks
An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networksVehicular Communications (Veh. Commun.), 2020
Reza Fotohi
E. Nazemi
Fereidoon Shams Aliee
AAML
159
97
0
03 Jun 2020
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL
  Protocol-Based Node Rating and Ranking Mechanism
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism
Mina Zaminkar
Reza Fotohi
174
85
0
17 May 2020
A New Approach for Improvement Security against DoS Attacks in Vehicular
  Ad-hoc Network
A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc NetworkInternational Journal of Advanced Computer Science and Applications (IJACSA), 2020
Reza Fotohi
Yaser Ebazadeh
Mohammad Seyyar Geshlag
98
60
0
24 Feb 2020
Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using
  RSA Cryptography Algorithm and Interlock Protocol
Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock ProtocolInternational Journal of Communication Systems (IJCS), 2019
Reza Fotohi
Somayyeh Firoozi Bari
Mehdi Yusefi
AAML
157
87
0
16 Jan 2020
A novel countermeasure technique to protect WSN against denial-of-sleep
  attacks using firefly and Hopfield neural network (HNN) algorithms
A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithmsJournal of Supercomputing (JS), 2020
Reza Fotohi
Somayyeh Firoozi Bari
105
63
0
15 Jan 2020
Multi-level trust-based intelligence schema for securing of internet of
  things (IoT) against security threats using cryptographic authentication
Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authenticationJournal of Supercomputing (JS), 2020
Kobra Mabodi
Mehdi Yusefi
Shahram Zandiyan
Leili Irankhah
Reza Fotohi
142
86
0
15 Jan 2020
Defending against Intrusion of Malicious UAVs with Networked UAV Defense
  Swarms
Defending against Intrusion of Malicious UAVs with Networked UAV Defense Swarms
Matthias R. Brust
Grégoire Danoy
Pascal Bouvry
Dren Gashi
Himadri Pathak
Mike P. Gonçalves
158
63
0
21 Aug 2018
1
Page 1 of 1