Computing in the sky: A survey on intelligent ubiquitous computing for uav-assisted 6g networks and industry 4.0/5.0
Unmanned Aerial Vehicles (UAVs) are increasingly being used in a high-computation
paradigm enabled with smart applications in the Beyond Fifth Generation (B5G) wireless …
paradigm enabled with smart applications in the Beyond Fifth Generation (B5G) wireless …
Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …
A survey on security and privacy issues of UAVs
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs),
has witnessed a rapid increase with its large number of airspace users. The tremendous …
has witnessed a rapid increase with its large number of airspace users. The tremendous …
A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions
Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to
complete a number of tasks in cooperation with each other without need for human …
complete a number of tasks in cooperation with each other without need for human …
[HTML][HTML] Towards sustainable industry 4.0: A survey on greening IoE in 6G networks
The dramatic recent increase of the smart Internet of Everything (IoE) in Industry 4.0 has
significantly increased energy consumption, carbon emissions, and global warming. IoE …
significantly increased energy consumption, carbon emissions, and global warming. IoE …
Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures
F Tlili, LC Fourati, S Ayed, B Ouni - Ad hoc networks, 2022 - Elsevier
Unmanned aerial vehicles (UAVs) are the current leading devices used by different sectors.
They open doors to new opportunities for investors and business service providers. Their …
They open doors to new opportunities for investors and business service providers. Their …
Secure estimation against malicious attacks for lithium-ion batteries under cloud environments
This paper is concerned with the secure estimation problem for the state of charge of Lithium-
ion batteries subject to malicious attacks during the data transmission from sensors to cloud …
ion batteries subject to malicious attacks during the data transmission from sensors to cloud …
[HTML][HTML] Modelling of the energy depletion process and battery depletion attacks for battery-powered internet of things (iot) devices
The Internet of Things (IoT) is transforming almost every industry, including agriculture, food
processing, health care, oil and gas, environmental protection, transportation and logistics …
processing, health care, oil and gas, environmental protection, transportation and logistics …
Securing UAV flying base station for mobile networking: A review
A flying base station based on an unmanned aerial vehicle (UAV) uses its mobility to extend
its connectivity coverage and improve its communication channel quality to achieve a …
its connectivity coverage and improve its communication channel quality to achieve a …
Facets of security and safety problems and paradigms for smart aerial mobility and intelligent logistics
The use of unmanned aerial vehicles (UAVs) for smart and speedy logistics is still relatively
nascent compared to traditional delivery methods. However, it is witnessing sporadic and …
nascent compared to traditional delivery methods. However, it is witnessing sporadic and …