Fast, reliable, and secure drone communication: A comprehensive survey

V Hassija, V Chamola, A Agrawal… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Drone security is currently a major topic of discussion among researchers and industrialists.
Although there are multiple applications of drones, if the security challenges are not …

Comprehensive survey of UAVs communication networks

AI Hentati, LC Fourati - Computer Standards & Interfaces, 2020 - Elsevier
Recently, technologies related to Unmanned Aerial Vehicle (UAV) are growing rapidly
particularly sensors, networking, and processing technologies. Accordingly, governments …

Container security: Issues, challenges, and the road ahead

S Sultan, I Ahmad, T Dimitriou - IEEE access, 2019 - ieeexplore.ieee.org
Containers emerged as a lightweight alternative to virtual machines (VMs) that offer better
microservice architecture support. The value of the container market is expected to reach 2.7 …

Security challenges for drone communications: Possible threats, attacks and countermeasures

M Krichen, WYH Adoni, A Mihoub… - … Conference of Smart …, 2022 - ieeexplore.ieee.org
The current development of drones and the prospects in this field have positive
repercussions, in particular for employment and industrial development, with the key to …

Container-based virtualization for real-time industrial systems—a systematic review

R Queiroz, T Cruz, J Mendes, P Sousa… - ACM Computing …, 2023 - dl.acm.org
Industrial Automation and Control systems have matured into a stable infrastructure model
that has been kept fundamentally unchanged, using discrete embedded systems (such as …

Container security: precaution levels, mitigation strategies, and research perspectives

DP VS, SC Sethuraman, MK Khan - Computers & Security, 2023 - Elsevier
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …

On the security of containers: Threat modeling, attack analysis, and mitigation strategies

AY Wong, EG Chekole, M Ochoa, J Zhou - Computers & Security, 2023 - Elsevier
Traditionally, applications that are used in large and small enterprises were deployed on
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …

Detecting signal spoofing attack in uavs using machine learning models

A Shafique, A Mehmood, M Elhadef - IEEE access, 2021 - ieeexplore.ieee.org
Due to the tremendous advancement in interactive multimedia systems and technologies,
security has become a major aspect. Advanced technology can be utilized for hacking …

An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks

R Fotohi, E Nazemi, FS Aliee - Vehicular Communications, 2020 - Elsevier
UAVNs (unmanned aerial vehicle networks) may become vulnerable to threats and attacks
due to their characteristic features such as highly dynamic network topology, open-air …

Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication

HPD Nguyen, DD Nguyen - Development and Future of Internet of Drones …, 2021 - Springer
With the boost of technologies in computing, the Internet of things (IoT), and Information and
Communication Technologies (ICT), the demand for using drones has been increased in …