Fast, reliable, and secure drone communication: A comprehensive survey
Drone security is currently a major topic of discussion among researchers and industrialists.
Although there are multiple applications of drones, if the security challenges are not …
Although there are multiple applications of drones, if the security challenges are not …
Comprehensive survey of UAVs communication networks
AI Hentati, LC Fourati - Computer Standards & Interfaces, 2020 - Elsevier
Recently, technologies related to Unmanned Aerial Vehicle (UAV) are growing rapidly
particularly sensors, networking, and processing technologies. Accordingly, governments …
particularly sensors, networking, and processing technologies. Accordingly, governments …
Container security: Issues, challenges, and the road ahead
Containers emerged as a lightweight alternative to virtual machines (VMs) that offer better
microservice architecture support. The value of the container market is expected to reach 2.7 …
microservice architecture support. The value of the container market is expected to reach 2.7 …
Security challenges for drone communications: Possible threats, attacks and countermeasures
The current development of drones and the prospects in this field have positive
repercussions, in particular for employment and industrial development, with the key to …
repercussions, in particular for employment and industrial development, with the key to …
Container-based virtualization for real-time industrial systems—a systematic review
Industrial Automation and Control systems have matured into a stable infrastructure model
that has been kept fundamentally unchanged, using discrete embedded systems (such as …
that has been kept fundamentally unchanged, using discrete embedded systems (such as …
Container security: precaution levels, mitigation strategies, and research perspectives
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …
during the past two decades. Using conventional techniques, software developers write …
On the security of containers: Threat modeling, attack analysis, and mitigation strategies
Traditionally, applications that are used in large and small enterprises were deployed on
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …
Detecting signal spoofing attack in uavs using machine learning models
Due to the tremendous advancement in interactive multimedia systems and technologies,
security has become a major aspect. Advanced technology can be utilized for hacking …
security has become a major aspect. Advanced technology can be utilized for hacking …
An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks
UAVNs (unmanned aerial vehicle networks) may become vulnerable to threats and attacks
due to their characteristic features such as highly dynamic network topology, open-air …
due to their characteristic features such as highly dynamic network topology, open-air …
Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication
HPD Nguyen, DD Nguyen - Development and Future of Internet of Drones …, 2021 - Springer
With the boost of technologies in computing, the Internet of things (IoT), and Information and
Communication Technologies (ICT), the demand for using drones has been increased in …
Communication Technologies (ICT), the demand for using drones has been increased in …