Advancing UAV security with artificial intelligence: A comprehensive survey of techniques and future directions

F Tlili, S Ayed, LC Fourati - Internet of Things, 2024 - Elsevier
Abstract Unmanned Aerial Vehicles (UAVs) have become an integral part of modern smart
cities and systems. However, the proliferation of UAVs has also brought a significant security …

A survey on 6G enabled light weight authentication protocol for UAVs, security, open research issues and future directions

AS Khan, MA Sattar, K Nisar, AAA Ibrahim, NB Annuar… - Applied Sciences, 2022 - mdpi.com
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment

S Dalal, P Manoharan, UK Lilhore, B Seth… - Journal of Cloud …, 2023 - Springer
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive
approach is proposed in this assessment to deal with the problem of identifying new …

Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree

S Dalal, UK Lilhore, N Faujdar, S Simaiya… - Journal of Cloud …, 2023 - Springer
Billions of gadgets are already online, making the IoT an essential aspect of daily life.
However, the interconnected nature of IoT devices also leaves them open to cyber threats …

Reliable information delivery and dynamic link utilization in MANET cloud using deep reinforcement learning

S Kuang, J Zhang, A Mohajer - Transactions on Emerging …, 2024 - Wiley Online Library
Modern networking demands efficient and reliable information delivery within Mobile Ad‐
hoc Network (MANET) and cloud environments. This paper introduces a novel approach that …

[HTML][HTML] Fuzzy based intrusion detection system in MANET

CE Singh, SMC Vigila - Measurement: Sensors, 2023 - Elsevier
The rapid development and popularization of the Mobile Adhoc Network (MANET) have
brought many security issues in network. Intrusion detection system, an effective security …

Performance optimization of multi-hop routing protocols with clustering-based hybrid networking architecture in mobile adhoc cloud networks

D Srivastava, A Kumar, A Mishra, V Arya… - International Journal of …, 2022 - igi-global.com
Mobile networks, in particular, are composed of wireless cellular communication nodes
(MANET). Communication between these mobile nodes is not under centric systems …

Driving Technologies of Industry 5.0 in the Medical Field

S Dalal, B Seth, M Radulescu - … 5.0: An Organizational Model for Twin …, 2023 - emerald.com
Customers today expect businesses to cater to their individual needs by tailoring the
products they purchase to their own preferences. The term “Industry 5.0” refers to a new …

[PDF][PDF] A comparative performance evaluation of routing protocols for mobile ad-hoc networks

BH Khudayer, LR Alzabin, M Anbar… - International Journal of …, 2023 - academia.edu
Mobile Ad Hoc Network (MANET) is a group of wireless mobile nodes that can connect with
each other over a number of hops without the need for centralized management or pre …

A comprehensive survey on the chicken swarm optimization algorithm and its applications: state-of-the-art and research challenges

B Chen, L Cao, C Chen, Y Chen, Y Yue - Artificial Intelligence Review, 2024 - Springer
The application of optimization theory and the algorithms that are generated from it has
increased along with science and technology's continued advancement. Numerous issues …