Swarm of UAVs for network management in 6G: A technical review
Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G)
networks, which are capable of incorporating autonomous services to swarm of unmanned …
networks, which are capable of incorporating autonomous services to swarm of unmanned …
A survey on ransomware: Evolution, taxonomy, and defense solutions
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …
users, governments, and business organizations. It has become a very profitable business …
Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems
H Alqahtani, G Kumar - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
This paper delves into the transformative role of machine learning (ML) techniques in
revolutionizing the security of electric and flying vehicles (EnFVs). By exploring key domains …
revolutionizing the security of electric and flying vehicles (EnFVs). By exploring key domains …
Security challenges for drone communications: Possible threats, attacks and countermeasures
The current development of drones and the prospects in this field have positive
repercussions, in particular for employment and industrial development, with the key to …
repercussions, in particular for employment and industrial development, with the key to …
Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …
Security threats and mitigation techniques in UAV communications: A comprehensive survey
Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new
applications and services, including military and rescue operations, aerial surveillance …
applications and services, including military and rescue operations, aerial surveillance …
Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques
K Venkatesan, SB Rahayu - Scientific Reports, 2024 - nature.com
In this paper, we propose hybrid consensus algorithms that combine machine learning (ML)
techniques to address the challenges and vulnerabilities in blockchain networks …
techniques to address the challenges and vulnerabilities in blockchain networks …
DDoS attack and detection methods in internet-enabled networks: Concept, research perspectives, and challenges
In recent times, distributed denial of service (DDoS) has been one of the most prevalent
security threats in internet-enabled networks, with many internet of things (IoT) devices …
security threats in internet-enabled networks, with many internet of things (IoT) devices …
Secure UAV-aided mobile edge computing for IoT: A review
As the Internet of Things (IoT) ecosystem evolves, innovative applications with stringent
demands with respect to latency will emerge. To handle computation-intensive tasks in a …
demands with respect to latency will emerge. To handle computation-intensive tasks in a …
A review on software-based and hardware-based authentication mechanisms for the internet of drones
ET Michailidis, D Vouyioukas - Drones, 2022 - mdpi.com
During the last few years, a wide variety of Internet of Drones (IoD) applications have
emerged with numerous heterogeneous aerial and ground network elements …
emerged with numerous heterogeneous aerial and ground network elements …