Swarm of UAVs for network management in 6G: A technical review

MA Khan, N Kumar, SAH Mohsan… - … on Network and …, 2022 - ieeexplore.ieee.org
Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G)
networks, which are capable of incorporating autonomous services to swarm of unmanned …

A survey on ransomware: Evolution, taxonomy, and defense solutions

H Oz, A Aris, A Levi, AS Uluagac - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …

Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems

H Alqahtani, G Kumar - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
This paper delves into the transformative role of machine learning (ML) techniques in
revolutionizing the security of electric and flying vehicles (EnFVs). By exploring key domains …

Security challenges for drone communications: Possible threats, attacks and countermeasures

M Krichen, WYH Adoni, A Mihoub… - … Conference of Smart …, 2022 - ieeexplore.ieee.org
The current development of drones and the prospects in this field have positive
repercussions, in particular for employment and industrial development, with the key to …

Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

AE Omolara, M Alawida, OI Abiodun - Neural computing and applications, 2023 - Springer
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …

Security threats and mitigation techniques in UAV communications: A comprehensive survey

GK Pandey, DS Gurjar, HH Nguyen, S Yadav - IEEE Access, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new
applications and services, including military and rescue operations, aerial surveillance …

Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques

K Venkatesan, SB Rahayu - Scientific Reports, 2024 - nature.com
In this paper, we propose hybrid consensus algorithms that combine machine learning (ML)
techniques to address the challenges and vulnerabilities in blockchain networks …

DDoS attack and detection methods in internet-enabled networks: Concept, research perspectives, and challenges

KB Adedeji, AM Abu-Mahfouz, AM Kurien - Journal of Sensor and …, 2023 - mdpi.com
In recent times, distributed denial of service (DDoS) has been one of the most prevalent
security threats in internet-enabled networks, with many internet of things (IoT) devices …

Secure UAV-aided mobile edge computing for IoT: A review

ET Michailidis, K Maliatsos, DN Skoutas… - IEEE …, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) ecosystem evolves, innovative applications with stringent
demands with respect to latency will emerge. To handle computation-intensive tasks in a …

A review on software-based and hardware-based authentication mechanisms for the internet of drones

ET Michailidis, D Vouyioukas - Drones, 2022 - mdpi.com
During the last few years, a wide variety of Internet of Drones (IoD) applications have
emerged with numerous heterogeneous aerial and ground network elements …