Zitieren

T. Vyas, and H. R. Varia, “Impact of Construction Work Zone on Urban Traffic Environment,” International Journal on Smart Sensing and Intelligent Systems, 2023, vol. 16, no. 1. VyasT. VariaH. R. “Impact of Construction Work Zone on Urban Traffic Environment,” International Journal on Smart Sensing and Intelligent Systems 2023 16 1 Search in Google Scholar

S. Lee, H. Yeo, and M. Kang, “Biometric authentication sensor with an encryption module for prevention of h/w hacking in digital custody services,” International Journal on Smart Sensing and Intelligent Systems, 2023, vol. 16, no. 1. LeeS. YeoH. KangM. “Biometric authentication sensor with an encryption module for prevention of h/w hacking in digital custody services,” International Journal on Smart Sensing and Intelligent Systems 2023 16 1 Search in Google Scholar

W. Shafik, “Cyber Security Perspectives in Public Spaces: Drone Case Study,” In Handbook of Research on Cybersecurity Risk in Contemporary Business Systems, 2023, pp. 79–97. IGI Global. ShafikW. “Cyber Security Perspectives in Public Spaces: Drone Case Study,” In Handbook of Research on Cybersecurity Risk in Contemporary Business Systems 2023 79 97 IGI Global Search in Google Scholar

A. K. Arora, S. Mahajan, M. Verma, and D. Haridas, “Study of structural and morphological properties of RF-sputtered SnO thin films and their effect on gas-sensing phenomenon,” International Journal on Smart Sensing and Intelligent Systems, 2023, vol. 16, no. 1. AroraA. K. MahajanS. VermaM. HaridasD. “Study of structural and morphological properties of RF-sputtered SnO thin films and their effect on gas-sensing phenomenon,” International Journal on Smart Sensing and Intelligent Systems 2023 16 1 Search in Google Scholar

W. Shafik, “A Comprehensive Cybersecurity Framework for Present and Future Global Information Technology Organizations,” In Effective Cybersecurity Operations for Enterprise-Wide Systems, 2023, pp. 56–79. IGI Global. ShafikW. “A Comprehensive Cybersecurity Framework for Present and Future Global Information Technology Organizations,” In Effective Cybersecurity Operations for Enterprise-Wide Systems 2023 56 79 IGI Global Search in Google Scholar

A. Yudhana, A. D. Cahyo, L. Y. Sabila, A. C. Subrata, and I. Mufandi, “Spatial distribution of soil nutrient content for sustainable rice agriculture using geographic information system and Naïve Bayes classifier,” International Journal on Smart Sensing and Intelligent Systems, 2023, vol. 16, no. 1. YudhanaA. CahyoA. D. SabilaL. Y. SubrataA. C. MufandiI. “Spatial distribution of soil nutrient content for sustainable rice agriculture using geographic information system and Naïve Bayes classifier,” International Journal on Smart Sensing and Intelligent Systems 2023 16 1 Search in Google Scholar

S. N. Alaziz, B. Albayati, AAAH El-Bagoury, and W. Shafik, “Clustering of COVID-19 Multi-Time Series-Based K-Means and PCA With Forecasting,” International Journal of Data Warehousing and Mining (IJDWM), 2023, vol. 19, no. 3, pp. 1–25. AlazizS. N. AlbayatiB. El-BagouryAAAH ShafikW. “Clustering of COVID-19 Multi-Time Series-Based K-Means and PCA With Forecasting,” International Journal of Data Warehousing and Mining (IJDWM) 2023 19 3 1 25 Search in Google Scholar

W. Shafik, “Making Cities Smarter: IoT and SDN Applications, Challenges, and Future Trends,” In Opportunities and Challenges of Industrial IoT in 5G and 6G Networks, 2023, pp. 73–94. IGI Global. ShafikW. “Making Cities Smarter: IoT and SDN Applications, Challenges, and Future Trends,” In Opportunities and Challenges of Industrial IoT in 5G and 6G Networks 2023 73 94 IGI Global Search in Google Scholar

R. Majeed, N. Abdullah and M. Mushtaq, “IoT-based cyber-security of drones using the naïve bayes algorithm,” International Journal of Advanced Computer Science and Applications, 2021, vol. 12, pp. 422–427. MajeedR. AbdullahN. MushtaqM. “IoT-based cyber-security of drones using the naïve bayes algorithm,” International Journal of Advanced Computer Science and Applications 2021 12 422 427 Search in Google Scholar

W. Shafik, S. M. Matinkhah, and M. N. Sanda, “Network resource management drives machine learning: a survey and future research direction,” Journal of Communications Technology, Electronics and Computer Science, 2020, pp. 1–15. ShafikW. MatinkhahS. M. SandaM. N. “Network resource management drives machine learning: a survey and future research direction,” Journal of Communications Technology, Electronics and Computer Science 2020 1 15 Search in Google Scholar

Y. Jun, A. Craig, W. Shafik, and L. Sharif, “Artificial intelligence application in cybersecurity and cyberdefense,” Wireless Communications and Mobile Computing, 2021, pp. 1–10. JunY. CraigA. ShafikW. SharifL. “Artificial intelligence application in cybersecurity and cyberdefense,” Wireless Communications and Mobile Computing 2021 1 10 Search in Google Scholar

E. Basan, A. Basan, A. Nekrasov, C. Fidge, J. Gamec et al., “A self-diagnosis method for detecting UAV cyberattacks based on analysis of parameter changes,” Sensors, 2021, vol. 21, no. 2. BasanE. BasanA. NekrasovA. FidgeC. GamecJ. “A self-diagnosis method for detecting UAV cyberattacks based on analysis of parameter changes,” Sensors 2021 21 2 Search in Google Scholar

A. Abdelmaboud, “The internet of drones: requirements, taxonomy, recent advances, and challenges of research trends,” Sensors, 2021, vol. 21, no. 17. AbdelmaboudA. “The internet of drones: requirements, taxonomy, recent advances, and challenges of research trends,” Sensors 2021 21 17 Search in Google Scholar

B. Ly and R. Ly, “Cybersecurity in unmanned aerial vehicles (UAVs),” Journal of Cyber Security Technology, 2021, vol. 5, no. 2, pp. 120–137. LyB. LyR. “Cybersecurity in unmanned aerial vehicles (UAVs),” Journal of Cyber Security Technology 2021 5 2 120 137 Search in Google Scholar

Z. El-Rewini, K. Sadatsharan, N. Sugunaraj, D. F. Selvaraj, S. J. Plathottam et al., “Cybersecurity attacks in vehicular sensors,” IEEE Sensors Journal, vol. 20, no. 22, pp. 13752–13767, 2020. El-RewiniZ. SadatsharanK. SugunarajN. SelvarajD. F. PlathottamS. J. “Cybersecurity attacks in vehicular sensors,” IEEE Sensors Journal 20 22 13752 13767 2020 Search in Google Scholar

M. Ghasemi, M. Varshosaz, S. Pirasteh and G. Shamsipour, “Optimizing sector ring histogram of oriented gradients for human injured detection from drone images,” Geomatics, Natural Hazards and Risk, 2021, vol. 12, no. 1, pp. 581–604. GhasemiM. VarshosazM. PirastehS. ShamsipourG. “Optimizing sector ring histogram of oriented gradients for human injured detection from drone images,” Geomatics, Natural Hazards and Risk 2021 12 1 581 604 Search in Google Scholar

K. Kim, J. S. Kim, S. Jeong, J. H. Park and H. K. Kim, “Cybersecurity for autonomous vehicles: Review of attacks and defense,” Computers & Security, 2021, vol. 103, pp. 102150. KimK. KimJ. S. JeongS. ParkJ. H. KimH. K. “Cybersecurity for autonomous vehicles: Review of attacks and defense,” Computers & Security 2021 103 102150 Search in Google Scholar

L. Abualigah, A. Diabat, P. Sumari and A. H. Gandomi, “Applications, deployments, and integration of internet of drones (IoD): a review,” IEEE Sensors Journal, 2021, vol. 21, no. 22, pp. 25532–25546. AbualigahL. DiabatA. SumariP. GandomiA. H. “Applications, deployments, and integration of internet of drones (IoD): a review,” IEEE Sensors Journal 2021 21 22 25532 25546 Search in Google Scholar

I. U. Khan, A. Abdollahi, R. Alturki, M. D. Alshehri, M. A. Ikram et al., “Intelligent detection system enabled attack probability using markov chain in aerial networks,” Wireless Communications and Mobile Computing, 2021, pp. 1–9. KhanI. U. AbdollahiA. AlturkiR. AlshehriM. D. IkramM. A. “Intelligent detection system enabled attack probability using markov chain in aerial networks,” Wireless Communications and Mobile Computing 2021 1 9 Search in Google Scholar

M. R. Khosravi and S. Samadi, “Mobile multimedia computing in cyber-physical surveillance services through UAV-borne Video-SAR: A taxonomy of intelligent data processing for IoMT-enabled radar sensor networks,” Tsinghua Science and Technology, 2021, vol. 27, no. 2, pp. 288–302. KhosraviM. R. SamadiS. “Mobile multimedia computing in cyber-physical surveillance services through UAV-borne Video-SAR: A taxonomy of intelligent data processing for IoMT-enabled radar sensor networks,” Tsinghua Science and Technology 2021 27 2 288 302 Search in Google Scholar

G. Lykou, D. Moustakas and D. Gritzalis, “Defending airports from UAS: a survey on cyberattacks and counter-drone sensing technologies,” Sensors, 2020, vol. 20, no. 12. LykouG. MoustakasD. GritzalisD. “Defending airports from UAS: a survey on cyberattacks and counter-drone sensing technologies,” Sensors 2020 20 12 Search in Google Scholar

K. Fenrich, “Securing your control system: the “CIA triad” is a widely used benchmark for evaluating information system security effectiveness” Power Engineering, 2008, vol. 112, pp. 44–49. FenrichK. “Securing your control system: the “CIA triad” is a widely used benchmark for evaluating information system security effectiveness” Power Engineering 2008 112 44 49 Search in Google Scholar

S. Hussain, A. Kamal and S. Ahmad, “Threat modeling methodologies: a survey,” Science International, 2014, vol. 26. No. 4, pp. 1607–1609. HussainS. KamalA. AhmadS. “Threat modeling methodologies: a survey,” Science International 2014 26 4 1607 1609 Search in Google Scholar

N. Shevchenko, T. A. Chick and P. O’riordan, “Threat modeling: a summary of available methods,” 2018. ShevchenkoN. ChickT. A. O’riordanP. “Threat modeling: a summary of available methods,” 2018 Search in Google Scholar

M. Mahuza, M. Y. Idris, A. W. Wahab, T. Nandy, I. B. Ahmedy et al., “An edge assisted secure lightweight authentication technique for safe communication on the Internet of drones network,” IEEE Access, 2021, vol. 9, pp. 31420–31440. MahuzaM. IdrisM. Y. WahabA. W. NandyT. AhmedyI. B. “An edge assisted secure lightweight authentication technique for safe communication on the Internet of drones network,” IEEE Access 2021 9 31420 31440 Search in Google Scholar

U. J. Butt, W. Richardson, M. Abbod, H. M. Agbo and C. Eghan, “The deployment of autonomous drones during the covid-19 pandemic,” Cybersecurity, Privacy and Freedom Protection in the Connected World, 2021, pp. 183–220. ButtU. J. RichardsonW. AbbodM. AgboH. M. EghanC. “The deployment of autonomous drones during the covid-19 pandemic,” Cybersecurity, Privacy and Freedom Protection in the Connected World 2021 183 220 Search in Google Scholar

A. Almulhem, “Threat modeling of a multi-UAV system,” Transportation Research Part A: Policy and Practice, 2020, vol. 142, pp. 290–295. AlmulhemA. “Threat modeling of a multi-UAV system,” Transportation Research Part A: Policy and Practice 2020 142 290 295 Search in Google Scholar

D. Lee, W. Park and W. Nam, “Autonomous landing of micro unmanned aerial vehicles with landing-assistive platform and robust spherical object detection,” Applied Sciences, 2021, vol. 11, no. 18, pp. 8555. LeeD. ParkW. NamW. “Autonomous landing of micro unmanned aerial vehicles with landing-assistive platform and robust spherical object detection,” Applied Sciences 2021 11 18 8555 Search in Google Scholar

T. Saba, T. Sadad, A. Rehman, Z. Mehmood and Q. Javaid, “Intrusion detection system through advance machine learning for the internet of things networks,” IT Professional, 2021, vol. 23, no. 2, pp. 58–64. SabaT. SadadT. RehmanA. MehmoodZ. JavaidQ. “Intrusion detection system through advance machine learning for the internet of things networks,” IT Professional 2021 23 2 58 64 Search in Google Scholar

J. Wang, Y. Liu, S. Niu, H. Song, “Bio-inspired routing for heterogeneous unmanned aircraft systems (UAS) swarm networking,” Computers & Electrical Engineering, 2021, vol. 95, pp. 107401. WangJ. LiuY. NiuS. SongH. “Bio-inspired routing for heterogeneous unmanned aircraft systems (UAS) swarm networking,” Computers & Electrical Engineering 2021 95 107401 Search in Google Scholar

A. Yazdinejad, R. M. Parizi, A. Dehghantanha and H. Karimipour, “Federated learning for drone authentication,” Ad Hoc Networks, 2021, vol. 120, pp. 102574. YazdinejadA. PariziR. M. DehghantanhaA. KarimipourH. “Federated learning for drone authentication,” Ad Hoc Networks 2021 120 102574 Search in Google Scholar

G. S. Ilgi and Y. Kirsal Ever, “Chapter Eleven - Critical analysis of security and privacy challenges for the Internet of drones: a survey,” Drones in Smart-Cities, 2020, pp. 207–214. IlgiG. S. Kirsal EverY. “Chapter Eleven - Critical analysis of security and privacy challenges for the Internet of drones: a survey,” Drones in Smart-Cities 2020 207 214 Search in Google Scholar

A. Javaid, “Cyber security threat analysis and attack simulation for unmanned aerial vehicle network,” Doctoral dissertation, University of Toledo, 2015. JavaidA. “Cyber security threat analysis and attack simulation for unmanned aerial vehicle network,” Doctoral dissertation University of Toledo 2015 Search in Google Scholar

C. Rani, H. Modares, R. Sriram, D. Mikulski and F. L. Lewis, “Security of unmanned aerial vehicle systems against cyber-physical attacks,” Journal of Defense Modeling and Simulation, 2016, vol. 13, no. 3, pp. 331–42. RaniC. ModaresH. SriramR. MikulskiD. LewisF. L. “Security of unmanned aerial vehicle systems against cyber-physical attacks,” Journal of Defense Modeling and Simulation 2016 13 3 331 42 Search in Google Scholar

A. Shafique, A. Mehmood and M Elhadef, “Survey of security protocols and vulnerabilities in unmanned aerial vehicles,” IEEE Access, 2021, vol. 9, pp. 46927–46948. ShafiqueA. MehmoodA. ElhadefM “Survey of security protocols and vulnerabilities in unmanned aerial vehicles,” IEEE Access 2021 9 46927 46948 Search in Google Scholar

S. P. Arteaga, L. A. M. Hernández and G. S. Pérez, “Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo,” IEEE Access, 2019, vol. 7, pp. 51782–51789. ArteagaS. P. HernándezL. A. M. PérezG. S. “Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo,” IEEE Access 2019 7 51782 51789 Search in Google Scholar

K. Afzal, R. Tariq, F. Aadil, Z. Iqbal, N. Ali et al., “An Optimized and Efficient Routing Protocol Application for IoV,” Mathematical Problems in Engineering, 2021. AfzalK. TariqR. AadilF. IqbalZ. AliN. “An Optimized and Efficient Routing Protocol Application for IoV,” Mathematical Problems in Engineering 2021 Search in Google Scholar

Y. Xu, G. Deng, T. Zhang, H. Qiu and Y. Bao, “Novel denial-of-service attacks against cloud-based multi-robot systems,” Information Sciences, 2021, vol. 576, pp. 329–344. XuY. DengG. ZhangT. QiuH. BaoY. “Novel denial-of-service attacks against cloud-based multi-robot systems,” Information Sciences 2021 576 329 344 Search in Google Scholar

J. Tian, B. Wang, R. Guo, Z. Wang, K. Cao et al., “Adversarial Attacks and Defenses for Deep Learning-based Unmanned Aerial Vehicles,” IEEE Internet of Things Journal, 2021, vol. 9, no. 22, pp. 22399–22409. TianJ. WangB. GuoR. WangZ. CaoK. “Adversarial Attacks and Defenses for Deep Learning-based Unmanned Aerial Vehicles,” IEEE Internet of Things Journal 2021 9 22 22399 22409 Search in Google Scholar

T. A. Youssef, G. A. Francia III and H. E. Sevil, “Data Collection and Generation for Radio Frequency Signal Security,” Advances in Security, Networks, and Internet of Things, 2021, pp. 745–758. YoussefT. A. FranciaG. A.III SevilH. E. “Data Collection and Generation for Radio Frequency Signal Security,” Advances in Security, Networks, and Internet of Things 2021 745 758 Search in Google Scholar

W. Shafik, S. M. Matinkhah, and M. Ghasemzadeh, “Internet of things-based energy management, challenges, and solutions in smart cities,” Journal of Communications Technology, Electronics and Computer Science, 2020, vol. 27, pp. 1–11. ShafikW. MatinkhahS. M. GhasemzadehM. “Internet of things-based energy management, challenges, and solutions in smart cities,” Journal of Communications Technology, Electronics and Computer Science 2020 27 1 11 Search in Google Scholar

A. Graham, H. Kutzli, T. C. Kulig and F. T. Cullen, “Invasion of the drones: a new frontier for victimization,” Deviant Behavior, 2021, vol. 42, no.3, pp. 386–403. GrahamA. KutzliH. KuligT. C. CullenF. T. “Invasion of the drones: a new frontier for victimization,” Deviant Behavior 2021 42 3 386 403 Search in Google Scholar

A. Shoufan, C. Yeun, C. Yeob and B. Taha, “eSIM-Based authentication protocol for UAV remote identification,” Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications, 2021, pp. 91–122. ShoufanA. YeunC. YeobC. TahaB. “eSIM-Based authentication protocol for UAV remote identification,” Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications 2021 91 122 Search in Google Scholar

I. W. Alluhybi and H. O. H. Alhazmi, “Towards a threat model for unmanned aerial vehicles,” Intelligent Computing and Innovation on Data Science. Springer, Singapore, 2021, pp. 319–328. AlluhybiI. W. AlhazmiH. O. H. “Towards a threat model for unmanned aerial vehicles,” Intelligent Computing and Innovation on Data Science Springer Singapore 2021 319 328 Search in Google Scholar

G. Christophe, M. Royer and N. Larrieu, “Machine learning and software defined network to secure communications in a swarm of drones,” Journal of Information Security and Applications, 2021, vol. 61 pp. 102940. ChristopheG. RoyerM. LarrieuN. “Machine learning and software defined network to secure communications in a swarm of drones,” Journal of Information Security and Applications 2021 61 102940 Search in Google Scholar

M. H. Ismael “Authentication and encryption drone communication by using HIGHT lightweight algorithm.” Turkish Journal of Computer and Mathematics Education, 2021, pp. 5891–5908. IsmaelM. H. “Authentication and encryption drone communication by using HIGHT lightweight algorithm.” Turkish Journal of Computer and Mathematics Education 2021 5891 5908 Search in Google Scholar

K. Bong-Han, “Implementing a fuzzing agent to dectect buffer overflow vulnerability,” Journal of the Korea Convergence Society, 2021, vol. 12, pp. 11–17. Bong-HanK. “Implementing a fuzzing agent to dectect buffer overflow vulnerability,” Journal of the Korea Convergence Society 2021 12 11 17 Search in Google Scholar

K. V. Raghavender and P. Premchand, “Accurate and reliable detection of DDoS attacks based on ARIMA-SWGARCH model,” International Journal of Information and Computer Security, 2021, pp. 118–135. RaghavenderK. V. PremchandP. “Accurate and reliable detection of DDoS attacks based on ARIMA-SWGARCH model,” International Journal of Information and Computer Security 2021 118 135 Search in Google Scholar

A. V. Priya and H. K. Singh, “Mitigation of ARP Cache Poisoning in software-defined networks,” Advances in Smart System Technologies, 2021, pp. 85–94. PriyaA. V. SinghH. K. “Mitigation of ARP Cache Poisoning in software-defined networks,” Advances in Smart System Technologies 2021 85 94 Search in Google Scholar

H. P. D. Nguyen and D. D. Nguyen, “Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication,” Development and Future of Internet of Drones (IoD): Insights, Trends and Road Ahead, 2021, pp. 185–210. NguyenH. P. D. NguyenD. D. “Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication,” Development and Future of Internet of Drones (IoD): Insights, Trends and Road Ahead 2021 185 210 Search in Google Scholar

B. Kordy, L. Piètre-Cambacédès and P. Schweitzer, “DAG-based attack and defense modeling: don’t miss the forest for the attack trees,” Computer Science Review, 2014, pp. 1–38. KordyB. Piètre-CambacédèsL. SchweitzerP. “DAG-based attack and defense modeling: don’t miss the forest for the attack trees,” Computer Science Review 2014 1 38 Search in Google Scholar

A. Singhal and H. Banati, “Fuzzy logic approach for threat prioritization in agile security framework using the DREAD model, Defence Technology, 2021. SinghalA. BanatiH. “Fuzzy logic approach for threat prioritization in agile security framework using the DREAD model Defence Technology 2021 Search in Google Scholar

M. S. Lund, B. Solhaug and K. Stølen, “Model-driven risk analysis: the CORAS approach,” Springer Science & Business Media, 2010. LundM. S. SolhaugB. StølenK. “Model-driven risk analysis: the CORAS approach,” Springer Science & Business Media 2010 Search in Google Scholar

P. Johnson, R. Lagerström and M Ekstedt, “Can the common vulnerability scoring system be trusted? A Bayesian analysis,” IEEE Transaction on Dependable Secure Computer, vol. 15, no. 6, 2016, pp. 1002–1015. JohnsonP. LagerströmR. EkstedtM “Can the common vulnerability scoring system be trusted? A Bayesian analysis,” IEEE Transaction on Dependable Secure Computer 15 6 2016 1002 1015 Search in Google Scholar

R. Von Solms and J. Van Niekerk, “From information security to cyber security,” Computers & Security, 2013, vol. 38, pp. 97–102. Von SolmsR. Van NiekerkJ. “From information security to cyber security,” Computers & Security 2013 38 97 102 Search in Google Scholar

eISSN:
1178-5608
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
Volume Open
Fachgebiete der Zeitschrift:
Technik, Einführungen und Gesamtdarstellungen, andere