This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
T. Vyas, and H. R. Varia, “Impact of Construction Work Zone on Urban Traffic Environment,” International Journal on Smart Sensing and Intelligent Systems, 2023, vol. 16, no. 1.VyasT.VariaH. R.“Impact of Construction Work Zone on Urban Traffic Environment,”International Journal on Smart Sensing and Intelligent Systems2023161Search in Google Scholar
S. Lee, H. Yeo, and M. Kang, “Biometric authentication sensor with an encryption module for prevention of h/w hacking in digital custody services,” International Journal on Smart Sensing and Intelligent Systems, 2023, vol. 16, no. 1.LeeS.YeoH.KangM.“Biometric authentication sensor with an encryption module for prevention of h/w hacking in digital custody services,”International Journal on Smart Sensing and Intelligent Systems2023161Search in Google Scholar
W. Shafik, “Cyber Security Perspectives in Public Spaces: Drone Case Study,” In Handbook of Research on Cybersecurity Risk in Contemporary Business Systems, 2023, pp. 79–97. IGI Global.ShafikW.“Cyber Security Perspectives in Public Spaces: Drone Case Study,”In Handbook of Research on Cybersecurity Risk in Contemporary Business Systems20237997IGI GlobalSearch in Google Scholar
A. K. Arora, S. Mahajan, M. Verma, and D. Haridas, “Study of structural and morphological properties of RF-sputtered SnO thin films and their effect on gas-sensing phenomenon,” International Journal on Smart Sensing and Intelligent Systems, 2023, vol. 16, no. 1.AroraA. K.MahajanS.VermaM.HaridasD.“Study of structural and morphological properties of RF-sputtered SnO thin films and their effect on gas-sensing phenomenon,”International Journal on Smart Sensing and Intelligent Systems2023161Search in Google Scholar
W. Shafik, “A Comprehensive Cybersecurity Framework for Present and Future Global Information Technology Organizations,” In Effective Cybersecurity Operations for Enterprise-Wide Systems, 2023, pp. 56–79. IGI Global.ShafikW.“A Comprehensive Cybersecurity Framework for Present and Future Global Information Technology Organizations,”In Effective Cybersecurity Operations for Enterprise-Wide Systems20235679IGI GlobalSearch in Google Scholar
A. Yudhana, A. D. Cahyo, L. Y. Sabila, A. C. Subrata, and I. Mufandi, “Spatial distribution of soil nutrient content for sustainable rice agriculture using geographic information system and Naïve Bayes classifier,” International Journal on Smart Sensing and Intelligent Systems, 2023, vol. 16, no. 1.YudhanaA.CahyoA. D.SabilaL. Y.SubrataA. C.MufandiI.“Spatial distribution of soil nutrient content for sustainable rice agriculture using geographic information system and Naïve Bayes classifier,”International Journal on Smart Sensing and Intelligent Systems2023161Search in Google Scholar
S. N. Alaziz, B. Albayati, AAAH El-Bagoury, and W. Shafik, “Clustering of COVID-19 Multi-Time Series-Based K-Means and PCA With Forecasting,” International Journal of Data Warehousing and Mining (IJDWM), 2023, vol. 19, no. 3, pp. 1–25.AlazizS. N.AlbayatiB.El-BagouryAAAHShafikW.“Clustering of COVID-19 Multi-Time Series-Based K-Means and PCA With Forecasting,”International Journal of Data Warehousing and Mining (IJDWM)2023193125Search in Google Scholar
W. Shafik, “Making Cities Smarter: IoT and SDN Applications, Challenges, and Future Trends,” In Opportunities and Challenges of Industrial IoT in 5G and 6G Networks, 2023, pp. 73–94. IGI Global.ShafikW.“Making Cities Smarter: IoT and SDN Applications, Challenges, and Future Trends,”In Opportunities and Challenges of Industrial IoT in 5G and 6G Networks20237394IGI GlobalSearch in Google Scholar
R. Majeed, N. Abdullah and M. Mushtaq, “IoT-based cyber-security of drones using the naïve bayes algorithm,” International Journal of Advanced Computer Science and Applications, 2021, vol. 12, pp. 422–427.MajeedR.AbdullahN.MushtaqM.“IoT-based cyber-security of drones using the naïve bayes algorithm,”International Journal of Advanced Computer Science and Applications202112422427Search in Google Scholar
W. Shafik, S. M. Matinkhah, and M. N. Sanda, “Network resource management drives machine learning: a survey and future research direction,” Journal of Communications Technology, Electronics and Computer Science, 2020, pp. 1–15.ShafikW.MatinkhahS. M.SandaM. N.“Network resource management drives machine learning: a survey and future research direction,”Journal of Communications Technology, Electronics and Computer Science2020115Search in Google Scholar
Y. Jun, A. Craig, W. Shafik, and L. Sharif, “Artificial intelligence application in cybersecurity and cyberdefense,” Wireless Communications and Mobile Computing, 2021, pp. 1–10.JunY.CraigA.ShafikW.SharifL.“Artificial intelligence application in cybersecurity and cyberdefense,”Wireless Communications and Mobile Computing2021110Search in Google Scholar
E. Basan, A. Basan, A. Nekrasov, C. Fidge, J. Gamec et al., “A self-diagnosis method for detecting UAV cyberattacks based on analysis of parameter changes,” Sensors, 2021, vol. 21, no. 2.BasanE.BasanA.NekrasovA.FidgeC.GamecJ.“A self-diagnosis method for detecting UAV cyberattacks based on analysis of parameter changes,”Sensors2021212Search in Google Scholar
A. Abdelmaboud, “The internet of drones: requirements, taxonomy, recent advances, and challenges of research trends,” Sensors, 2021, vol. 21, no. 17.AbdelmaboudA.“The internet of drones: requirements, taxonomy, recent advances, and challenges of research trends,”Sensors20212117Search in Google Scholar
B. Ly and R. Ly, “Cybersecurity in unmanned aerial vehicles (UAVs),” Journal of Cyber Security Technology, 2021, vol. 5, no. 2, pp. 120–137.LyB.LyR.“Cybersecurity in unmanned aerial vehicles (UAVs),”Journal of Cyber Security Technology202152120137Search in Google Scholar
Z. El-Rewini, K. Sadatsharan, N. Sugunaraj, D. F. Selvaraj, S. J. Plathottam et al., “Cybersecurity attacks in vehicular sensors,” IEEE Sensors Journal, vol. 20, no. 22, pp. 13752–13767, 2020.El-RewiniZ.SadatsharanK.SugunarajN.SelvarajD. F.PlathottamS. J.“Cybersecurity attacks in vehicular sensors,”IEEE Sensors Journal202213752137672020Search in Google Scholar
M. Ghasemi, M. Varshosaz, S. Pirasteh and G. Shamsipour, “Optimizing sector ring histogram of oriented gradients for human injured detection from drone images,” Geomatics, Natural Hazards and Risk, 2021, vol. 12, no. 1, pp. 581–604.GhasemiM.VarshosazM.PirastehS.ShamsipourG.“Optimizing sector ring histogram of oriented gradients for human injured detection from drone images,”Geomatics, Natural Hazards and Risk2021121581604Search in Google Scholar
K. Kim, J. S. Kim, S. Jeong, J. H. Park and H. K. Kim, “Cybersecurity for autonomous vehicles: Review of attacks and defense,” Computers & Security, 2021, vol. 103, pp. 102150.KimK.KimJ. S.JeongS.ParkJ. H.KimH. K.“Cybersecurity for autonomous vehicles: Review of attacks and defense,”Computers & Security2021103102150Search in Google Scholar
L. Abualigah, A. Diabat, P. Sumari and A. H. Gandomi, “Applications, deployments, and integration of internet of drones (IoD): a review,” IEEE Sensors Journal, 2021, vol. 21, no. 22, pp. 25532–25546.AbualigahL.DiabatA.SumariP.GandomiA. H.“Applications, deployments, and integration of internet of drones (IoD): a review,”IEEE Sensors Journal202121222553225546Search in Google Scholar
I. U. Khan, A. Abdollahi, R. Alturki, M. D. Alshehri, M. A. Ikram et al., “Intelligent detection system enabled attack probability using markov chain in aerial networks,” Wireless Communications and Mobile Computing, 2021, pp. 1–9.KhanI. U.AbdollahiA.AlturkiR.AlshehriM. D.IkramM. A.“Intelligent detection system enabled attack probability using markov chain in aerial networks,”Wireless Communications and Mobile Computing202119Search in Google Scholar
M. R. Khosravi and S. Samadi, “Mobile multimedia computing in cyber-physical surveillance services through UAV-borne Video-SAR: A taxonomy of intelligent data processing for IoMT-enabled radar sensor networks,” Tsinghua Science and Technology, 2021, vol. 27, no. 2, pp. 288–302.KhosraviM. R.SamadiS.“Mobile multimedia computing in cyber-physical surveillance services through UAV-borne Video-SAR: A taxonomy of intelligent data processing for IoMT-enabled radar sensor networks,”Tsinghua Science and Technology2021272288302Search in Google Scholar
G. Lykou, D. Moustakas and D. Gritzalis, “Defending airports from UAS: a survey on cyberattacks and counter-drone sensing technologies,” Sensors, 2020, vol. 20, no. 12.LykouG.MoustakasD.GritzalisD.“Defending airports from UAS: a survey on cyberattacks and counter-drone sensing technologies,”Sensors20202012Search in Google Scholar
K. Fenrich, “Securing your control system: the “CIA triad” is a widely used benchmark for evaluating information system security effectiveness” Power Engineering, 2008, vol. 112, pp. 44–49.FenrichK.“Securing your control system: the “CIA triad” is a widely used benchmark for evaluating information system security effectiveness” Power Engineering20081124449Search in Google Scholar
S. Hussain, A. Kamal and S. Ahmad, “Threat modeling methodologies: a survey,” Science International, 2014, vol. 26. No. 4, pp. 1607–1609.HussainS.KamalA.AhmadS.“Threat modeling methodologies: a survey,”Science International201426416071609Search in Google Scholar
N. Shevchenko, T. A. Chick and P. O’riordan, “Threat modeling: a summary of available methods,” 2018.ShevchenkoN.ChickT. A.O’riordanP.“Threat modeling: a summary of available methods,”2018Search in Google Scholar
M. Mahuza, M. Y. Idris, A. W. Wahab, T. Nandy, I. B. Ahmedy et al., “An edge assisted secure lightweight authentication technique for safe communication on the Internet of drones network,” IEEE Access, 2021, vol. 9, pp. 31420–31440.MahuzaM.IdrisM. Y.WahabA. W.NandyT.AhmedyI. B.“An edge assisted secure lightweight authentication technique for safe communication on the Internet of drones network,”IEEE Access202193142031440Search in Google Scholar
U. J. Butt, W. Richardson, M. Abbod, H. M. Agbo and C. Eghan, “The deployment of autonomous drones during the covid-19 pandemic,” Cybersecurity, Privacy and Freedom Protection in the Connected World, 2021, pp. 183–220.ButtU. J.RichardsonW.AbbodM.AgboH. M.EghanC.“The deployment of autonomous drones during the covid-19 pandemic,”Cybersecurity, Privacy and Freedom Protection in the Connected World2021183220Search in Google Scholar
A. Almulhem, “Threat modeling of a multi-UAV system,” Transportation Research Part A: Policy and Practice, 2020, vol. 142, pp. 290–295.AlmulhemA.“Threat modeling of a multi-UAV system,”Transportation Research Part A: Policy and Practice2020142290295Search in Google Scholar
D. Lee, W. Park and W. Nam, “Autonomous landing of micro unmanned aerial vehicles with landing-assistive platform and robust spherical object detection,” Applied Sciences, 2021, vol. 11, no. 18, pp. 8555.LeeD.ParkW.NamW.“Autonomous landing of micro unmanned aerial vehicles with landing-assistive platform and robust spherical object detection,”Applied Sciences202111188555Search in Google Scholar
T. Saba, T. Sadad, A. Rehman, Z. Mehmood and Q. Javaid, “Intrusion detection system through advance machine learning for the internet of things networks,” IT Professional, 2021, vol. 23, no. 2, pp. 58–64.SabaT.SadadT.RehmanA.MehmoodZ.JavaidQ.“Intrusion detection system through advance machine learning for the internet of things networks,”IT Professional20212325864Search in Google Scholar
J. Wang, Y. Liu, S. Niu, H. Song, “Bio-inspired routing for heterogeneous unmanned aircraft systems (UAS) swarm networking,” Computers & Electrical Engineering, 2021, vol. 95, pp. 107401.WangJ.LiuY.NiuS.SongH.“Bio-inspired routing for heterogeneous unmanned aircraft systems (UAS) swarm networking,”Computers & Electrical Engineering202195107401Search in Google Scholar
A. Yazdinejad, R. M. Parizi, A. Dehghantanha and H. Karimipour, “Federated learning for drone authentication,” Ad Hoc Networks, 2021, vol. 120, pp. 102574.YazdinejadA.PariziR. M.DehghantanhaA.KarimipourH.“Federated learning for drone authentication,”Ad Hoc Networks2021120102574Search in Google Scholar
G. S. Ilgi and Y. Kirsal Ever, “Chapter Eleven - Critical analysis of security and privacy challenges for the Internet of drones: a survey,” Drones in Smart-Cities, 2020, pp. 207–214.IlgiG. S.Kirsal EverY.“Chapter Eleven - Critical analysis of security and privacy challenges for the Internet of drones: a survey,”Drones in Smart-Cities2020207214Search in Google Scholar
A. Javaid, “Cyber security threat analysis and attack simulation for unmanned aerial vehicle network,” Doctoral dissertation, University of Toledo, 2015.JavaidA.“Cyber security threat analysis and attack simulation for unmanned aerial vehicle network,”Doctoral dissertationUniversity of Toledo2015Search in Google Scholar
C. Rani, H. Modares, R. Sriram, D. Mikulski and F. L. Lewis, “Security of unmanned aerial vehicle systems against cyber-physical attacks,” Journal of Defense Modeling and Simulation, 2016, vol. 13, no. 3, pp. 331–42.RaniC.ModaresH.SriramR.MikulskiD.LewisF. L.“Security of unmanned aerial vehicle systems against cyber-physical attacks,”Journal of Defense Modeling and Simulation201613333142Search in Google Scholar
A. Shafique, A. Mehmood and M Elhadef, “Survey of security protocols and vulnerabilities in unmanned aerial vehicles,” IEEE Access, 2021, vol. 9, pp. 46927–46948.ShafiqueA.MehmoodA.ElhadefM“Survey of security protocols and vulnerabilities in unmanned aerial vehicles,”IEEE Access202194692746948Search in Google Scholar
S. P. Arteaga, L. A. M. Hernández and G. S. Pérez, “Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo,” IEEE Access, 2019, vol. 7, pp. 51782–51789.ArteagaS. P.HernándezL. A. M.PérezG. S.“Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo,”IEEE Access201975178251789Search in Google Scholar
K. Afzal, R. Tariq, F. Aadil, Z. Iqbal, N. Ali et al., “An Optimized and Efficient Routing Protocol Application for IoV,” Mathematical Problems in Engineering, 2021.AfzalK.TariqR.AadilF.IqbalZ.AliN.“An Optimized and Efficient Routing Protocol Application for IoV,”Mathematical Problems in Engineering2021Search in Google Scholar
Y. Xu, G. Deng, T. Zhang, H. Qiu and Y. Bao, “Novel denial-of-service attacks against cloud-based multi-robot systems,” Information Sciences, 2021, vol. 576, pp. 329–344.XuY.DengG.ZhangT.QiuH.BaoY.“Novel denial-of-service attacks against cloud-based multi-robot systems,”Information Sciences2021576329344Search in Google Scholar
J. Tian, B. Wang, R. Guo, Z. Wang, K. Cao et al., “Adversarial Attacks and Defenses for Deep Learning-based Unmanned Aerial Vehicles,” IEEE Internet of Things Journal, 2021, vol. 9, no. 22, pp. 22399–22409.TianJ.WangB.GuoR.WangZ.CaoK.“Adversarial Attacks and Defenses for Deep Learning-based Unmanned Aerial Vehicles,”IEEE Internet of Things Journal20219222239922409Search in Google Scholar
T. A. Youssef, G. A. Francia III and H. E. Sevil, “Data Collection and Generation for Radio Frequency Signal Security,” Advances in Security, Networks, and Internet of Things, 2021, pp. 745–758.YoussefT. A.FranciaG. A.IIISevilH. E.“Data Collection and Generation for Radio Frequency Signal Security,”Advances in Security, Networks, and Internet of Things2021745758Search in Google Scholar
W. Shafik, S. M. Matinkhah, and M. Ghasemzadeh, “Internet of things-based energy management, challenges, and solutions in smart cities,” Journal of Communications Technology, Electronics and Computer Science, 2020, vol. 27, pp. 1–11.ShafikW.MatinkhahS. M.GhasemzadehM.“Internet of things-based energy management, challenges, and solutions in smart cities,”Journal of Communications Technology, Electronics and Computer Science202027111Search in Google Scholar
A. Graham, H. Kutzli, T. C. Kulig and F. T. Cullen, “Invasion of the drones: a new frontier for victimization,” Deviant Behavior, 2021, vol. 42, no.3, pp. 386–403.GrahamA.KutzliH.KuligT. C.CullenF. T.“Invasion of the drones: a new frontier for victimization,”Deviant Behavior2021423386403Search in Google Scholar
A. Shoufan, C. Yeun, C. Yeob and B. Taha, “eSIM-Based authentication protocol for UAV remote identification,” Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications, 2021, pp. 91–122.ShoufanA.YeunC.YeobC.TahaB.“eSIM-Based authentication protocol for UAV remote identification,”Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications202191122Search in Google Scholar
I. W. Alluhybi and H. O. H. Alhazmi, “Towards a threat model for unmanned aerial vehicles,” Intelligent Computing and Innovation on Data Science. Springer, Singapore, 2021, pp. 319–328.AlluhybiI. W.AlhazmiH. O. H.“Towards a threat model for unmanned aerial vehicles,”Intelligent Computing and Innovation on Data ScienceSpringerSingapore2021319328Search in Google Scholar
G. Christophe, M. Royer and N. Larrieu, “Machine learning and software defined network to secure communications in a swarm of drones,” Journal of Information Security and Applications, 2021, vol. 61 pp. 102940.ChristopheG.RoyerM.LarrieuN.“Machine learning and software defined network to secure communications in a swarm of drones,”Journal of Information Security and Applications202161102940Search in Google Scholar
M. H. Ismael “Authentication and encryption drone communication by using HIGHT lightweight algorithm.” Turkish Journal of Computer and Mathematics Education, 2021, pp. 5891–5908.IsmaelM. H.“Authentication and encryption drone communication by using HIGHT lightweight algorithm.”Turkish Journal of Computer and Mathematics Education202158915908Search in Google Scholar
K. Bong-Han, “Implementing a fuzzing agent to dectect buffer overflow vulnerability,” Journal of the Korea Convergence Society, 2021, vol. 12, pp. 11–17.Bong-HanK.“Implementing a fuzzing agent to dectect buffer overflow vulnerability,”Journal of the Korea Convergence Society2021121117Search in Google Scholar
K. V. Raghavender and P. Premchand, “Accurate and reliable detection of DDoS attacks based on ARIMA-SWGARCH model,” International Journal of Information and Computer Security, 2021, pp. 118–135.RaghavenderK. V.PremchandP.“Accurate and reliable detection of DDoS attacks based on ARIMA-SWGARCH model,”International Journal of Information and Computer Security2021118135Search in Google Scholar
A. V. Priya and H. K. Singh, “Mitigation of ARP Cache Poisoning in software-defined networks,” Advances in Smart System Technologies, 2021, pp. 85–94.PriyaA. V.SinghH. K.“Mitigation of ARP Cache Poisoning in software-defined networks,”Advances in Smart System Technologies20218594Search in Google Scholar
H. P. D. Nguyen and D. D. Nguyen, “Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication,” Development and Future of Internet of Drones (IoD): Insights, Trends and Road Ahead, 2021, pp. 185–210.NguyenH. P. D.NguyenD. D.“Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication,”Development and Future of Internet of Drones (IoD): Insights, Trends and Road Ahead2021185210Search in Google Scholar
B. Kordy, L. Piètre-Cambacédès and P. Schweitzer, “DAG-based attack and defense modeling: don’t miss the forest for the attack trees,” Computer Science Review, 2014, pp. 1–38.KordyB.Piètre-CambacédèsL.SchweitzerP.“DAG-based attack and defense modeling: don’t miss the forest for the attack trees,”Computer Science Review2014138Search in Google Scholar
A. Singhal and H. Banati, “Fuzzy logic approach for threat prioritization in agile security framework using the DREAD model, Defence Technology, 2021.SinghalA.BanatiH.“Fuzzy logic approach for threat prioritization in agile security framework using the DREAD modelDefence Technology2021Search in Google Scholar
M. S. Lund, B. Solhaug and K. Stølen, “Model-driven risk analysis: the CORAS approach,” Springer Science & Business Media, 2010.LundM. S.SolhaugB.StølenK.“Model-driven risk analysis: the CORAS approach,”Springer Science & Business Media2010Search in Google Scholar
P. Johnson, R. Lagerström and M Ekstedt, “Can the common vulnerability scoring system be trusted? A Bayesian analysis,” IEEE Transaction on Dependable Secure Computer, vol. 15, no. 6, 2016, pp. 1002–1015.JohnsonP.LagerströmR.EkstedtM“Can the common vulnerability scoring system be trusted? A Bayesian analysis,”IEEE Transaction on Dependable Secure Computer156201610021015Search in Google Scholar
R. Von Solms and J. Van Niekerk, “From information security to cyber security,” Computers & Security, 2013, vol. 38, pp. 97–102.Von SolmsR.Van NiekerkJ.“From information security to cyber security,”Computers & Security20133897102Search in Google Scholar