2016
DOI: 10.1007/s00521-016-2584-1
|View full text |Cite
|
Sign up to set email alerts
|

Three-tier neural model for service provisioning over collaborative flying ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…This will cause a significant conflict for UAVs in critical missions. The security solutions such as IDS, cryptographic algorithms, and security policies will help to secure this network 177,178 . The various cyber‐attacks in the UAV‐Fog system and its countermeasures are highlighted in Table 6.…”
Section: Collaboration Of Uavs For a Hetnet With Fog Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…This will cause a significant conflict for UAVs in critical missions. The security solutions such as IDS, cryptographic algorithms, and security policies will help to secure this network 177,178 . The various cyber‐attacks in the UAV‐Fog system and its countermeasures are highlighted in Table 6.…”
Section: Collaboration Of Uavs For a Hetnet With Fog Computingmentioning
confidence: 99%
“…The security solutions such as IDS, cryptographic algorithms, and security policies will help to secure this network. 177,178 The various cyber-attacks in the UAV-Fog system and its countermeasures are highlighted in Table 6. To ensure security in the UAV-Fog model, there are some important countermeasures are as:…”
Section: Cyber-attacksmentioning
confidence: 99%
“…In such type of threats and vulnerabilities, additional security and countermeasures are needed to handle vulnerability exploitations. The security solutions like Intrusion Detection Systems (IDS) [16], cryptographic mechanisms, and security policies can help to protect IoD [29].…”
Section: Network Platforms Servicesmentioning
confidence: 99%
“…However, the survey of research institutes indicated that the utilization rate of licensed spectrum is low 1,2 . Cognitive radio (CR) technology can make secondary users (SUs) without authorization to actively search for the idle spectrum resources in the radio environment 3,4 . Rapidly and effectively distributing the idle spectrum resources after spectrum sensing without interfering with the primary users (PUs) is a problem that must be solved by spectrum sharing technology.…”
Section: Introductionmentioning
confidence: 99%