ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.05354
  4. Cited By
Multi-level trust-based intelligence schema for securing of internet of
  things (IoT) against security threats using cryptographic authentication

Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication

15 January 2020
Kobra Mabodi
Mehdi Yusefi
Shahram Zandiyan
Leili Irankhah
Reza Fotohi
ArXivPDFHTML

Papers citing "Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication"

7 / 7 papers shown
Title
File fragment recognition based on content and statistical features
File fragment recognition based on content and statistical features
Marzieh Masoumi
A. Keshavarz
Reza Fotohi
19
6
0
25 Feb 2021
Secure communication between UAVs using a method based on smart agents
  in unmanned aerial vehicles
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles
Maryam Faraji-Biregani
Reza Fotohi
8
60
0
03 Nov 2020
An agent-based self-protective method to secure communication between
  UAVs in unmanned aerial vehicle networks
An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks
Reza Fotohi
E. Nazemi
Fereidoon Shams Aliee
AAML
14
91
0
03 Jun 2020
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL
  Protocol-Based Node Rating and Ranking Mechanism
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism
Mina Zaminkar
Reza Fotohi
11
80
0
17 May 2020
Securing of Unmanned Aerial Systems (UAS) against security threats using
  human immune system
Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system
Reza Fotohi
AAML
13
64
0
01 Mar 2020
An Artificial Immune Based Approach for Detection and Isolation
  Misbehavior Attacks in Wireless Networks
An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks
Shahram Behzad
Reza Fotohi
Jaber Hoseini Balov
Mohammad Javad Rabipour
AAML
16
28
0
24 Feb 2020
Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using
  RSA Cryptography Algorithm and Interlock Protocol
Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol
Reza Fotohi
Somayyeh Firoozi Bari
Mehdi Yusefi
AAML
14
84
0
16 Jan 2020
1