ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.06077
  4. Cited By
Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using
  RSA Cryptography Algorithm and Interlock Protocol

Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol

16 January 2020
Reza Fotohi
Somayyeh Firoozi Bari
Mehdi Yusefi
    AAML
ArXivPDFHTML

Papers citing "Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol"

7 / 7 papers shown
Title
File fragment recognition based on content and statistical features
File fragment recognition based on content and statistical features
Marzieh Masoumi
A. Keshavarz
Reza Fotohi
19
6
0
25 Feb 2021
Defense against flooding attacks using probabilistic thresholds in the
  internet of things ecosystem
Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem
Seyed Meysam Zarei
Reza Fotohi
22
11
0
19 Feb 2021
Secure communication between UAVs using a method based on smart agents
  in unmanned aerial vehicles
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles
Maryam Faraji-Biregani
Reza Fotohi
8
60
0
03 Nov 2020
An agent-based self-protective method to secure communication between
  UAVs in unmanned aerial vehicle networks
An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks
Reza Fotohi
E. Nazemi
Fereidoon Shams Aliee
AAML
14
91
0
03 Jun 2020
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL
  Protocol-Based Node Rating and Ranking Mechanism
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism
Mina Zaminkar
Reza Fotohi
9
80
0
17 May 2020
An Artificial Immune Based Approach for Detection and Isolation
  Misbehavior Attacks in Wireless Networks
An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks
Shahram Behzad
Reza Fotohi
Jaber Hoseini Balov
Mohammad Javad Rabipour
AAML
16
28
0
24 Feb 2020
Multi-level trust-based intelligence schema for securing of internet of
  things (IoT) against security threats using cryptographic authentication
Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication
Kobra Mabodi
Mehdi Yusefi
Shahram Zandiyan
Leili Irankhah
Reza Fotohi
17
83
0
15 Jan 2020
1