no code implementations • 3 Nov 2020 • Maryam Faraji-Biregani, Reza Fotohi
Therefore, the mobile agent of each UAV uses reliable neighbors through a three-step negotiation process so that they do not listen to the traffic generated by the malicious UAVs.
no code implementations • 3 Jun 2020 • Reza Fotohi, Eslam Nazemi, Fereidoon Shams Aliee
In this method, a multi-agent system using an Artificial Immune System (AIS) is employed to detect the attacking UAV and choose the safest route.
Cryptography and Security
no code implementations • 1 Mar 2020 • Reza Fotohi
Accordingly, an Intrusion Detection System (IDS) has been proposed in the proposed design to protect against the security problems using the human immune system (HIS).