Drone transportation system: Systematic review of security dynamics for smart mobility

SO Ajakwe, DS Kim, JM Lee - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The intelligence and integrity of a real-time cyber–physical system depend on how
trustworthy the data's legitimacy, appropriation, and authorization are during end-to-end …

Secure and privacy-preserving intrusion detection and prevention in the internet of unmanned aerial vehicles

E Ntizikira, W Lei, F Alblehai, K Saleem, MA Lodhi - Sensors, 2023 - mdpi.com
In smart cities, unmanned aerial vehicles (UAVS) play a vital role in surveillance, monitoring,
and data collection. However, the widespread integration of UAVs brings forth a pressing …

Real-time fusion multi-tier DNN-based collaborative IDPS with complementary features for secure UAV-enabled 6G networks

HJ Hadi, Y Cao, S Li, L Xu, Y Hu, M Li - Expert Systems with Applications, 2024 - Elsevier
UAV-enabled Integrated Sensing and Communication (ISAC) in sixth-generation (6G)
wireless networks has sparked significant research interest. UAVs are positioned as aerial …

Radicalization of Airspace Security: Prospects and Botheration of Drone Defense System Technology

S Ajakwe, DS Kim, JM Lee - The Journal of Intelligence, Conflict …, 2023 - journals.lib.sfu.ca
The development of a comprehensive and decisive drone defense integrated control system
that can provide maximum security is crucial for maintaining territorial integrity and …

[PDF][PDF] DATA-FedAVG: Delay-Aware Truncated Accuracy-Based Federated Averaging for Intrusion Detection in UAV Network

VU Ihekoronye, CI Nwakanma, DS Kim… - J Kor Inst Commun …, 2023 - researchgate.net
In federated learning, the synchronous approach employed by the aggregating algorithm in
the federal server, such as federated averaging (FedAVG), introduces high network …

Explainable Adversarial Mitigation Framework for Zero-Trust Cyber Warfare

EC Nkoro, CI Nwakanma, JM Lee… - 2023 14th International …, 2023 - ieeexplore.ieee.org
The Zero-trust security architecture is a paradigm shift toward resilient cyber warfare.
Although Intrusion Detection Systems (IDS) have been widely adopted within military …

Multidimensional Perspective to Data Preprocessing for Model Cognition Verity: Data Preparation and Cleansing-Approaches for Model Optimal Feedback Validation

SO Ajakwe, O Deji-Oloruntoba… - Recent Trends and …, 2024 - igi-global.com
Reliable data analysis depends on effective data preparation, especially since AI-driven
business intelligence depends on unbiased and error-free data for decision-making …

Machine Learning in UAV-Assisted Smart Farming

SO Ajakwe, NF Esomonu… - … of Machine Learning …, 2024 - igi-global.com
Over the years, economic loss in the agricultural sector has been attributed to the late
detection of varying plant diseases due to incongruent detection technologies. With the …

Application of an Improved Convolutional Neural Network-Based Method in Network Intrusion Detection

H Chen, G You, Y Shiue - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
This study investigates the use of convolutional neural network (CNN) technology to solve
the problem of network intrusion detection, specifically studying the impact of convolutional …

CatBoost-based Intrusion Detection Method for the Physical Layer of Smart Agriculture

Z Wei, F Ning, K Jiang, Y Wang, Z Bi… - ITM Web of …, 2024 - itm-conferences.org
Agriculture holds a pivotal role in the progress of human society. The challenges stemming
from a burgeoning population, land degradation, water scarcity, and urbanization have …