Security analysis of drones systems: Attacks, limitations, and recommendations

JP Yaacoub, H Noura, O Salman, A Chehab - Internet of Things, 2020 - Elsevier
Recently, the world witnessed a significant increase in the number of used drones, with a
global and continuous rise in the demand for their multi-purpose applications. The pervasive …

IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques

S Balogh, O Gallo, R Ploszek, P Špaček, P Zajac - Electronics, 2021 - mdpi.com
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …

Securing IoT Systems in a Post-Quantum Environment: Vulnerabilities, Attacks, and Possible Solutions

A Alomari, SAP Kumar - Internet of Things, 2024 - Elsevier
Abstract The Internet of Things (IoT) refers to the distributed systems environment
connecting billions of devices to the Internet, and quantum computing is an emerging …

Performance metric analysis for a jamming detection mechanism under collaborative and cooperative schemes in industrial wireless sensor networks

A Cortés-Leal, C Del-Valle-Soto, C Cardenas… - Sensors, 2021 - mdpi.com
The emergence of Industry 4.0 technologies, such as the Internet of Things (IoT) and
Wireless Sensor Networks (WSN), has prompted a reconsideration of methodologies for …

DEQSVC: Dimensionality Reduction and Encoding Technique for Quantum Support Vector Classifier Approach to Detect DDoS Attacks

A Alomari, SAP Kumar - IEEE Access, 2023 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks pose a significant threat to the security of
networking systems, as they can cause widespread disruption and even bring down entire …

Securing IoT Data: A Comprehensive Systematic Review of Encryption Paradigms

P Thakur, N Singh, S Khare - Emerging Trends in IoT and …, 2024 - taylorfrancis.com
Internet of Insecure Things (IoT) has opened up a plethora of limitless opportunities for
applications across various societal sectors, but it also comes with a number of difficulties …

18 Wi-Fi Jammer, a Threat

S Bansal - Network Optimization in Intelligent Internet of Things …, 2024 - books.google.com
A Wi-Fi jammer is a device that interferes with transmissions to prevent communication
between devices and routers [1]. It sends deauthentication packets to the router, resulting in …

[PDF][PDF] Internet of Things

A Alomari, SAP Kumar - researchgate.net
ABSTRACT The Internet of Things (IoT) refers to the distributed systems environment
connecting billions of devices to the Internet, and quantum computing is an emerging …

[PDF][PDF] El radio cognitivo en la guerra electrónica

RG Mier - Revista Telemática. Vol, 2020 - revistatelematica.cujae.edu.cu
La guerra electrónica (EW) incluye todas las acciones que usan armas de energía
electromagnética, estas para controlar el espectro electromagnético para efectuar …

COGNITIVE RADIO IN THE ELECTRONIC WARFARE

RG Mier - Telemática, 2020 - revistatelematica.cujae.edu.cu
Electronic warfare (EW) includes all actions that use electromagnetic or directed energy
weapons to control the electromagnetic spectrum or to attack a threat. Conducting EW in …