A recent progression of unmanned aerial vehicles (UAV) augmentation its employments for different applications. It’s also vulnerable to being, stolen, lost, stray, or destroyed at status of a security infringements for the UAV network. The proposed strategy is defending against of different attacks through using artificial intelligence by implements five steps: RGSK, GCSCS, SEDC, HSSC, and FVNF. UAV authentication is happened in the first step through the Curve448. We performance deep reinforcement learning to run with GCS for packet assignment as it implemented for switch current state identification before updating. In our work we ability to alleviate for attack of flow table overloading by assigned of packets as an under loaded or idle s...
The modern warfare scenario has immense challenges that can risk personnel's lives, highlighting the...
The aviation community is employing various air traffic control and mobile communication technologie...
Drones are increasingly adopted to serve a smart city through their ability to render quick and adap...
Softwarized Unmanned Aerial Vehicles (UAVs) use network programmability concept of Software-Defined ...
Unmanned aerial vehicles (UAVs) (also known as drones) are aircraft that do not require the presence...
The recent development and adoption of unmanned aerial vehicles (UAVs) is due to its wide variety of...
Drone communication is currently a hot topic of research, and the use of drones can easily set up co...
Cyber–physical systems (CPS) for device-to-device (D2D) communications are gaining prominence in tod...
International audienceWith the trend of developing more and more applications for Unmanned Aerial Ve...
Abstract. In next generation wireless networks such as 5G and 6G, security is a key concern, for whi...
Unmanned Aerial Vehicles (UAVs) are widely deployed in military surveillance operations, especially ...
When users exchange data with Unmanned Aerial Vehicles - (UAVs) over Air-to-Ground - (A2G) wireless ...
The explosive growth in the worldwide use of Unmanned Aerial Vehicles (UAVs) has raised a critical c...
Drones become more and more frequent in our everyday life as a leasure and also in the industry. Ana...
Unmanned aerial vehicles (UAVs) are emerging as enablers for supporting many applications and servic...
The modern warfare scenario has immense challenges that can risk personnel's lives, highlighting the...
The aviation community is employing various air traffic control and mobile communication technologie...
Drones are increasingly adopted to serve a smart city through their ability to render quick and adap...
Softwarized Unmanned Aerial Vehicles (UAVs) use network programmability concept of Software-Defined ...
Unmanned aerial vehicles (UAVs) (also known as drones) are aircraft that do not require the presence...
The recent development and adoption of unmanned aerial vehicles (UAVs) is due to its wide variety of...
Drone communication is currently a hot topic of research, and the use of drones can easily set up co...
Cyber–physical systems (CPS) for device-to-device (D2D) communications are gaining prominence in tod...
International audienceWith the trend of developing more and more applications for Unmanned Aerial Ve...
Abstract. In next generation wireless networks such as 5G and 6G, security is a key concern, for whi...
Unmanned Aerial Vehicles (UAVs) are widely deployed in military surveillance operations, especially ...
When users exchange data with Unmanned Aerial Vehicles - (UAVs) over Air-to-Ground - (A2G) wireless ...
The explosive growth in the worldwide use of Unmanned Aerial Vehicles (UAVs) has raised a critical c...
Drones become more and more frequent in our everyday life as a leasure and also in the industry. Ana...
Unmanned aerial vehicles (UAVs) are emerging as enablers for supporting many applications and servic...
The modern warfare scenario has immense challenges that can risk personnel's lives, highlighting the...
The aviation community is employing various air traffic control and mobile communication technologie...
Drones are increasingly adopted to serve a smart city through their ability to render quick and adap...