Reza Fotohi
Orcid: 0000-0002-1848-0220
According to our database1,
Reza Fotohi
authored at least 30 papers
between 2017 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Lightweight and Secure Deep Learning Model for Privacy-Preserving Federated Learning in Intelligent Enterprises.
IEEE Internet Things J., October, 2024
An Intrusion Detection System Using the Artificial Neural Network-based Approach and Firefly Algorithm.
Wirel. Pers. Commun., August, 2024
Hardening of the Internet of Things by using an intrusion detection system based on deep learning.
Clust. Comput., June, 2024
Decentralized and robust privacy-preserving model using blockchain-enabled Federated Deep Learning in intelligent enterprises.
Appl. Soft Comput., 2024
2022
An Approach to Environmental Monitoring in Sparse Linear Wireless Sensor Networks for Energy Conservation Using Dual Sinks.
Wirel. Pers. Commun., 2022
A Request Redirection Algorithm in Content Delivery Network: Using PROMETHEE Approach.
Wirel. Pers. Commun., 2022
A reliable and secure method for network-layer attack discovery and elimination in mobile ad-hoc networks based on a probabilistic threshold.
Secur. Priv., 2022
A Self-Adaptive Intrusion Detection System for Securing UAV-to-UAV Communications Based on the Human Immune System in UAV Networks.
J. Grid Comput., 2022
2021
A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema.
Wirel. Pers. Commun., 2021
Online rating system development using blockchain-based distributed ledger technology.
Wirel. Networks, 2021
J. Supercomput., 2021
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles.
J. Supercomput., 2021
Performance-aware placement and chaining scheme for virtualized network functions: a particle swarm optimization approach.
J. Supercomput., 2021
Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem.
Secur. Priv., 2021
Multim. Tools Appl., 2021
A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem.
Int. J. Commun. Syst., 2021
Congestion control in high-speed networks using the probabilistic estimation approach.
Int. J. Commun. Syst., 2021
Big Data-Aware Intrusion Detection System in Communication Networks: a Deep Learning Approach.
J. Grid Comput., 2021
Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT.
Comput. Networks, 2021
2020
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism.
Wirel. Pers. Commun., 2020
An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks.
Veh. Commun., 2020
NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things.
J. Supercomput., 2020
Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication.
J. Supercomput., 2020
A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms.
J. Supercomput., 2020
Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system.
Reliab. Eng. Syst. Saf., 2020
Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol.
Int. J. Commun. Syst., 2020
An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System.
CoRR, 2020
A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network.
CoRR, 2020
2018
An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks.
J. Comput., 2018
2017
DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system.
J. Supercomput., 2017