
About
3
Publications
364
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
24
Citations
Citations since 2017
Introduction
Machine Learning | Network Security | Wireless Networks | Software Development
Skills and Expertise
Publications
Publications (3)
Today, the use of Unmanned aerial vehicles (UAVs) technology has made significant progress due to its widespread use. UAVs are widely used in agriculture, commercial, military, civilian, and environmental applications. Therefore, for better efficiency, the UAV must be able to communicate effectively through the communication of the UAV system with...
A wormhole attack is a type of attack on the network layer that reflects routing protocols. The classification is performed with several methods of machine learning consisting of K-nearest neighbor (KNN), support vector machine (SVM), decision tree (DT), linear discrimination analysis (LDA), naive Bayes (NB), and convolutional neural network (CNN)....
Unmanned aerial vehicles (UAVs) have recently attracted many researchers' attention because of their extensive applications. Security issues, in particular, are a serious concern in such networks since the top-secret information exchanged between UAVs is susceptible to various attacks such as Sybil, blackhole, and Flooding attacks. To identify such...