Reza Fotohi

Orcid: 0000-0002-1848-0220

According to our database1, Reza Fotohi authored at least 26 papers between 2017 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
An Approach to Environmental Monitoring in Sparse Linear Wireless Sensor Networks for Energy Conservation Using Dual Sinks.
Wirel. Pers. Commun., 2022

A Request Redirection Algorithm in Content Delivery Network: Using PROMETHEE Approach.
Wirel. Pers. Commun., 2022

A reliable and secure method for network-layer attack discovery and elimination in mobile ad-hoc networks based on a probabilistic threshold.
Secur. Priv., 2022

A Self-Adaptive Intrusion Detection System for Securing UAV-to-UAV Communications Based on the Human Immune System in UAV Networks.
J. Grid Comput., 2022

2021
A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema.
Wirel. Pers. Commun., 2021

Online rating system development using blockchain-based distributed ledger technology.
Wirel. Networks, 2021

A firefly algorithm for power management in wireless sensor networks (WSNs).
J. Supercomput., 2021

Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles.
J. Supercomput., 2021

Performance-aware placement and chaining scheme for virtualized network functions: a particle swarm optimization approach.
J. Supercomput., 2021

Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem.
Secur. Priv., 2021

File fragment recognition based on content and statistical features.
Multim. Tools Appl., 2021

A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem.
Int. J. Commun. Syst., 2021

Congestion control in high-speed networks using the probabilistic estimation approach.
Int. J. Commun. Syst., 2021

Big Data-Aware Intrusion Detection System in Communication Networks: a Deep Learning Approach.
J. Grid Comput., 2021

Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT.
Comput. Networks, 2021

2020
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism.
Wirel. Pers. Commun., 2020

An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks.
Veh. Commun., 2020

NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things.
J. Supercomput., 2020

Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication.
J. Supercomput., 2020

A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms.
J. Supercomput., 2020

Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system.
Reliab. Eng. Syst. Saf., 2020

Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol.
Int. J. Commun. Syst., 2020

An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System.
CoRR, 2020

A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network.
CoRR, 2020

2018
An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks.
J. Comput., 2018

2017
DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system.
J. Supercomput., 2017


  Loading...