Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication K Mabodi, M Yusefi, S Zandiyan, L Irankhah, R Fotohi Springer, The Journal of Supercomputing 76 (9), 1-26, 2020 | 108 | 2020 |
An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks R Fotohi, E Nazemi, FS Aliee Elsevier, Vehicular Communications 26, 100267, 2020 | 95 | 2020 |
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism R Fotohi, M Zaminkar Springer, Wireless Personal Communications 114 (2), 1287–1312, 2020 | 93* | 2020 |
Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol R Fotohi, S Firoozi Bari, M Yusefi Wiley, International Journal of Communication Systems 33 (4), e4234, 2020 | 92 | 2020 |
DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system S Jamali, R Fotohi Springer, the Journal of Supercomputing 73 (12), 5173-5196, 2017 | 91 | 2017 |
Defending against wormhole attack in MANET using an artificial immune system S Jamali, R Fotohi New Review of Information Networking 21 (2), 79-100, 2016 | 79 | 2016 |
A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms R Fotohi, S Firoozi Bari Springer, The Journal of Supercomputing 76 (9), 6860-6886, 2020 | 74 | 2020 |
A new approach for improvement security against DoS attacks in vehicular ad-hoc network R Fotohi, Y Ebazadeh, MS Geshlag International Journal of Advanced Computer Science and Applications 7 (7), 10-16, 2016 | 72* | 2016 |
Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system R Fotohi Elsevier, Reliability Engineering & System Safety 193, 106675, 2020 | 71 | 2020 |
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles M Faraji-Biregani, R Fotohi Springer, The Journal of Supercomputing 77 (5), 5076-5103, 2020 | 66 | 2020 |
Securing Communication between Things using Blockchain Technology based on Authentication and SHA-256 to Improving Scalability in Large-Scale IoT R Fotohi, FS Aliee Elsevier, Computer Networks 197, 108331, 2021 | 51 | 2021 |
A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem M Zaminkar, F Sarkohaki, R Fotohi Wiley, International Journal of Communication Systems 34 (3), e4693, 2021 | 50 | 2021 |
An Improvement over AODV routing protocol by limiting visited hop count R Fotohi, S Jamali, F Sarkohaki, S Behzad International Journal of Information Technology and Computer Science (IJITCS …, 2013 | 50 | 2013 |
An efficient routing protocol in mobile ad-hoc networks by using artificial immune system F Sarkohaki, R Fotohi, V Ashrafian International Journal of Advanced Computer Science and Applications(IJACSA), 2020 | 49 | 2020 |
Firoozi Bari, S., & Yusefi, M.(2020). Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol R Fotohi Wiley, International Journal of Communication Systems 33 (4), e4234, 2020 | 49* | 2020 |
Improvement over the OLSR routing protocol in mobile Ad Hoc networks by eliminating the unnecessary loops S Behzad, R Fotohi, S Jamali International Journal of Information Technology and Computer Science (IJITCS …, 2013 | 47 | 2013 |
NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things B Seyedi, R Fotohi Springer, The Journal of Supercomputing, 1-24, 2020 | 46 | 2020 |
Big data-aware intrusion detection system in communication networks: a deep learning approach M Mahdavisharif, S Jamali, R Fotohi Springer, Journal of Grid Computing 19, 1-28, 2021 | 45 | 2021 |
A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks R Fotohi, S Jamali International journal of Computer Science & Network Solutions 2 (5), 37-56, 2014 | 40 | 2014 |
A Hybrid routing method for mobile ad-hoc networks R Fotohi, R Heydari, S Jamali Journal of Advances in Computer Research 7 (3), 93-103, 2016 | 39 | 2016 |