Follow
Reza Fotohi
Title
Cited by
Cited by
Year
Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication
K Mabodi, M Yusefi, S Zandiyan, L Irankhah, R Fotohi
Springer, The Journal of Supercomputing 76 (9), 1-26, 2020
1082020
An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks
R Fotohi, E Nazemi, FS Aliee
Elsevier, Vehicular Communications 26, 100267, 2020
952020
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism
R Fotohi, M Zaminkar
Springer, Wireless Personal Communications 114 (2), 1287–1312, 2020
93*2020
Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol
R Fotohi, S Firoozi Bari, M Yusefi
Wiley, International Journal of Communication Systems 33 (4), e4234, 2020
922020
DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system
S Jamali, R Fotohi
Springer, the Journal of Supercomputing 73 (12), 5173-5196, 2017
912017
Defending against wormhole attack in MANET using an artificial immune system
S Jamali, R Fotohi
New Review of Information Networking 21 (2), 79-100, 2016
792016
A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms
R Fotohi, S Firoozi Bari
Springer, The Journal of Supercomputing 76 (9), 6860-6886, 2020
742020
A new approach for improvement security against DoS attacks in vehicular ad-hoc network
R Fotohi, Y Ebazadeh, MS Geshlag
International Journal of Advanced Computer Science and Applications 7 (7), 10-16, 2016
72*2016
Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system
R Fotohi
Elsevier, Reliability Engineering & System Safety 193, 106675, 2020
712020
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles
M Faraji-Biregani, R Fotohi
Springer, The Journal of Supercomputing 77 (5), 5076-5103, 2020
662020
Securing Communication between Things using Blockchain Technology based on Authentication and SHA-256 to Improving Scalability in Large-Scale IoT
R Fotohi, FS Aliee
Elsevier, Computer Networks 197, 108331, 2021
512021
A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem
M Zaminkar, F Sarkohaki, R Fotohi
Wiley, International Journal of Communication Systems 34 (3), e4693, 2021
502021
An Improvement over AODV routing protocol by limiting visited hop count
R Fotohi, S Jamali, F Sarkohaki, S Behzad
International Journal of Information Technology and Computer Science (IJITCS …, 2013
502013
An efficient routing protocol in mobile ad-hoc networks by using artificial immune system
F Sarkohaki, R Fotohi, V Ashrafian
International Journal of Advanced Computer Science and Applications(IJACSA), 2020
492020
Firoozi Bari, S., & Yusefi, M.(2020). Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol
R Fotohi
Wiley, International Journal of Communication Systems 33 (4), e4234, 2020
49*2020
Improvement over the OLSR routing protocol in mobile Ad Hoc networks by eliminating the unnecessary loops
S Behzad, R Fotohi, S Jamali
International Journal of Information Technology and Computer Science (IJITCS …, 2013
472013
NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things
B Seyedi, R Fotohi
Springer, The Journal of Supercomputing, 1-24, 2020
462020
Big data-aware intrusion detection system in communication networks: a deep learning approach
M Mahdavisharif, S Jamali, R Fotohi
Springer, Journal of Grid Computing 19, 1-28, 2021
452021
A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks
R Fotohi, S Jamali
International journal of Computer Science & Network Solutions 2 (5), 37-56, 2014
402014
A Hybrid routing method for mobile ad-hoc networks
R Fotohi, R Heydari, S Jamali
Journal of Advances in Computer Research 7 (3), 93-103, 2016
392016
The system can't perform the operation now. Try again later.
Articles 1–20