Search Results - "Kaabouch, Naima"
-
1
A Comprehensive Survey on Spectrum Sensing in Cognitive Radio Networks: Recent Advances, New Challenges, and Future Research Directions
Published in Sensors (Basel, Switzerland) (02-01-2019)“…Cognitive radio technology has the potential to address the shortage of available radio spectrum by enabling dynamic spectrum access. Since its introduction,…”
Get full text
Journal Article -
2
Social Engineering Attacks: A Survey
Published in Future internet (01-04-2019)“…The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive…”
Get full text
Journal Article -
3
Dynamic Selection Techniques for Detecting GPS Spoofing Attacks on UAVs
Published in Sensors (Basel, Switzerland) (01-01-2022)“…Unmanned aerial vehicles are prone to several cyber-attacks, including Global Positioning System spoofing. Several techniques have been proposed for detecting…”
Get full text
Journal Article -
4
Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system
Published in International journal of critical infrastructure protection (01-12-2017)“…The U.S. Federal Aviation Administration has mandated the use of the Automatic Dependent Surveillance-Broadcast (ADS-B) system by January 2020 as a key…”
Get full text
Journal Article -
5
Detecting and Mitigating Attacks on GPS Devices
Published in Sensors (Basel, Switzerland) (26-08-2024)“…Modern systems and devices, including unmanned aerial systems (UASs), autonomous vehicles, and other unmanned and autonomous systems, commonly rely on the…”
Get full text
Journal Article -
6
Autonomous Image-Based Corrosion Detection in Steel Structures Using Deep Learning
Published in Sensors (Basel, Switzerland) (01-06-2024)“…Steel structures are susceptible to corrosion due to their exposure to the environment. Currently used non-destructive techniques require inspector…”
Get full text
Journal Article -
7
Wideband Spectrum Sensing: A Bayesian Compressive Sensing Approach
Published in Sensors (Basel, Switzerland) (05-06-2018)“…Sensing the wideband spectrum is an important process for next-generation wireless communication systems. Spectrum sensing primarily aims at detecting unused…”
Get full text
Journal Article -
8
Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities
Published in Applied sciences (01-08-2024)“…The integration of edge computing with IoT (EC-IoT) systems provides significant improvements in addressing security and privacy challenges in IoT networks…”
Get full text
Journal Article -
9
Electric and Magnetic Fields Analysis of the Safety Distance for UAV Inspection around Extra-High Voltage Transmission Lines
Published in Drones (Basel) (01-02-2024)“…The deployment of small unmanned aerial vehicles (UAVs), or drones, for transmission line inspections, has brought attention to the potential impact of…”
Get full text
Journal Article -
10
A Deep Learning approach for Diagnosis of Mild Cognitive Impairment Based on MRI Images
Published in Brain sciences (28-08-2019)“…Mild cognitive impairment (MCI) is an intermediary stage condition between healthy people and Alzheimer's disease (AD) patients and other dementias. AD is a…”
Get full text
Journal Article -
11
A Comparative Analysis of Supervised and Unsupervised Models for Detecting Attacks on the Intrusion Detection Systems
Published in Information (Basel) (01-02-2023)“…Intrusion Detection Systems are expected to detect and prevent malicious activities in a network, such as a smart grid. However, they are the main systems…”
Get full text
Journal Article -
12
Deepfake Attacks: Generation, Detection, Datasets, Challenges, and Research Directions
Published in Computers (Basel) (01-10-2023)“…Recent years have seen a substantial increase in interest in deepfakes, a fast-developing field at the nexus of artificial intelligence and multimedia. These…”
Get full text
Journal Article -
13
Machine Learning: Models, Challenges, and Research Directions
Published in Future internet (01-10-2023)“…Machine learning techniques have emerged as a transformative force, revolutionizing various application domains, particularly cybersecurity. The development of…”
Get full text
Journal Article -
14
A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
Published in Future internet (01-01-2024)“…With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet…”
Get full text
Journal Article -
15
An evaluation and ranking of evolutionary algorithms in segmenting abnormal masses in digital mammograms
Published in Multimedia tools and applications (01-07-2020)“…Breast cancer is the most common cancer in women worldwide and the second main cause of cancer mortality after lung cancer. Up to now, there still no…”
Get full text
Journal Article -
16
Space Occupancy Representation Based on A Bayesian Model for Unmanned Aerial Vehicles
Published in Journal of intelligent & robotic systems (01-02-2020)“…Collision avoidance for unmanned aerial vehicles is a main task for autonomous aerial systems. One of the major challenges facing such technology is the…”
Get full text
Journal Article -
17
Range-Free Localization Approaches Based on Intelligent Swarm Optimization for Internet of Things
Published in Information (Basel) (01-11-2023)“…Recently, the precise location of sensor nodes has emerged as a significant challenge in the realm of Internet of Things (IoT) applications, including Wireless…”
Get full text
Journal Article -
18
Impact of Dataset and Model Parameters on Machine Learning Performance for the Detection of GPS Spoofing Attacks on Unmanned Aerial Vehicles
Published in Applied sciences (01-01-2023)“…GPS spoofing attacks are a severe threat to unmanned aerial vehicles. These attacks manipulate the true state of the unmanned aerial vehicles, potentially…”
Get full text
Journal Article -
19
Multi-Attributes, Utility-Based, Channel Quality Ranking Mechanism for Cognitive Radio Networks
Published in Applied sciences (01-04-2018)“…[...]even though these techniques rank the channel using some parameters and perform well under specific settings, they consider parameters separately in the…”
Get full text
Journal Article -
20
Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter
Published in Journal of sensor and actuator networks (01-09-2018)“…Cognitive radio technology addresses the problem of spectrum scarcity by allowing secondary users to use the vacant spectrum bands without causing interference…”
Get full text
Journal Article