Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    A Planning Method for Operational Test of UAV Swarm Based on Mission Reliability

    Jingyu Wang1, Ping Jiang1,*, Jianjun Qi2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1889-1918, 2024, DOI:10.32604/cmes.2024.049813 - 20 May 2024

    Abstract The unmanned aerial vehicle (UAV) swarm plays an increasingly important role in the modern battlefield, and the UAV swarm operational test is a vital means to validate the combat effectiveness of the UAV swarm. Due to the high cost and long duration of operational tests, it is essential to plan the test in advance. To solve the problem of planning UAV swarm operational test, this study considers the multi-stage feature of a UAV swarm mission, composed of launch, flight and combat stages, and proposes a method to find test plans that can maximize mission reliability.… More >

  • Open Access

    ARTICLE

    TBDDoSA-MD: Trust-Based DDoS Misbehave Detection Approach in Software-defined Vehicular Network (SDVN)

    Rajendra Prasad Nayak1, Srinivas Sethi2, Sourav Kumar Bhoi3, Kshira Sagar Sahoo4, Nz Jhanjhi5, Thamer A. Tabbakh6, Zahrah A. Almusaylim7,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3513-3529, 2021, DOI:10.32604/cmc.2021.018930 - 24 August 2021

    Abstract Reliable vehicles are essential in vehicular networks for effective communication. Since vehicles in the network are dynamic, even a short span of misbehavior by a vehicle can disrupt the whole network which may lead to catastrophic consequences. In this paper, a Trust-Based Distributed DoS Misbehave Detection Approach (TBDDoSA-MD) is proposed to secure the Software-Defined Vehicular Network (SDVN). A malicious vehicle in this network performs DDoS misbehavior by attacking other vehicles in its neighborhood. It uses the jamming technique by sending unnecessary signals in the network, as a result, the network performance degrades. Attacked vehicles in… More >

Displaying 1-10 on page 1 of 2. Per Page