Skip to main content

Research Repository

Advanced Search

Outputs (3)

UAV’s applications, architecture, security issues and attack scenarios: A survey (2020)
Book Chapter
Khan, N. A., Brohi, S., & Jhanjhi, N. (2020). UAV’s applications, architecture, security issues and attack scenarios: A survey. In S. Peng, L. H. Son, G. Suseendran, & D. Balaganesh (Eds.), Book cover Book cover Intelligent Computing and Innovation on Data Science (753-760). Online and in print.: Springer. https://doi.org/10.1007/978-981-15-3284-9_81

Unmanned aerial vehicles (UAVs)/drones have become very popular in recent years as they are widely used in several domains. They are widely used in both military and civilian applications such as aerial photography, entertainment, search and rescue m... Read More about UAV’s applications, architecture, security issues and attack scenarios: A survey.

Emerging use of UAV’s: secure communication protocol issues and challenges (2020)
Book Chapter
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., & Nayyar, A. (2020). Emerging use of UAV’s: secure communication protocol issues and challenges. In Drones in Smart-Cities: Security and Performance (37-55). Elsevier. https://doi.org/10.1016/B978-0-12-819972-5.00003-3

In recent years, unmanned aerial vehicles (UAVs)/drones have gained popularity in many areas due to their widely used applications. They are used extensively in military and civil applications such as search and rescue, reconnaissance, monitoring of... Read More about Emerging use of UAV’s: secure communication protocol issues and challenges.

A data tracking and monitoring mechanism (2020)
Book Chapter
Lika, R. A., Ramasamy, D. A. V., Murugiah, D. A., & Brohi, S. N. (2020). A data tracking and monitoring mechanism. In S. Peng, L. H. Son, G. Suseendran, & D. Balaganesh (Eds.), Lecture Notes in Networks and Systems book series (LNNS,volume 118) (773-781). Springer. https://doi.org/10.1007/978-981-15-3284-9_89

There is a rising trend among companies to collect data including personally identifiable information (PII) from service users. An individual’s privacy can be violated when his/her PII is accumulated, utilized or divulged. Users of the technology are... Read More about A data tracking and monitoring mechanism.