User profiles for M. R. Manesh
Mohsen Riahi ManeshCampbell University Verified email at campbell.edu Cited by 785 |
Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system
MR Manesh, N Kaabouch - International journal of critical infrastructure …, 2017 - Elsevier
The US Federal Aviation Administration has mandated the use of the Automatic Dependent
Surveillance-Broadcast (ADS-B) system by January 2020 as a key component of the …
Surveillance-Broadcast (ADS-B) system by January 2020 as a key component of the …
Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions
MR Manesh, N Kaabouch - Computers & Security, 2019 - Elsevier
For an unmanned aerial system (UAS) to operate successfully, it has to communicate
reliably with different entities within its network. These entities include other aircraft and UAS, …
reliably with different entities within its network. These entities include other aircraft and UAS, …
Security threats and countermeasures of MAC layer in cognitive radio networks
MR Manesh, N Kaabouch - Ad Hoc Networks, 2018 - Elsevier
Cognitive radio is a promising technology proposed to solve the scarcity of the radio spectrum
by opportunistically allocating the idle channels of the licensed users to unlicensed ones. …
by opportunistically allocating the idle channels of the licensed users to unlicensed ones. …
Detection of GPS spoofing attacks on unmanned aerial systems
MR Manesh, J Kenney, WC Hu… - 2019 16th IEEE …, 2019 - ieeexplore.ieee.org
Unmanned Aerial Systems (UAS) have received a huge interest in military and civil applications.
Applications of UAS are dependent on successful communications of these systems …
Applications of UAS are dependent on successful communications of these systems …
Performance evaluation of spectrum sensing techniques for cognitive radio systems
With the increase in utilization of portable devices and ever-growing demand for greater data
rates in wireless transmission, an increasing demand for spectrum channels was observed …
rates in wireless transmission, an increasing demand for spectrum channels was observed …
An optimized SNR estimation technique using particle swarm optimization algorithm
Estimation of the signal-to-noise ratio (SNR) has become an integral part of wireless
communication systems, particularly in cognitive radio systems. The knowledge of the SNR at any …
communication systems, particularly in cognitive radio systems. The knowledge of the SNR at any …
Real-time spectrum occupancy monitoring using a probabilistic model
The scarcity of the radio spectrum has motivated a search for more optimal and efficient
spectrum management methods. One of these methods is spectrum sharing, which multiplies the …
spectrum management methods. One of these methods is spectrum sharing, which multiplies the …
Simulation testbeds and frameworks for UAV performance evaluation
…, J Wolf, J Kenney, MR Manesh… - 2021 ieee …, 2021 - ieeexplore.ieee.org
Real-world performance evaluation of an Unmanned Aerial Vehicle (UAV) requires a
considerable amount of time and resources. It is challenging to evaluate and make frequent …
considerable amount of time and resources. It is challenging to evaluate and make frequent …
Performance comparison of machine learning algorithms in detecting jamming attacks on ADS-B devices
Aviation communities are nowadays deploying automatic dependent surveillance-broadcast
(ADS-B) systems on aircraft to have more accurate and reliable air traffic control. This …
(ADS-B) systems on aircraft to have more accurate and reliable air traffic control. This …
A preliminary effort toward investigating the impacts of ADS-B message injection attack
MR Manesh, M Mullins, K Foerster… - 2018 IEEE Aerospace …, 2018 - ieeexplore.ieee.org
One of the disadvantages of the Automatic Dependent Surveillance-Broadcast (ADS-B)
communications protocol is its vulnerability to a number of security attacks since it broadcasts …
communications protocol is its vulnerability to a number of security attacks since it broadcasts …