{"id":"https://openalex.org/W3197466930","doi":"https://doi.org/10.1155/2021/1542657","title":"Intelligent Detection System Enabled Attack Probability Using Markov Chain in Aerial Networks","display_name":"Intelligent Detection System Enabled Attack Probability Using Markov Chain in Aerial Networks","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3197466930","doi":"https://doi.org/10.1155/2021/1542657","mag":"3197466930"},"language":"en","primary_location":{"id":"doi:10.1155/2021/1542657","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/1542657","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/1542657.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/wcmc/2021/1542657.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050939969","display_name":"Inam Ullah Khan","orcid":"https://orcid.org/0000-0003-3637-6977"},"institutions":[{"id":"https://openalex.org/I196431481","display_name":"Isra University","ror":"https://ror.org/04rmz8121","country_code":"PK","type":"education","lineage":["https://openalex.org/I196431481"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Inam Ullah Khan","raw_affiliation_strings":["Department of Electronic Engineering, School of Engineering and Applied Sciences, Isra University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, School of Engineering and Applied Sciences, Isra University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I196431481"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017457371","display_name":"Asrin Abdollahi","orcid":"https://orcid.org/0000-0001-5050-7027"},"institutions":[{"id":"https://openalex.org/I3124704065","display_name":"University of Kurdistan","ror":"https://ror.org/04k89yk85","country_code":"IR","type":"education","lineage":["https://openalex.org/I3124704065"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Asrin Abdollahi","raw_affiliation_strings":["Department of Electrical Engineering, University of Kurdistan, Sanandaj, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, University of Kurdistan, Sanandaj, Iran","institution_ids":["https://openalex.org/I3124704065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044841063","display_name":"Ryan Alturki","orcid":"https://orcid.org/0000-0002-0967-1885"},"institutions":[{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ryan Alturki","raw_affiliation_strings":["Department of Information Science, College of Computer and Information Systems, Umm AlQura University, Makkah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Science, College of Computer and Information Systems, Umm AlQura University, Makkah, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027946901","display_name":"Mohammad Dahman Alshehri","orcid":"https://orcid.org/0000-0001-9520-330X"},"institutions":[{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammad Dahman Alshehri","raw_affiliation_strings":["Department of Computer Science, College of Computers and Information Technology, Taif University, Taif 21944, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computers and Information Technology, Taif University, Taif 21944, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079212549","display_name":"Mohammed Abdulaziz Ikram","orcid":"https://orcid.org/0000-0001-5111-9923"},"institutions":[{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammed Abdulaziz Ikram","raw_affiliation_strings":["Computer Science Department, University College in Al-Jamoum, Umm Al-Qura University, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University College in Al-Jamoum, Umm Al-Qura University, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079466640","display_name":"Hasan J. Alyamani","orcid":"https://orcid.org/0000-0003-0522-4348"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hasan J. Alyamani","raw_affiliation_strings":["Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Rabigh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Rabigh, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063328981","display_name":"Shahzad Khan","orcid":"https://orcid.org/0009-0009-5508-0849"},"institutions":[{"id":"https://openalex.org/I181063083","display_name":"Abdul Wali Khan University Mardan","ror":"https://ror.org/03b9y4e65","country_code":"PK","type":"education","lineage":["https://openalex.org/I181063083"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Shahzad Khan","raw_affiliation_strings":["Department of Computer Science, Abdul Wali Khan University Mardan, 23200 Mardan, KPK, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Abdul Wali Khan University Mardan, 23200 Mardan, KPK, Pakistan","institution_ids":["https://openalex.org/I181063083"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5017457371"],"corresponding_institution_ids":["https://openalex.org/I3124704065"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":12.4234,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.9791203,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"2021","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.890731155872345},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.7448524832725525},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4391126036643982},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36086639761924744},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2820899486541748}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.890731155872345},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.7448524832725525},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4391126036643982},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36086639761924744},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2820899486541748}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/1542657","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/1542657","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/1542657.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:eafc11ea0e84460186a9727bc9454346","is_oa":true,"landing_page_url":"https://doaj.org/article/eafc11ea0e84460186a9727bc9454346","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/1542657","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/1542657","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/1542657.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G158501933","display_name":null,"funder_award_id":"TURSP-2020/126","funder_id":"https://openalex.org/F4320323722","funder_display_name":"Taif University"},{"id":"https://openalex.org/G2722625370","display_name":null,"funder_award_id":"(TURSP-2020/126)","funder_id":"https://openalex.org/F4320323722","funder_display_name":"Taif University"},{"id":"https://openalex.org/G4393481380","display_name":null,"funder_award_id":"Saudi Arabia","funder_id":"https://openalex.org/F4320323722","funder_display_name":"Taif University"},{"id":"https://openalex.org/G5339273845","display_name":null,"funder_award_id":"TURSP-2020/12","funder_id":"https://openalex.org/F4320323722","funder_display_name":"Taif University"},{"id":"https://openalex.org/G6769911199","display_name":null,"funder_award_id":"Saudi Arabia.","funder_id":"https://openalex.org/F4320323722","funder_display_name":"Taif University"},{"id":"https://openalex.org/G7299194679","display_name":null,"funder_award_id":"TURSP-2020","funder_id":"https://openalex.org/F4320323722","funder_display_name":"Taif University"}],"funders":[{"id":"https://openalex.org/F4320323722","display_name":"Taif University","ror":"https://ror.org/014g1a453"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3197466930.pdf","grobid_xml":"https://content.openalex.org/works/W3197466930.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W2238545965","https://openalex.org/W2557544264","https://openalex.org/W2744470920","https://openalex.org/W2777539484","https://openalex.org/W2790836412","https://openalex.org/W2799134357","https://openalex.org/W2806665540","https://openalex.org/W2900477065","https://openalex.org/W2905432470","https://openalex.org/W2951111771","https://openalex.org/W2963084122","https://openalex.org/W2982615157","https://openalex.org/W3001869356","https://openalex.org/W3011395188","https://openalex.org/W3017165746","https://openalex.org/W3031028459","https://openalex.org/W3045041297"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"The":[0,128],"Internet":[1],"of":[2,28,46,51,56,113],"Things":[3],"(IoT)":[4],"plays":[5],"an":[6,68],"important":[7],"role":[8],"to":[9,20,31,62,81,97,109,135],"connect":[10],"people,":[11],"data,":[12],"processes,":[13],"and":[14,54,142,149,173],"things.":[15],"From":[16],"linked":[17],"supply":[18],"chains":[19],"big":[21],"data":[22],"produced":[23],"by":[24,92],"a":[25,39,137],"large":[26],"number":[27],"IoT":[29],"devices":[30],"industrial":[32],"control":[33],"systems":[34],"where":[35],"cybersecurity":[36],"has":[37],"become":[38],"critical":[40],"problem":[41],"in":[42,166],"IoT\u2010powered":[43],"systems.":[44],"Denial":[45],"Service":[47],"(DoS),":[48],"distributed":[49],"denial":[50],"service":[52],"(DDoS),":[53],"ping":[55],"death":[57],"attacks":[58],"are":[59],"significant":[60],"threats":[61],"flying":[63,114],"networks.":[64],"This":[65],"paper":[66,87],"presents":[67],"intrusion":[69],"detection":[70],"system":[71],"(IDS)":[72],"based":[73],"on":[74],"attack":[75,175],"probability":[76],"using":[77,93],"the":[78,86,99,103,110,118,122,132,160],"Markov":[79,147,150],"chain":[80,151],"detect":[82],"flooding":[83],"attacks.":[84],"While":[85],"includes":[88],"buffer":[89],"queue":[90,119,164],"length":[91,120,165],"queuing":[94],"theory":[95],"concept":[96],"evaluate":[98],"network":[100,104],"safety.":[101],"Also,":[102],"scenario":[105],"will":[106],"change":[107],"due":[108],"dynamic":[111],"nature":[112],"vehicles.":[115],"Simulation":[116],"describes":[117],"when":[121],"ground":[123],"station":[124],"is":[125],"under":[126],"attack.":[127],"proposed":[129],"IDS":[130],"utilizes":[131],"optimal":[133],"threshold":[134],"make":[136],"tradeoff":[138],"between":[139],"false":[140,143],"positive":[141],"negative":[144],"states":[145],"with":[146,169],"binomial":[148],"distribution":[152],"stochastic":[153],"models.":[154],"However,":[155],"at":[156],"each":[157],"time":[158],"slot,":[159],"results":[161],"demonstrate":[162],"maintaining":[163],"normal":[167],"mode":[168],"less":[170],"packet":[171],"loss":[172],"high":[174],"detection.":[176]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
