A review on applications of rotary-wing unmanned aerial vehicle charging stations
Today's technology allows people to remotely control and monitor many systems. In these
technological systems, robots or unmanned vehicles are generally used, which are …
technological systems, robots or unmanned vehicles are generally used, which are …
Comparison of cooled and uncooled ir sensors by means of signal-to-noise ratio for ndt diagnostics of aerospace grade composites
This work aims to address the effectiveness and challenges of non-destructive testing (NDT)
by active infrared thermography (IRT) for the inspection of aerospace-grade composite …
by active infrared thermography (IRT) for the inspection of aerospace-grade composite …
Mini-me, you complete me! data-driven drone security via dnn-based approximate computing
The safe operation of robotic aerial vehicles (RAV) requires effective security protection of
their controllers against cyber-physical attacks. The frequency and sophistication of past …
their controllers against cyber-physical attacks. The frequency and sophistication of past …
Get your cyber-physical tests done! data-driven vulnerability assessment of robotic aerial vehicles
A Ding, M Chan, A Hass… - 2023 53rd Annual …, 2023 - ieeexplore.ieee.org
The rapid growth of robotic aerial vehicles (RAVs) has attracted extensive interest in
numerous public and civilian applications, from flying drones to quadrotors. Security of RAV …
numerous public and civilian applications, from flying drones to quadrotors. Security of RAV …
A modular hybrid learning approach for black-box security testing of CPS
Evaluating the security of Cyber-Physical Systems (CPS) is challenging, mainly because it
brings risks that are not acceptable in mission-critical systems like Industrial Control Systems …
brings risks that are not acceptable in mission-critical systems like Industrial Control Systems …
Grounds for suspicion: Physics-based early warnings for stealthy attacks on industrial control systems
Stealthy attacks on Industrial Control Systems can cause significant damage while evading
detection. In this article, instead of focusing on the detection of stealthy attacks, we aim to …
detection. In this article, instead of focusing on the detection of stealthy attacks, we aim to …
Mismatched Control and Monitoring Frequencies: Vulnerability, Attack, and Mitigation
Stealthy attacks manipulate the operation of Industrial Control Systems (ICSs) without being
undetected, allowing persistent manipulation of system operation and thus the potential to …
undetected, allowing persistent manipulation of system operation and thus the potential to …
RoboCop: A Robust Zero-Day Cyber-Physical Attack Detection Framework for Robots
Zero-day vulnerabilities pose a significant challenge to robot cyber-physical systems (CPS).
Attackers can exploit software vulnerabilities in widely-used robotics software, such as the …
Attackers can exploit software vulnerabilities in widely-used robotics software, such as the …
Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Vehicle
A Ding, M Chan, A Hassanzadeh, NO Tippenhauer… - 2023 - publications.cispa.de
The rapid growth of robotic aerial vehicles (RAVs) has attracted extensive interest in
numerous public and civilian applications, from flying drones to quadrotors. Security of RAV …
numerous public and civilian applications, from flying drones to quadrotors. Security of RAV …
You Can't Always Check What You Wanted:: Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things
Modern Internet-of-Things devices are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. We present a “selective checking” …
commands that modify their physical behaviors. We present a “selective checking” …