A review on applications of rotary-wing unmanned aerial vehicle charging stations

H Ucgun, U Yuzgec, C Bayilmis - International Journal of …, 2021 - journals.sagepub.com
Today's technology allows people to remotely control and monitor many systems. In these
technological systems, robots or unmanned vehicles are generally used, which are …

Comparison of cooled and uncooled ir sensors by means of signal-to-noise ratio for ndt diagnostics of aerospace grade composites

S Deane, NP Avdelidis, C Ibarra-Castanedo, H Zhang… - Sensors, 2020 - mdpi.com
This work aims to address the effectiveness and challenges of non-destructive testing (NDT)
by active infrared thermography (IRT) for the inspection of aerospace-grade composite …

Mini-me, you complete me! data-driven drone security via dnn-based approximate computing

A Ding, P Murthy, L Garcia, P Sun, M Chan… - Proceedings of the 24th …, 2021 - dl.acm.org
The safe operation of robotic aerial vehicles (RAV) requires effective security protection of
their controllers against cyber-physical attacks. The frequency and sophistication of past …

Get your cyber-physical tests done! data-driven vulnerability assessment of robotic aerial vehicles

A Ding, M Chan, A Hass… - 2023 53rd Annual …, 2023 - ieeexplore.ieee.org
The rapid growth of robotic aerial vehicles (RAVs) has attracted extensive interest in
numerous public and civilian applications, from flying drones to quadrotors. Security of RAV …

A modular hybrid learning approach for black-box security testing of CPS

JH Castellanos, J Zhou - Applied Cryptography and Network Security: 17th …, 2019 - Springer
Evaluating the security of Cyber-Physical Systems (CPS) is challenging, mainly because it
brings risks that are not acceptable in mission-critical systems like Industrial Control Systems …

Grounds for suspicion: Physics-based early warnings for stealthy attacks on industrial control systems

M Azzam, L Pasquale, G Provan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Stealthy attacks on Industrial Control Systems can cause significant damage while evading
detection. In this article, instead of focusing on the detection of stealthy attacks, we aim to …

Mismatched Control and Monitoring Frequencies: Vulnerability, Attack, and Mitigation

Z Yang, L He, P Cheng, J Chen - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Stealthy attacks manipulate the operation of Industrial Control Systems (ICSs) without being
undetected, allowing persistent manipulation of system operation and thus the potential to …

RoboCop: A Robust Zero-Day Cyber-Physical Attack Detection Framework for Robots

U Kaur, ZB Celik, RM Voyles - 2024 IEEE/RSJ International …, 2024 - ieeexplore.ieee.org
Zero-day vulnerabilities pose a significant challenge to robot cyber-physical systems (CPS).
Attackers can exploit software vulnerabilities in widely-used robotics software, such as the …

Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Vehicle

A Ding, M Chan, A Hassanzadeh, NO Tippenhauer… - 2023 - publications.cispa.de
The rapid growth of robotic aerial vehicles (RAVs) has attracted extensive interest in
numerous public and civilian applications, from flying drones to quadrotors. Security of RAV …

You Can't Always Check What You Wanted:: Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things

M Hasan, S Mohan - 2023 IEEE 26th International Symposium …, 2023 - ieeexplore.ieee.org
Modern Internet-of-Things devices are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. We present a “selective checking” …