A review on cybersecurity vulnerabilities for unmanned aerial vehicles
CGL Krishna, RR Murphy - 2017 IEEE international symposium …, 2017 - ieeexplore.ieee.org
This paper surveys the scientific and trade literature on cybersecurity for unmanned aerial
vehicles (UAV), concentrating on actual and simulated attacks, and the implications for small …
vehicles (UAV), concentrating on actual and simulated attacks, and the implications for small …
A survey of cyberattack countermeasures for unmanned aerial vehicles
PY Kong - IEEE Access, 2021 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) has been increasingly used in a wide range of commercial
and civilian applications. As an advanced cyber-physical system, UAVs are exposed to a …
and civilian applications. As an advanced cyber-physical system, UAVs are exposed to a …
Multi-UAV optimal mission assignment and path planning for disaster rescue using adaptive genetic algorithm and improved artificial bee colony method
H Liu, J Ge, Y Wang, J Li, K Ding, Z Zhang, Z Guo, W Li… - Actuators, 2021 - mdpi.com
An optimal mission assignment and path planning method of multiple unmanned aerial
vehicles (UAVs) for disaster rescue is proposed. In this application, the UAVs include the …
vehicles (UAVs) for disaster rescue is proposed. In this application, the UAVs include the …
On perception and reality in wireless air traffic communication security
M Strohmeier, M Schäfer, R Pinheiro… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
More than a dozen wireless technologies are used by air traffic communication systems
during different flight phases. From a conceptual perspective, all of them are insecure, as …
during different flight phases. From a conceptual perspective, all of them are insecure, as …
Multi-drone optimal mission assignment and 3D path planning for disaster rescue
T **ong, F Liu, H Liu, J Ge, H Li, K Ding, Q Li - Drones, 2023 - mdpi.com
In a three-dimensional (3D) disaster rescue mission environment, multi-drone mission
assignments and path planning are challenging. Aiming at this problem, a mission …
assignments and path planning are challenging. Aiming at this problem, a mission …
Adversarial reinforcement learning framework for benchmarking collision avoidance mechanisms in autonomous vehicles
V Behzadan, A Munir - IEEE Intelligent Transportation Systems …, 2019 - ieeexplore.ieee.org
With the rapidly growing interest in autonomous navigation, the body of research on motion
planning and collision avoidance techniques has enjoyed an accelerating rate of novel …
planning and collision avoidance techniques has enjoyed an accelerating rate of novel …
Wireless attacks on aircraft landing systems
Modern aircraft heavily rely on several wireless technologies for communications, control,
and navigation. In this work, we demonstrate the vulnerability of aircraft instrument landing …
and navigation. In this work, we demonstrate the vulnerability of aircraft instrument landing …
UAV collision avoidance exploitation for noncooperative trajectory modification
P Pierpaoli, A Rahmani - Aerospace Science and Technology, 2018 - Elsevier
Distributed collision-free trajectories are generally obtained through a continuous sharing of
information between vehicles. With the intent of investigating possible sources of …
information between vehicles. With the intent of investigating possible sources of …
Security in next generation air traffic communication networks
M Strohmeier - 2016 - ora.ox.ac.uk
A multitude of wireless technologies are used by air traffic communication systems during
different flight phases. From a conceptual perspective, all of them are insecure as security …
different flight phases. From a conceptual perspective, all of them are insecure as security …
IoTDL2AIDS: Towards IoT-Based System Architecture Supporting Distributed LSTM Learning for Adaptive IDS on UAS
The rapid proliferation of Unmanned Aircraft Systems (UAS) introduces new threats to
national security. UAS technologies have dramatically revolutionized legitimate business …
national security. UAS technologies have dramatically revolutionized legitimate business …