Cyber Attacks on Commercial Drones: A Review

B Branco, JS Silva, M Correia - IEEE Access, 2025 - ieeexplore.ieee.org
Unmanned Aerial Vehicle (UAV) s, also known as drones, are increasingly used in several
applications and a variety of cyber attacks can be performed on them using several tools …

Internet of things and Big Data Analytic: A State of the Art Review

RTH Hasan - Journal of Applied Science and Technology Trends, 2022 - jastt.org
Th Connectivity plays a vital role in today's world when it comes to a device or things
connection. The Internet of Things (IoT) plays a fundamental role in understanding real …

[PDF][PDF] SeniorSentry: Safeguarding AgeTech Devices and Sensors Using Contextual Anomaly Detection and Supervised Machine Learning

A Nandikotkur - 2023 - dspace.library.uvic.ca
With the ever-growing reliance on IoT-enabled sensors to age in place, a need arises to
protect them from malicious activities by detecting attacks or other anomalies. In this work …

[PDF][PDF] Detecting BrakTooth Attacks.

A Nandikotkur, I Traore, M Mamun - SECRYPT, 2023 - researchgate.net
More than 5.1 billion Bluetooth-enabled devices were shipped in the year 2022 and this
trend is expected to exceed 7.1 billion by the year 2026. A large proportion of these devices …

IoT Device Attacks, Security and Certification

S Keshary, K Venkatesan… - … on Circuit Power …, 2024 - ieeexplore.ieee.org
Securing devices used in the Internet of Things (IoT) applications is a challenging task. This
paper provides a succinct review of the challenges in securing the Internet of Things (IoT) …

Vulnerabilities in Android OS: Challenges and Mitigation Techniques

N Nouman, Z Noreen, F Naz - International Conference on Digital …, 2022 - Springer
Android is one of the most popular operating systems for smartphones. Although Android OS
includes many salient features which include its open-source nature, and its affinity to be …

[PDF][PDF] Securing Billion Bluetooth Low Energy Devices Using Cyber-Physical Analysis and Deep Learning Techniques

H Cai, Y Fang, J Huang, H Liao, M Yuan, Z Xu - 2024 - researchgate.net
ABSTRACT Bluetooth Low Energy (BLE) serves as a critical protocol for lowenergy
communication, playing a vital role in various sectors including industry, healthcare, and …

[PDF][PDF] BlueDoS: A Novel Approach to Perform and Analyse DoS Attacks on Bluetooth Devices

PN Shelke, S Gupta, S Nandi - scitepress.org
The use of Bluetooth devices is surging across the digital landscape. As the diversity and
quantity of these devices increase, so does the focus on security within Bluetooth …