Cyber Attacks on Commercial Drones: A Review

B Branco, JS Silva, M Correia - IEEE Access, 2025 - ieeexplore.ieee.org
Unmanned Aerial Vehicle (UAV) s, also known as drones, are increasingly used in several
applications and a variety of cyber attacks can be performed on them using several tools …

Machine-learning-based optical spectrum feature analysis for DoS attack detection in IP over optical networks

X Gong, Y Lei, Q Zhang, L Gan, X Zhang, L Guo - Optics Express, 2024 - opg.optica.org
In this paper, we introduce a novel approach for detecting Denial of Service (DoS) attacks in
software-defined IP over optical networks, leveraging machine learning to analyze optical …

NReplay: 5G Key Reinstallation Attack Based on NAS Layer Vulnerabilities

W Fan, B Shi, C Peng - MILCOM 2024-2024 IEEE Military …, 2024 - ieeexplore.ieee.org
With the rapid development of 5G communication, it has been widely applied by users in
multiple fields. However, this has led to concerns about security and privacy. This paper …

International Caller ID Spoofing Fraud Prevention for IP Multimedia Subsystem Networks

KR Wu, JY Shen, YC Lo, CH Chiu… - 2023 IEEE 5th …, 2023 - ieeexplore.ieee.org
International caller ID spoofing fraud makes calls to other countries to steal valuable assets
and sensitive data. Fraudsters change their caller ID as local callers of domestic government …

Vwa-6g Ai Assisted Continuous Security Monitoring Over Open Ran Service Management Orchestration

YC Tung, EC Liou, PC Hu, CH Yu - Available at SSRN 4915223 - papers.ssrn.com
Abstract 6G technology brings a shift towards software-defined and virtualized base stations,
enhancing scalability and enabling functionalities like digital twins, virtual reality, and the …