Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions
For an unmanned aerial system (UAS) to operate successfully, it has to communicate
reliably with different entities within its network. These entities include other aircraft and …
reliably with different entities within its network. These entities include other aircraft and …
Cybersecurity of unmanned aerial vehicles: A survey
Unmanned aerial vehicles (UAVs) are unmanned aircrafts operated by radio remote control
and programmed control equipment. Due to their small size, low cost, and high flexibility …
and programmed control equipment. Due to their small size, low cost, and high flexibility …
A survey on cybersecurity attacks and defenses for unmanned aerial systems
In recent years, unmanned aerial systems (UAS) have been widely used in both military and
civilian fields. However, their open-source software and protocols have made their security …
civilian fields. However, their open-source software and protocols have made their security …
A survey of cyberattack countermeasures for unmanned aerial vehicles
PY Kong - IEEE Access, 2021 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) has been increasingly used in a wide range of commercial
and civilian applications. As an advanced cyber-physical system, UAVs are exposed to a …
and civilian applications. As an advanced cyber-physical system, UAVs are exposed to a …
Unmaned aerial vehicles threats and defence solutions
Unmanned aerial vehicles likely know as drones have become the most optimistic solution
with a bundle of applications in the field of monitoring environment, transportation, media …
with a bundle of applications in the field of monitoring environment, transportation, media …
Test methodologies for evaluating the effectiveness of suas communication links for operation in indoor and subterranean environments
This article presents a set of nondestructive test methodologies designed to evaluate and
compare performance of the communication links used for control and telemetry of small …
compare performance of the communication links used for control and telemetry of small …
Performance comparison of machine learning algorithms in detecting jamming attacks on ADS-B devices
Aviation communities are nowadays deploying automatic dependent surveillance-broadcast
(ADS-B) systems on aircraft to have more accurate and reliable air traffic control. This system …
(ADS-B) systems on aircraft to have more accurate and reliable air traffic control. This system …
Cybersecurity trends in low-altitude air traffic management
Cybersecurity is a well-recognised issue in the aviation system but effective protection
measures have not been implemented yet. Moreover, Artificial Intelligence (AI) algorithms …
measures have not been implemented yet. Moreover, Artificial Intelligence (AI) algorithms …
Drones: Architecture, vulnerabilities, attacks and countermeasures
There is significant surge in the popularity of Unmanned Aerial Vehicles (UAVs), often called
drones, with an ongoing increase in demand due to their multi-functional uses. The capacity …
drones, with an ongoing increase in demand due to their multi-functional uses. The capacity …