A comprehensive review of unmanned aerial vehicle attacks and neutralization techniques
Abstract Unmanned Aerial Vehicles (UAV) have revolutionized the aircraft industry in this
decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier …
decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier …
A review of counter-UAS technologies for cooperative defensive teams of drones
In recent years, the drone market has had a significant expansion, with applications in
various fields (surveillance, rescue operations, intelligent logistics, environmental …
various fields (surveillance, rescue operations, intelligent logistics, environmental …
Drone detection and defense systems: Survey and a software-defined radio-based solution
With the decrease in the cost and size of drones in recent years, their number has also
increased exponentially. As such, the concerns regarding security aspects that are raised by …
increased exponentially. As such, the concerns regarding security aspects that are raised by …
Review of intentional electromagnetic interference on UAV sensor modules and experimental study
With the advancement of technology, Unmanned Aerial Vehicles (UAVs), also known as
drones, are being used in numerous applications. However, the illegal use of UAVs, such as …
drones, are being used in numerous applications. However, the illegal use of UAVs, such as …
[HTML][HTML] Detecting and mitigating attacks on GPS devices
Modern systems and devices, including unmanned aerial systems (UASs), autonomous
vehicles, and other unmanned and autonomous systems, commonly rely on the Global …
vehicles, and other unmanned and autonomous systems, commonly rely on the Global …
Protecting autonomous UAVs from GPS spoofing and jamming: A comparative analysis of detection and mitigation techniques
P Joeaneke, O Obioha Val, OO Olaniyi… - … Olumide Samuel and …, 2024 - papers.ssrn.com
This study investigates the vulnerabilities of unmanned aerial vehicles (UAVs) to GPS
spoofing and jamming, addressing three key research questions:(1) What are the common …
spoofing and jamming, addressing three key research questions:(1) What are the common …
Global analysis of active defense technologies for unmanned aerial vehicle
C Lyu, R Zhan - IEEE Aerospace and Electronic Systems …, 2022 - ieeexplore.ieee.org
The main purpose of this article is to enhance the systematicness, comprehensiveness, and
profundity of the counter-unmanned aerial system (C-UAS) theoretical system, laying a …
profundity of the counter-unmanned aerial system (C-UAS) theoretical system, laying a …
A software defined radio based anti-UAV mobile system with jamming and spoofing capabilities
The number of incidents between unmanned aerial vehicles (UAVs) and aircrafts at airports
and airfields has been increasing over the last years. To address the problem, in this paper …
and airfields has been increasing over the last years. To address the problem, in this paper …
Multi-agent system for rogue drone interception
A multitude of applications based on unmanned aircraft vehicles (UAVs), in conjunction with
the UAVs' diminishing costs and increasing capabilities, present a major threat to public …
the UAVs' diminishing costs and increasing capabilities, present a major threat to public …
A comprehensive survey and tutorial on smart vehicles: Emerging technologies, security issues, and solutions using machine learning
According to research, the vast majority of road accidents (90%) are the result of human
error, with only a small percentage (2%) being caused by malfunctions in the vehicle. Smart …
error, with only a small percentage (2%) being caused by malfunctions in the vehicle. Smart …