Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security analysis of drones systems: Attacks, limitations, and recommendations
Recently, the world witnessed a significant increase in the number of used drones, with a
global and continuous rise in the demand for their multi-purpose applications. The pervasive …
global and continuous rise in the demand for their multi-purpose applications. The pervasive …
Fast, reliable, and secure drone communication: A comprehensive survey
Drone security is currently a major topic of discussion among researchers and industrialists.
Although there are multiple applications of drones, if the security challenges are not …
Although there are multiple applications of drones, if the security challenges are not …
[HTML][HTML] A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks
Unmanned aerial vehicles (UAVs) are a rapidly evolving technology, and being highly
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …
Adversarial attacks and defenses for deep-learning-based unmanned aerial vehicles
J Tian, B Wang, R Guo, Z Wang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The introduction of deep learning (DL) technology can improve the performance of cyber–
physical systems (CPSs) in many ways. However, this also brings new security issues. To …
physical systems (CPSs) in many ways. However, this also brings new security issues. To …
Autonomous aerial robotics for package delivery: A technical review
Small unmanned aerial vehicles (UAVs) have gained significant interest in the last decade.
More specifically these vehicles have the capacity to impact package delivery logistics in a …
More specifically these vehicles have the capacity to impact package delivery logistics in a …
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment
Drones, which are also known as Unmanned Aerial Vehicles (UAVs), are very useful in
delivering the packages, and real-time object detection and tracking with minimal human …
delivering the packages, and real-time object detection and tracking with minimal human …
Global analysis of active defense technologies for unmanned aerial vehicle
C Lyu, R Zhan - IEEE Aerospace and Electronic Systems …, 2022 - ieeexplore.ieee.org
The main purpose of this article is to enhance the systematicness, comprehensiveness, and
profundity of the counter-unmanned aerial system (C-UAS) theoretical system, laying a …
profundity of the counter-unmanned aerial system (C-UAS) theoretical system, laying a …
A survey on cryptographic methods to secure communications for UAV traffic management
R Aissaoui, JC Deneuville, C Guerber… - Vehicular …, 2023 - Elsevier
Abstract Unmanned Aerial Systems (UAS) have a wide variety of applications, and their
development in terms of capabilities is continuously evolving. Many missions performed by …
development in terms of capabilities is continuously evolving. Many missions performed by …
A survey on cybersecurity attacks and defenses for unmanned aerial systems
In recent years, unmanned aerial systems (UAS) have been widely used in both military and
civilian fields. However, their open-source software and protocols have made their security …
civilian fields. However, their open-source software and protocols have made their security …
A survey of cyberattack countermeasures for unmanned aerial vehicles
PY Kong - IEEE Access, 2021 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) has been increasingly used in a wide range of commercial
and civilian applications. As an advanced cyber-physical system, UAVs are exposed to a …
and civilian applications. As an advanced cyber-physical system, UAVs are exposed to a …