Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities
暂无分享,去创建一个
Alexander Solodov | Adam Williams | Sara Al Hanaei | Braden Goddard | Adam D. Williams | A. Solodov | B. Goddard | Sara Al Hanaei
[1] Laurent Ciarletta,et al. Towards a generic and modular geofencing strategy for civilian UAVs , 2016, 2016 International Conference on Unmanned Aircraft Systems (ICUAS).
[2] Meng-Han Tsai,et al. A review of rotorcraft Unmanned Aerial Vehicle (UAV) developments and applications in civil engineering , 2014 .
[3] E. D. Cohen,et al. Active electronically scanned arrays , 1994, Proceedings of IEEE National Telesystems Conference - NTC '94.
[4] Peter A. Hancock,et al. Workload, Situation Awareness, and Teaming Issues for UAV/UCAV Operations , 2001 .
[5] Ronald S. Ross,et al. Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems | NIST , 2016 .
[6] Sergei Boeke,et al. Civil-military relations and international military cooperation in cyber security: Common challenges & state practices across Asia and Europe , 2015, 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace.
[7] Kim Hartmann,et al. The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[8] Adam David Williams,et al. Beyond a series of security nets: applying STAMP & STPA to port security , 2015 .
[9] Peter Wellig,et al. Detection and tracking of drones using advanced acoustic cameras , 2015, SPIE Security + Defence.
[10] Gabriel C. Birch,et al. UAS Detection Classification and Neutralization: Market Survey 2015 , 2015 .
[11] Mary Lynn Garcia,et al. The Design and Evaluation of Physical Protection Systems , 2001 .
[12] Brian D. Rigling,et al. Multisensor 3D tracking for counter small unmanned air vehicles (CSUAV) , 2008, SPIE Defense + Commercial Sensing.
[13] Rick Dove,et al. The Buck Stops Here: Systems Engineering Is Responsible for System Security , 2013 .
[14] Bartholomew Elias,et al. Unmanned Aircraft Operations in Domestic Airspace: U.S. Policy Perspectives and the Regulatory Landscape [January 27, 2016] , 2016 .
[15] Stefan Kaufmann,et al. Security Through Technology? Logic, Ambivalence and Paradoxes of Technologised Security , 2016 .
[16] Rosanna Hertz,et al. GUARDING AGAINST BOREDOM , 1989 .
[17] K. J. Hofstetter,et al. Application of UAVs at the Savannah River Site , 1996 .
[18] Zhenyu Guo,et al. Risk analysis of Unmanned Aerial Vehicle hijacking and methods of its detection , 2013, 2013 IEEE Systems and Information Engineering Design Symposium.
[19] Vps Naidu,et al. Geo-Fencing for Unmanned Aerial Vehicle , 2015 .
[20] Vyacheslav Kharchenko,et al. Reliability and survivability models of integrated drone-based systems for post emergency monitoring of NPPs , 2016, 2016 International Conference on Information and Digital Technologies (IDT).
[21] Roger Clarke,et al. Understanding the drone epidemic , 2014, Comput. Law Secur. Rev..
[22] Todd E. Humphreys,et al. Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.