How to Analyze the Cyber Threat from Drones: Background, Analysis Frameworks, and Analysis Tools
暂无分享,去创建一个
Katharina Ley Best | Shane Tierney | Nahom M. Beyene | Jon Schmid | Maynard A. Holliday | Jalal Awan | Raza Khan | Karen Lee | Shane Tierney | K. Best | Jon Schmid | Raza Khan | J. Awan | Nahom Beyene | Karen Lee
[1] Craig S. Agate,et al. Decentralized asset management for collaborative sensing , 2017, Defense + Security.
[2] Harry L. Van Trees,et al. Detection, Estimation, and Modulation Theory, Part I , 1968 .
[3] Frank L. Lewis,et al. Security of unmanned aerial vehicle systems against cyber-physical attacks , 2016 .
[4] Todd E. Humphreys,et al. Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.
[5] Ronald C. Arkin,et al. An Behavior-based Robotics , 1998 .
[6] Shashank Tamaskar,et al. UAV Traffic Information Exchange Network , 2018, 2018 Aviation Technology, Integration, and Operations Conference.
[7] Jeremy Straub,et al. Using deep learning to detect network intrusions and malware in autonomous robots , 2017, Defense + Security.
[8] John V. Foster,et al. Real-Time Risk Assessment Framework for Unmanned Aircraft System (UAS) Traffic Management (UTM) , 2017 .
[9] Sidi-Mohammed Senouci,et al. Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution , 2018, The Journal of Supercomputing.
[10] Owen Brown,et al. Defense Advanced Research Projects Agency , 2009 .
[11] Yuval Elovici,et al. dr0wned - Cyber-Physical Attack with Additive Manufacturing , 2016, WOOT.
[12] Marcus Johnson,et al. Unmanned Aircraft System Traffic Management (UTM) Concept of Operations , 2016 .
[13] Yujun Kuang,et al. EAI Endorsed Transactions on Scalable Information Systems Research , 2014 .
[14] Moritz Petersen,et al. Blockchain in logistics and supply chain : trick or treat? , 2017 .
[15] Mohsen Guizani,et al. Multiple Moving Targets Surveillance Based on a Cooperative Network for Multi-UAV , 2018, IEEE Communications Magazine.
[16] Steffen Staab,et al. Web Science , 2013, Informatik-Spektrum.
[17] Joao P. Hespanha,et al. GeoTrack: bio-inspired global video tracking by networks of unmanned aircraft systems , 2009, Defense + Commercial Sensing.
[18] Carlos C. Solari. Designing for security , 2007, Bell Labs Technical Journal.
[19] Eray Yağdereli,et al. A study on cyber-security of autonomous and unmanned vehicles , 2015 .
[20] J. S. Warner,et al. A Simple Demonstration that the Global Positioning System ( GPS ) is Vulnerable to Spoofing , 2012 .
[21] 韓國航空大學 航空 械工學科. 美聯邦航空廳(Federal Aviation Administration)의 航空機 製作檢査 制度의 現況 , 1979 .
[22] Alvaro A. Cárdenas,et al. Understanding Security Threats in Consumer Drones Through the Lens of the Discovery Quadcopter Family , 2017, IoT S&P@CCS.
[23] Han-Lim Choi,et al. Distributed Observes for Cyberattack Detection and Isolation in Formation-Flying Unmanned Aerial Vehicles , 2017, J. Aerosp. Inf. Syst..
[24] E. Rogers,et al. Diffusion of innovations , 1964, Encyclopedia of Sport Management.
[25] Todd E. Humphreys,et al. Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle , 2012 .
[26] Philippe Owezarski,et al. Generic and autonomous system for airborne networks cyber-threat detection , 2013, 2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC).
[27] Fernando Trujano,et al. Security Analysis of DJI Phantom 3 Standard , 2016 .
[28] Kenneth Kuhn. Small Unmanned Aerial System Certification and Traffic Management Systems , 2017 .
[29] Robert P Otto. Small Unmanned Aircraft Systems (SUAS) Flight Plan: 2016-2036. Bridging the Gap Between Tactical and Strategic , 2016 .
[30] Allan Tomlinson,et al. Survey on Security Challenges for Swarm Robotics , 2009, 2009 Fifth International Conference on Autonomic and Autonomous Systems.
[31] Robin R. Murphy,et al. A review on cybersecurity vulnerabilities for unmanned aerial vehicles , 2017, 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR).
[32] Adi Shamir,et al. IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[33] Kang Yen,et al. Adaptive Neural Network Based Fault Detection Design for Unmanned Quadrotor under Faults and Cyber Attacks , 2017, 2017 25th International Conference on Systems Engineering (ICSEng).
[34] Mansoor Alam,et al. Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation , 2015, EAI Endorsed Trans. Scalable Inf. Syst..
[35] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[36] M. Iansiti,et al. The Truth about Blockchain , 2017 .
[37] Ismail Güvenç,et al. Detection, Tracking, and Interdiction for Amateur Drones , 2018, IEEE Communications Magazine.
[38] Kim Hartmann,et al. UAV exploitation: A new domain for cyber power , 2016, 2016 8th International Conference on Cyber Conflict (CyCon).
[39] Ahmad Y. Javaid,et al. Analysis of Global Positioning System-based attacks and a novel Global Positioning System spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation , 2017, Simul..
[40] Jon Schmid,et al. Beyond National Innovation Systems: Incentives and China’s Innovation Performance , 2017 .
[41] Sven Dietrich,et al. SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster , 2011, WOOT.
[42] Sait Murat Giray. Anatomy of unmanned aerial vehicle hijacking with signal spoofing , 2013, 2013 6th International Conference on Recent Advances in Space Technologies (RAST).