Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation
暂无分享,去创建一个
Victor A. Skormin | Daniel Muller | Zachary Birnbaum | Edward O'Brien | Andrey M. Dolgikh | Christina Stracquodaine | V. Skormin | Zachary Birnbaum | A. Dolgikh | Edward O'Brien | Daniel Muller | Christina Stracquodaine
[1] D. G. Fisher,et al. Improved least squares identification , 1987 .
[2] Jeffrey Keller,et al. Aircraft Flight Envelope Determination using Upset Detection and Physical Modeling Methods , 2009 .
[3] Jianhua Ge,et al. Methodologies for Adaptive Flight Envelope Estimation and Protection , 2009 .
[4] Weiqing Sun,et al. Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[5] Gary J. Balas,et al. Model-Based and Data-Driven Fault Detection Performance for a Small UAV , 2013, IEEE/ASME Transactions on Mechatronics.
[6] Daniel P. Shepard,et al. Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks , 2012 .
[7] Weiyi Liu,et al. Numerical Analysis of Cyberattacks on Unmanned Aerial Systems , 2012, Infotech@Aerospace.
[8] Ing-Ray Chen,et al. Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[9] Timothy X. Brown,et al. Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..
[10] Nhan T. Nguyen,et al. Hybrid Intelligent Flight Control with Adaptive Learning Parameter Estimation , 2009, J. Aerosp. Comput. Inf. Commun..
[11] Inseok Hwang,et al. Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles , 2012, Infotech@Aerospace.
[12] Dennis K. Nilsson,et al. A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure , 2009, J. Networks.
[13] George M Siouris,et al. Missile Guidance and Control Systems , 2004 .
[14] D. Hazry,et al. A simple approach on implementing IMU sensor fusion in PID controller for stabilizing quadrotor flight control , 2011, 2011 IEEE 7th International Colloquium on Signal Processing and its Applications.
[15] Calton Pu,et al. Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[16] G. Conte,et al. An Integrated UAV Navigation System Based on Aerial Image Matching , 2008, 2008 IEEE Aerospace Conference.
[17] Victor A. Skormin,et al. Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks , 2012, MMM-ACNS.