Software/Hardware-in-the-Loop Analysis of Cyberattacks on Unmanned Aerial Systems
暂无分享,去创建一个
Weiyi Liu | Inseok Hwang | James Goppert | Andrew Shull | Nandagopal Sathyamoorthy | Hal Aldridge | Inseok Hwang | H. Aldridge | James M. Goppert | Weiyi Liu | A. Shull | Nandagopal Sathyamoorthy
[1] Matt Bishop,et al. A Taxonomy of Buffer Overflow Characteristics , 2012, IEEE Transactions on Dependable and Secure Computing.
[2] Dominick Andrisani,et al. Independent ADS-B Verification and Validation , 2005 .
[3] Inseok Hwang,et al. A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.
[4] Weiyi Liu,et al. Cyber Security Analysis for State Estimators in Air Traffic Control Systems , 2012 .
[5] Jared D. DeMott,et al. Fuzzing for Software Security Testing and Quality Assurance , 2008 .
[6] Ayan Banerjee,et al. Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber–Physical Systems , 2012, Proceedings of the IEEE.
[7] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[8] Dennis K. Nilsson,et al. A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure , 2009, J. Networks.
[9] Inseok Hwang,et al. Analysis of Optimal False Data Injection Attacks in Unmanned Aerial Systems , 2013 .
[10] Inseok Hwang,et al. Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles , 2012, Infotech@Aerospace.
[11] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.