How to Detect Cyber-Attacks in Unmanned Aerial Vehicles Network?
暂无分享,去创建一个
Mohamed Ayoub Messous | Sidi-Mohammed Senouci | Hichem Sedjelmaci | S. Senouci | Hichem Sedjelmaci | M. Messous
[1] Xiaodong Lin,et al. SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks , 2009, 2010 Proceedings IEEE INFOCOM.
[2] Xinming Ou,et al. Prioritizing intrusion analysis using Dempster-Shafer theory , 2011, AISec '11.
[3] Inseok Hwang,et al. Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles , 2012, Infotech@Aerospace.
[4] Daniel P. Shepard,et al. Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks , 2012 .
[5] Jörg Widmer,et al. Contention-based forwarding for mobile ad hoc networks , 2003, Ad Hoc Networks.
[6] Kim Hartmann,et al. The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[7] Weiqing Sun,et al. Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[8] Gonzalo Pajares,et al. Overview and Current Status of Remote Sensing Applications Based on Unmanned Aerial Vehicles (UAVs) , 2015 .
[9] S Bhattacharya,et al. Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.
[10] Sidi-Mohammed Senouci,et al. Efficient data dissemination in cooperative vehicular networks , 2013, Wirel. Commun. Mob. Comput..
[11] Sidi-Mohammed Senouci,et al. An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..
[12] Sidi-Mohammed Senouci,et al. Network connectivity and area coverage for UAV fleet mobility model with energy constraint , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[13] Ing-Ray Chen,et al. Specification based intrusion detection for unmanned aircraft systems , 2012, Airborne '12.
[14] Zdobysław Goraj,et al. Security analysis of uav radio communication system , 2009 .
[15] Christian Bettstetter,et al. Channel measurements over 802.11a-based UAV-to-ground links , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[16] Javier Gozálvez,et al. Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks , 2013, Comput. Networks.
[17] Mosa Ali Abu-Rgheff,et al. An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.