Anatomy of unmanned aerial vehicle hijacking with signal spoofing
暂无分享,去创建一个
[1] Samsung Lim,et al. Legal and Ethical Implications of GPS Vulnerabilities , 2009 .
[2] Srdjan Capkun,et al. On the requirements for successful GPS spoofing attacks , 2011, CCS '11.
[3] Magnus Egerstedt,et al. Optimal multi-UAV convoy protection , 2009, 2009 Second International Conference on Robot Communication and Coordination.
[4] C. Constantinides,et al. Security challenges in UAV development , 2008, 2008 IEEE/AIAA 27th Digital Avionics Systems Conference.
[5] Eddy Deligne. ARDrone corruption , 2011, Journal in Computer Virology.
[6] David Glade,et al. Unmanned Aerial Vehicles: Implications for Military Operations , 2012 .
[7] Panagiotis Papadimitratos,et al. GNSS-based Positioning: Attacks and countermeasures , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[8] Washington Y. Ochieng,et al. GPS Integrity and Potential Impact on Aviation Safety , 2003, Journal of Navigation.
[9] Lijun Qian,et al. Quickest detection of GPS spoofing attack , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[10] Gustavus J. Simmons,et al. Symmetric and Asymmetric Encryption , 1979, CSUR.
[11] J. Carroll. Vulnerability Assessment of the U.S. Transportation Infrastructure that Relies on the Global Positioning System , 2003 .
[12] J. S. Warner,et al. GPS Spoofing Countermeasures , 2003 .
[13] J. S. Warner,et al. A Simple Demonstration that the Global Positioning System ( GPS ) is Vulnerable to Spoofing , 2012 .
[14] David Hambling. GPS fail: how a little black box could cause chaos , 2011 .
[15] J. Karl Hedrick,et al. Autonomous UAV path planning and estimation , 2009, IEEE Robotics & Automation Magazine.
[16] Tai-Myoung Chung,et al. Cyber military strategy for cyberspace superiority in cyber warfare , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[17] Sven Dietrich,et al. SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster , 2011, WOOT.
[18] David Brumley,et al. GPS software attacks , 2012, CCS.
[19] John Fagan,et al. Countermeasures for GPS Signal Spoofing , 2005 .
[20] W.R. Dufrene. Mobile military security with concentration on unmanned aerial vehicles , 2005, 24th Digital Avionics Systems Conference.
[21] D. Hoey,et al. Civil GPS Systems and Potential Vulnerabilities , 2005 .
[22] P. Papadimitratos,et al. Protection and fundamental vulnerability of GNSS , 2008, 2008 IEEE International Workshop on Satellite and Space Communications.
[23] Daniel P. Shepard,et al. Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks , 2012 .
[24] T. Humphreys,et al. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer , 2008 .
[25] Sanguk Lee,et al. Analysis of effect of spoofing signal in GPS receiver , 2012, 2012 12th International Conference on Control, Automation and Systems.
[26] Seon-Ho Park,et al. Active Cyber Attack Model for Network System's Vulnerability Assessment , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).
[27] T. Humphreys. STATEMENT ON THE VULNERABILITY OF CIVIL UNMANNED AERIAL VEHICLES AND OTHER SYSTEMS TO CIVIL GPS , 2012 .
[28] Ajay Lele,et al. Aerial Terrorism and the Threat from Unmanned Aerial Vehicles , 2010 .
[29] Weiqing Sun,et al. Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).