Eyes in the sky: drones applications in the built environment under climate change challenges
N Bayomi, JE Fernandez - Drones, 2023 - mdpi.com
This paper reviews the diverse applications of drone technologies in the built environment
and their role in climate change research. Drones, or unmanned aerial vehicles (UAVs) …
and their role in climate change research. Drones, or unmanned aerial vehicles (UAVs) …
Security in internet of drones: A comprehensive review
Abstract Unmanned Aerial Vehicles (UAVs), also called drones, are used for various
applications with two basic classifications: civilian and military drones. Civilian drones are …
applications with two basic classifications: civilian and military drones. Civilian drones are …
Ai based drones for security concerns in smart cities
The concept of a smart city has attracted the attention of all corners of the world. It updated
with new technologies like AI, Blockchain, IoT, Drones, and many other things. Security in …
with new technologies like AI, Blockchain, IoT, Drones, and many other things. Security in …
Global analysis of active defense technologies for unmanned aerial vehicle
C Lyu, R Zhan - IEEE Aerospace and Electronic Systems …, 2022 - ieeexplore.ieee.org
The main purpose of this article is to enhance the systematicness, comprehensiveness, and
profundity of the counter-unmanned aerial system (C-UAS) theoretical system, laying a …
profundity of the counter-unmanned aerial system (C-UAS) theoretical system, laying a …
GPS Spoofing attacks in FANETs: A systematic literature review
Flying Ad-Hoc Networks (FANETs) are groups of UAVs connected in an Ad-Hoc manner to
accomplish a common mission. The widespread acceptance of UAVs due to their low cost …
accomplish a common mission. The widespread acceptance of UAVs due to their low cost …
A GNSS instrumentation covert directional spoofing algorithm for UAV equipped with tightly-coupled GNSS/IMU
Y Gao, G Li - IEEE Transactions on Instrumentation and …, 2023 - ieeexplore.ieee.org
Measurement and navigation users cannot operate without the positioning, navigation, and
timing (PNT) service provided by the global navigation satellite system (GNSS) …
timing (PNT) service provided by the global navigation satellite system (GNSS) …
GPS location spoofing attack detection for enhancing the security of autonomous vehicles
Attacks on the GPS receiver of Connected and Autonomous Vehicles (CAV) and specifically
GPS location spoofing is of great concern for the automotive industry as the attacker can …
GPS location spoofing is of great concern for the automotive industry as the attacker can …
Protecting autonomous UAVs from GPS spoofing and jamming: A comparative analysis of detection and mitigation techniques
PC Joeaneke, OO Val, OO Olaniyi… - Journal of …, 2024 - eprints.classicrepository.com
This study investigates the vulnerabilities of unmanned aerial vehicles (UAVs) to GPS
spoofing and jamming, addressing three key research questions:(1) What are the common …
spoofing and jamming, addressing three key research questions:(1) What are the common …
Communications security in Industry X: A survey
Industry 4.0 is moving towards deployment using 5G as one of the main underlying
communication infrastructures. Thus, the vision of the Industry of the future is getting more …
communication infrastructures. Thus, the vision of the Industry of the future is getting more …
Demonstration of enhanced long-range cosmic time synchronization for wireless and secure dissemination of standard time
HKM Tanaka - Scientific Reports, 2024 - nature.com
Accurate traceability of time is prerequisite to the proper functioning of many necessary
aspects of our modern life including making financial transactions, managing automated …
aspects of our modern life including making financial transactions, managing automated …