[HTML][HTML] Unmanned aerial vehicles: A review

AA Laghari, AK Jumani, RA Laghari, H Nawaz - Cognitive Robotics, 2023 - Elsevier
Abstract The lightweight Unmanned Aerial Vehicle (UAV) flight activities are constrained,
particularly in the UAV range or activity span and perseverance, by the strategic …

Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication

HPD Nguyen, DD Nguyen - Development and Future of Internet of Drones …, 2021 - Springer
With the boost of technologies in computing, the Internet of things (IoT), and Information and
Communication Technologies (ICT), the demand for using drones has been increased in …

[HTML][HTML] Internet of drones intrusion detection using deep learning

RA Ramadan, AH Emara, M Al-Sarem, M Elhamahmy - Electronics, 2021 - mdpi.com
Flying Ad Hoc Network (FANET) or drones' technologies have gained much attraction in the
last few years due to their critical applications. Therefore, various studies have been …

Cybersecurity in unmanned aerial vehicles (UAVs)

B Ly, R Ly - Journal of cyber security technology, 2021 - Taylor & Francis
For the investigation, the security factor is crucial as Unmanned Aerial Vehicles (UAVs)
become prevalent, and their operational range grows exponentially. This research is a …

DronLomaly: runtime detection of anomalous drone behaviors via log analysis and deep learning

LK Shar, W Minn, NBD Ta, J Fan… - 2022 29th Asia …, 2022 - ieeexplore.ieee.org
Drones are increasingly popular and getting used in a variety of missions such as area
surveillance, pipeline inspection, cinematography, etc. While the drone is conducting a …

A Vehicle-mounted radar-vision system for precisely positioning clustering UAVs

G Wu, F Zhou, KK Wong, XY Li - IEEE Journal on Selected …, 2024 - ieeexplore.ieee.org
The clustering unmanned aerial vehicles (UAVs) positioning is significant for preventing
unauthorized clustering UAVs from causing physical and informational damages. However …

A novel intrusion detection system based on artificial neural network and genetic algorithm with a new dimensionality reduction technique for UAV communication

K Cengiz, S Lipsa, RK Dash, N Ivković… - IEEE access, 2024 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are increasingly being deployed in crucial missions for
the armed forces, law enforcement, industrial control monitoring, and other sectors …

An efficient cyber defense framework for UAV-Edge computing network

H Sedjelmaci, A Boudguiga, IB Jemaa, SM Senouci - Ad Hoc Networks, 2019 - Elsevier
Abstract Mobile Edge Computing (MEC) is usually deployed in energy and delay
constrained networks, such as internet of things networks and transportation systems to …

Malware on internet of uavs detection combining string matching and fourier transformation

W Niu, X Zhang, X Zhang, X Du… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Advanced persistent threat (APT), with intense penetration, long duration, and high
customization, has become one of the most grievous threats to cybersecurity. Furthermore …

Unmanned aerial vehicles: Vulnerability to cyber attacks

S Dahiya, M Garg - Proceedings of UASG 2019: Unmanned Aerial System …, 2020 - Springer
With the increase of technological capabilities of automated systems, the use of unmanned
aerial vehicles (UAVs) has also increased in many military and civilian applications. UAVs …