[HTML][HTML] Unmanned aerial vehicles: A review
Abstract The lightweight Unmanned Aerial Vehicle (UAV) flight activities are constrained,
particularly in the UAV range or activity span and perseverance, by the strategic …
particularly in the UAV range or activity span and perseverance, by the strategic …
Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication
HPD Nguyen, DD Nguyen - Development and Future of Internet of Drones …, 2021 - Springer
With the boost of technologies in computing, the Internet of things (IoT), and Information and
Communication Technologies (ICT), the demand for using drones has been increased in …
Communication Technologies (ICT), the demand for using drones has been increased in …
[HTML][HTML] Internet of drones intrusion detection using deep learning
RA Ramadan, AH Emara, M Al-Sarem, M Elhamahmy - Electronics, 2021 - mdpi.com
Flying Ad Hoc Network (FANET) or drones' technologies have gained much attraction in the
last few years due to their critical applications. Therefore, various studies have been …
last few years due to their critical applications. Therefore, various studies have been …
Cybersecurity in unmanned aerial vehicles (UAVs)
For the investigation, the security factor is crucial as Unmanned Aerial Vehicles (UAVs)
become prevalent, and their operational range grows exponentially. This research is a …
become prevalent, and their operational range grows exponentially. This research is a …
DronLomaly: runtime detection of anomalous drone behaviors via log analysis and deep learning
Drones are increasingly popular and getting used in a variety of missions such as area
surveillance, pipeline inspection, cinematography, etc. While the drone is conducting a …
surveillance, pipeline inspection, cinematography, etc. While the drone is conducting a …
A Vehicle-mounted radar-vision system for precisely positioning clustering UAVs
The clustering unmanned aerial vehicles (UAVs) positioning is significant for preventing
unauthorized clustering UAVs from causing physical and informational damages. However …
unauthorized clustering UAVs from causing physical and informational damages. However …
A novel intrusion detection system based on artificial neural network and genetic algorithm with a new dimensionality reduction technique for UAV communication
Unmanned aerial vehicles (UAVs) are increasingly being deployed in crucial missions for
the armed forces, law enforcement, industrial control monitoring, and other sectors …
the armed forces, law enforcement, industrial control monitoring, and other sectors …
An efficient cyber defense framework for UAV-Edge computing network
H Sedjelmaci, A Boudguiga, IB Jemaa, SM Senouci - Ad Hoc Networks, 2019 - Elsevier
Abstract Mobile Edge Computing (MEC) is usually deployed in energy and delay
constrained networks, such as internet of things networks and transportation systems to …
constrained networks, such as internet of things networks and transportation systems to …
Malware on internet of uavs detection combining string matching and fourier transformation
W Niu, X Zhang, X Zhang, X Du… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Advanced persistent threat (APT), with intense penetration, long duration, and high
customization, has become one of the most grievous threats to cybersecurity. Furthermore …
customization, has become one of the most grievous threats to cybersecurity. Furthermore …
Unmanned aerial vehicles: Vulnerability to cyber attacks
With the increase of technological capabilities of automated systems, the use of unmanned
aerial vehicles (UAVs) has also increased in many military and civilian applications. UAVs …
aerial vehicles (UAVs) has also increased in many military and civilian applications. UAVs …