Using quadrocopter as a pentest tool
Abstract
References
Index Terms
- Using quadrocopter as a pentest tool
Recommendations
Control and stabilization applied to micro quadrotor AR.Drone
ATACCS '13: Proceedings of the 3rd International Conference on Application and Theory of Automation in Command and Control SystemsThe research an autonomous miniature flying robots has intensified considerably, thanks to the recent growth of civil and military interest in Unmanned Aerial vehicles (UAV). In this paper a simple control algorithm to stabilize the attitude of a ...
Quadrocopter control using an on-board video system with off-board processing
In recent years, Unmanned Aerial Vehicles (UAVs) have gained increasing popularity. These vehicles are employed in many applications, from military operations to civilian tasks. One of the main fields of UAV research is the vehicle positioning problem. ...
Navigation and Cooperative Control Using the AR.Drone Quadrotor
This paper presents a computational system designed to perform autonomous indoor flights using low-cost equipment. Depending on the mission to be accomplished, one or two Parrot AR.Drone 2.0 quadrotors are supposed to fly in a three-dimensional ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Atilla Elçi,
- Manoj Singh Gaur,
- Mehmet A. Orgun,
- Oleg B. Makarevich
Sponsors
- Macquarie U., Austarlia
- MNIT: Malaviya National Institute of Technology
- Aksaray Univ.: Aksaray University
- SFedU: Southern Federal University
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Extended-abstract
Conference
- MNIT
- Aksaray Univ.
- SFedU
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 463Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in