Hartmann et al., 2013 - Google Patents
The vulnerability of UAVs to cyber attacks-An approach to the risk assessmentHartmann et al., 2013
View PDF- Document ID
- 9777758897731713127
- Author
- Hartmann K
- Steup C
- Publication year
- Publication venue
- 2013 5th international conference on cyber conflict (CYCON 2013)
External Links
Snippet
By 2012 the US military had increased its investment in research and production of unmanned aerial vehicles (UAVs) from 2.3billionin2008to 4.2 billion 1. Currently UAVs are used for a wide range of missions such as border surveillance, reconnaissance …
- 238000004891 communication 0 abstract description 60
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hartmann et al. | The vulnerability of UAVs to cyber attacks-An approach to the risk assessment | |
Kim et al. | Cyber attack vulnerabilities analysis for unmanned aerial vehicles | |
He et al. | A friendly and low-cost technique for capturing non-cooperative civilian unmanned aerial vehicles | |
Nalepka et al. | Automated aerial refueling: extending the effectiveness of UAVs | |
Harrison et al. | Defense against the dark arts in space: Protecting space systems from counterspace weapons | |
He et al. | How to govern the non-cooperative amateur drones? | |
Nichols et al. | Counter unmanned aircraft systems technologies and operations | |
Siddappaji et al. | Role of cyber security in drone technology | |
Javaid | Cyber security threat analysis and attack simulation for unmanned aerial vehicle network | |
McNeely et al. | Detection of UAV hijacking and malfunctions via variations in flight data statistics | |
Mohan | Cybersecurity in drones | |
Adnan et al. | Drone use in military and civilian application: Risk to national security | |
Chae et al. | Commercial Fixed-Wing Drone Redirection System using GNSS Deception | |
Podins et al. | The Vulnerability of UAVs to Cyber Attacks-An Approach to the Risk Assessment | |
Ismail et al. | A review on Unmanned Aerial Vehicle (UAV) threats assessments | |
Kozak et al. | The use of drones in military conflict | |
Averyanova et al. | A study on unmanned aerial system vulnerabilities for durability enhancement | |
Carter et al. | Understanding hostile use and cyber-vulnerabilities of uas: Components, autonomy v automation, sensors, saa, scada and cyber attack taxonomy | |
Gormley | Enriching expectations: 11 september's lessons for missile defence | |
Nichols et al. | Space Based Platforms and Critical Infrastructure Vulnerability (McCreight) | |
Mlezivova | Unmanned aircraft as a subject of safety and security | |
Xie et al. | Cybersecurity trends in low-altitude air traffic management | |
Alotaibi et al. | Ubiquitous Unmanned Aerial Vehicles (UAVs): A Comprehensive Review | |
Lattimore | Unmanned aerial system cybersecurity risk management decision matrix for tactical operators | |
Donkal et al. | Digital Twin and the Detection and Location of DoS Attacks to Secure Cyber-Physical UAS |