[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Hartmann et al., 2013 - Google Patents

The vulnerability of UAVs to cyber attacks-An approach to the risk assessment

Hartmann et al., 2013

View PDF
Document ID
9777758897731713127
Author
Hartmann K
Steup C
Publication year
Publication venue
2013 5th international conference on cyber conflict (CYCON 2013)

External Links

Snippet

By 2012 the US military had increased its investment in research and production of unmanned aerial vehicles (UAVs) from 2.3billionin2008to 4.2 billion 1. Currently UAVs are used for a wide range of missions such as border surveillance, reconnaissance …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Hartmann et al. The vulnerability of UAVs to cyber attacks-An approach to the risk assessment
Kim et al. Cyber attack vulnerabilities analysis for unmanned aerial vehicles
He et al. A friendly and low-cost technique for capturing non-cooperative civilian unmanned aerial vehicles
Nalepka et al. Automated aerial refueling: extending the effectiveness of UAVs
Harrison et al. Defense against the dark arts in space: Protecting space systems from counterspace weapons
He et al. How to govern the non-cooperative amateur drones?
Nichols et al. Counter unmanned aircraft systems technologies and operations
Siddappaji et al. Role of cyber security in drone technology
Javaid Cyber security threat analysis and attack simulation for unmanned aerial vehicle network
McNeely et al. Detection of UAV hijacking and malfunctions via variations in flight data statistics
Mohan Cybersecurity in drones
Adnan et al. Drone use in military and civilian application: Risk to national security
Chae et al. Commercial Fixed-Wing Drone Redirection System using GNSS Deception
Podins et al. The Vulnerability of UAVs to Cyber Attacks-An Approach to the Risk Assessment
Ismail et al. A review on Unmanned Aerial Vehicle (UAV) threats assessments
Kozak et al. The use of drones in military conflict
Averyanova et al. A study on unmanned aerial system vulnerabilities for durability enhancement
Carter et al. Understanding hostile use and cyber-vulnerabilities of uas: Components, autonomy v automation, sensors, saa, scada and cyber attack taxonomy
Gormley Enriching expectations: 11 september's lessons for missile defence
Nichols et al. Space Based Platforms and Critical Infrastructure Vulnerability (McCreight)
Mlezivova Unmanned aircraft as a subject of safety and security
Xie et al. Cybersecurity trends in low-altitude air traffic management
Alotaibi et al. Ubiquitous Unmanned Aerial Vehicles (UAVs): A Comprehensive Review
Lattimore Unmanned aerial system cybersecurity risk management decision matrix for tactical operators
Donkal et al. Digital Twin and the Detection and Location of DoS Attacks to Secure Cyber-Physical UAS