UAV 스마트 디바이스 지상 제어 스테이션 사이버 보안 위협 모델

  • 발행 : 2017.07.31

초록

키워드

참고문헌

  1. Dalton, W., "RIM's BlackBerry phones may lose public sector monopoly," Retrieved 5/24/13, 2013, from http://www.itproportal.com/2012/08/24/rims-blackberry-phones-maylose-publicsector-monopoly-/, 2012.
  2. McGarry, B., "Pentagon Will Open Networks to Apple, Google Devices in 2014," Retrieved 3/21/13, 2013, from http://www.bloomberg.com/news/2013-02-26/pentagon-will-opennetworksto-apple-google-devices-in-2014.html, 2013.
  3. Gorman, S., et al., "Insurgents Hack U.S. Drones," The Wall Street Journal, WSJ.com, 2009.
  4. Nguyen, T. C., "Virus attacks military drones, exposes vulnerabilities." Retrieved from http://www.smartplanet.com/blog/thinking-tech/virus-attacks-militarydrones-exposes-vulnerabilities/8858, 2011.
  5. Paganini, P., "Hacking Drones Overview of the Main Threats," Retrieved from http://resources.infosecinstitute.com/hacking-drones-overviewof-themain-threats/, 2013.
  6. Nguyen, T. C., "How college students hijacked a government spy drone," Retrieved from http://www.smartplanet.com/blog/thinking-tech/how-college-studentshijacked- a-government-spy-drone/12214, 2012.
  7. Munoz, C., "Report: DOD opens door to Apple, Android-built systems," Retrieved from http://thehill.com/blogs/defconhill/ industry/265395-report-dod-opens-door-to-apple-android-builtsystems, 2013.
  8. Oh, T., et al., "Best security practices for android, blackberry, and iOS," Enabling Technologies for Smartphone and Internet of Things (ETSIoT), 2012.
  9. Goodwin, B., "IT manufacturers fight cyber espionage risks in the supply chain," Retrieved from http://www.computerweekly.com/news/2240181320/IT-manfucturerstackle-cyber-espionage-risks-in-the-supply-chain, 2013.