References
- http://jammers4u.com/drones-jammer
- https://www.usnews.com/news/national-news/articles/2017-11-10/homeland-security-warns-of-weaponized-drones-as-terror-threat
- http://www.thedrive.com/the-war-zone/17527/russia-is-trying-to-link-the-drone-swarm-attack-in-syria-to-a-us-p-8-patrol-plane
- https://warontherocks.com/2017/01/the-drone-threat-to-israeli-national-security/
- J. S. Pleban, R. Band & R. Creutzburg. (2014). Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy, SPIE 9030, Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014, DOI: 10.1117/12.2044868
- S. H. Na, J. C. Han & B. J. Ahn. (2014), A Study on the Defence for Deauthentication Attacks in Wi-Fi Network, Korea Communication Society Conference, 631-632.
- https://github.com/markszabo/drone-hacking/blob/master/README.md
- V. Dey, V. Pudi, A. Chattopadhyay, Y. Elovici. (2018). securing vulnerabilities of unmanned aerial vehicles and countermeasures: an experimental study, 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), 398-403. DOI: 10.1109/VLSID.2018.97
- J. H. Cheon, K. Han, S. M. Hong, H. J. Kim, J. S. Kim, S. S. Kim, H. S. Seo, H. B. Shim & Y. S. Song. (2018). Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption, IEEE Access 6, 24325-24339. DOI: 10.1109/ACCESS.2018.2819189
- A. Sehrawat, T A. Choudhury & G. Raj. (2017). Surveillance drone for disaster management and military security, International Conference on Computing, Communication and Automation (ICCCA) 2017,470-475. DOI: 10.1109/CCAA.2017.8229846
- P. Blank, S. Kirrane & S. Spiekermann. (2018). Privacy aware restricted areas for unmanned aerial systems, Journal of IEEE Security & Privacy: 16(2), 70-79. DOI: 10.1109/MSP.2018.1870868
- E. Vattapparamban, I. Guvenc, A. I. Yurekli, K. Akkaya, S. Uluagac. (2016). Drones for smart cities: Issues in cybersecurity, privacy, and public safety, IWCMC2016;216-221. DOI: 10.1109/IWCMC.2016.7577060
- P. Perazzo, K. Ariyapala, Z. Conti, G. Dini. (2015). The verifier bee: A path planner for drone based secure location verification, IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM),1-9. DOI: 10.1109/WoWMoM.2015.7158150
- S. G. Manyam, D. W. Casbeer, S. Manickam. (2017). Optimizing multiple UAV cooperative ground attack missions, International conference on Unmanned Aircraft Systems (ICUAS), 1572-1578. DOI: 10.1109/ICUAS.2017.7991396
- P. T. Jardine, S. Givigi, A. Noureldin. (2015). Incorporating feedback predications for optimized UAV attack mission planning, 23rd Mediterranean Conference on Control and Automation (MED);740-746. DOI: 10.1109/MED.2015.7158834
- S. H. Rubin, W. K. Grefe, T. B. Tebibel, S. C. Chen, M. L. Shyu, K. S. Simonsen. (2017). Cyber Secure UAV Communications using heuristically inferred stochastic grammars and hard real time adaptive waveform synthesis and evolution, IEEE Computer society 2017, 9-15, DOI: http://doi.ieeecomputersociety.org/10.1109/IRI.2017.56
- Y. Su. Jung & Y. H. Yon. (2018). User Privacy protection model though enhancing the administrator role in the cloud environment, Journal of Convergence for Information Technology: 8(3), 79-84. DOI: https://doi.org/10.22156/CS4SMB.2018.8.3.079
- H. J. Mun, (2018). Biometric Information and OTP based on authentiction mechanism using blockchain, Journal of convergence for Information Technology: 8(3), 85-90, DOI: https://doi.org/10.22156/CS4SMB.2018.8.3.085
- C. J. Chae, S. K. Han, H. J. Cho, (2016). Security vulnerability and countermeasures in smart farm, Journal of Digital Convergence: 14(11), 313-318, DOI: http://dx.doi.org/10.14400/JDC.2016.14.11.313
- D. H. Choi, J. O. Park, (2015), Security tendency analysis techniques through machine learning algorithm applications in big data environments, Journal of Digital Convergence: 13(9), 269-276, DOI: http://dx.doi.org/10.14400/JDC.2015.13.9.269