Acknowledgement
본 논문은 2023년 정부(방위사업청)의 재원으로 국방과학연구소의 지원을 받아 수행된 미래도전국방기술 연구개발사업임(No. 915024201)
References
- Restas, Agoston. "Drone applications for supporting disaster management." World Journal of Engineering and Technology 3.03 (2015): 316.
- Vashisht, Sahil, Sushma Jain, and Gagangeet Singh Aujla. "MAC protocols for unmanned aerial vehicle ecosystems: Review and challenges." Computer Communications 160 (2020): 443-463. https://doi.org/10.1016/j.comcom.2020.06.011
- Culver, Kathleen Bartzen. "From battlefield to newsroom: Ethical implications of drone technology in journalism." Journal of mass media ethics 29.1 (2014): 52-64. https://doi.org/10.1080/08900523.2013.829679
- Alwateer, Majed, Seng W. Loke, and Niroshinie Fernando. "Enabling drone services: drone crowd sourcing and drone scripting." IEEE access 7 (2019): 110035-110049. https://doi.org/10.1109/ACCESS.2019.2933234
- Rodday, Nils Miro, Ricardo de O. Schmidt, and Aiko Pras. "Exploring security vulnerabilities of unmanned aerial vehicles." NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2016.
- 이우진, 서경덕, and 채병민. "오픈소스 활용 드론에 대한 보안 위협과 Telemetry Hijacking 을 이용한 군용 드론 공격 시나리오 연구." 융합보안논문지 20.4 (2020): 103-112. https://doi.org/10.33778/kcsa.2020.20.4.103
- Alladi, Tejasvi, et al. "Consumer IoT: Security vulnerability case studies and solutions." IEEE Consumer Electronics Magazine 9.2 (2020): 17-25. https://doi.org/10.1109/MCE.2019.2953740
- Choi, Yun-Jeong, and Seung-Soo Park. "Reinforcement mining method for anomaly detection and misuse detection using post-processing and training method." Proceedings of the Korean Information Science Society Conference. Korean Institute of Information Scientists and Engineers, 2006.
- 김태희, 강승호. "실시간 탐지를 위한 인공신경망 기반의 네트워크 침입탐지 시스템." 융합보안논문지 17.1 (2017): 31-38.
- Choi, S. O., and W. N. Kim. "Control system intrusion detection system technology research trend." Rev. KIISC 24.5 (2014): 7-14.
- Meier, Lorenz, Dominik Honegger, and Marc Pollefeys. "PX4: A node-based multithreaded open source robotics framework for deeply embedded platforms." 2015 IEEE international conference on robotics and automation (ICRA). IEEE, 2015.
- Lin, Tzu-Chiao, et al. "Realization of Intelligent-Inspection Functions of UAV in Transmission Grids Using Machine Learning." 2023 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE, 2023.
- Dardoize, Tristan, et al. "Implementation of ground control system for autonomous multi-agents using qgroundcontrol." 2019 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED UAS). IEEE, 2019.
- Khan, Navid Ali, Sarfraz Nawaz Brohi, and N. Z. Jhanjhi. "UAV's applications, architecture, security issues and attack scenarios: A survey." Intelligent Computing and Innovation on Data Science: Proceedings of ICTIDS 2019. Springer Singapore, 2020.
- Marty, Joseph A. Vulnerability analysis of the mavlink protocol for command and control of unmanned aircraft. AIR FORCE INSTITUTE OF TECHNOLOGY WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF ENGINEERING AND MANAGEMENT, 2013.
- Bae, Myeong-Jin, and Seong-Il Kim. "항공 드론지상 제어 시스템 기술 동향." Korea Multimedia Society 20.1_2 (2016): 22-28.
- Wandarosanza, Rendy, Bambang Riyanto Trilaksono, and Egi Hidayat. "Hardware-In-the-Loop Simulation of UAV hexacopter for Chemical Hazard monitoring mission." 2016 6th International Conference on System Engineering and Technology (ICSET). IEEE, 2016.
- Hentati, Aicha Idriss, et al. "Simulation tools, environments and frameworks for UAV systems performance analysis." 2018 14th international wireless communications & mobile computing conference (iwcmc). IEEE, 2018.
- Bacic, Marko. "On hardware-in-the-loop simulation." Proceedings of the 44th IEEE Conference on Decision and Control. IEEE, 2005.
- 김한석, and 이수진. "기계학습 기반 랜섬웨어 공격 탐지를 위한 효과적인 특성 추출기법 비교분석." 융합보안논문지 23.1 (2023): 117-123.
- Muller, Matthew P., et al. "Can routine laboratory tests discriminate between severe acute respiratory syndrome and other causes of community-acquired pneumonia?." Clinical infectious diseases 40.8 (2005): 1079-1086. https://doi.org/10.1086/428577