1 |
Hayat, S., Yanmaz, E., Muzaffar, R., "Survey on unmanned aerial vehicle networks for civil applications: A communications viewpoint," IEEE Communications Surveys Tutorials, 18(4), pp. 2624-2661, 2016.
DOI
|
2 |
Meier, L., "Dynamic Robot Architecture for Robust Realtime Computer Vision," Ph.D. thesis ETH Zurich, 2017.
|
3 |
Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D., "Cloud-based cyberphysical intrusion detection for vehicles using deep learning," IEEE Access, 6, pp. 3491-3508, 2018.
DOI
|
4 |
Kim, K.H., Nalluri, S., Kashinath, A., Wang, Y., Mohan, S., Pajic, M., Li, B., "Security analysis against spoofing attacks for distributed uavs," In: Decentralized IoT Systems and Security, 2020.
|
5 |
Panice, G., Luongo, S., Gigante, G., Pascarella, D., Di Benedetto, C., Vozella, A., Pescap'e, A., "A svm-based detection approach for gps-spoofing attacks to uav," In: 2017 23rd International Conference on Automation and Computing (ICAC), pp. 1-11, 2017.
|
6 |
Birnbaum, Z., Dolgikh, A., Skormin, V., O'Brien, E., Muller, D., "Unmanned aerial vehicle security using recursive parameter estimation,"In: 2014 International Conference on Unmanned Aircraft Systems (ICUAS), pp. 692-702, 2014.
|
7 |
Jaro, M. A., "Advances in record-linkage methodology as applied to matching the 1985 census of Tampa, Florida," Journal of the American Statistical Association, 84(406), pp. 414-420, 1989.
DOI
|
8 |
Gomaa, W. H., & Fahmy, A. A., "A survey of text similarity approaches," international journal of Computer Applications, 68(13), pp. 13-18, 2013.
DOI
|
9 |
Chandola, V., Banerjee, A., & Kumar, V., "Anomaly detection for discrete sequences: A survey," IEEE transactions on knowledge and data engineering, 24(5), pp. 823-839, 2010.
DOI
|
10 |
Jaccard, P. "Etude comparative de la distribution florale dans une portiondes Alpes et des Jura," Bull Soc Vaudoise Sci Nat, 37, pp. 547-579, 1901.
|
11 |
Meng, L., Ren, S., Tang, G., Yang, C., & Yang, W.," Uav sensor spoofing detection algorithm based on gps and optical flow fusion," In Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, pp. 146-151, Jan. 2020.
|
12 |
Bozdal, M., Samie, M., & Jennions, I., "A survey on can bus protocol: Attacks, challenges, and potential solutions," In 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), pp. 201-205, Aug. 2018.
|
13 |
Kapoor, P., Vora, A., Kang, K.D., "Detecting and mitigating spoofing attack against an automotive radar," In: 2018 IEEE 88th Vehicular Technology Conference (VTCFall). pp. 1-6, 2018.
|
14 |
Ebeid, E., Skriver, M., & Jin, J., "A survey on open-source flight control platforms of unmanned aerial vehicle," In 2017 Euromicro Conference on Digital System Design (DSD), pp. 396-402, Aug. 2017.
|
15 |
Koubaa, A., Allouch, A., Alajlan, M., Javed, Y., Belghith, A., & Khalgui, M., "Micro air vehicle link (mavlink) in a nutshell: A survey," IEEE Access, 7, pp. 87658-87680, 2019.
DOI
|
16 |
Uncomplicated application-layer vehicular computing and Networking. Uncomplicated Application-layer Vehicular Computing And Networking, https://uavcan.org/, November 5. 2021.
|
17 |
Wikimedia Foundation. "Iran-U.S. RQ-170 incident". https://en.wikipedia.org/wiki/Iran%E2%80%93U.S._RQ-170_incident, October 19. 2021.
|
18 |
Olufowobi, H., Young, C., Zambreno, J., Bloom, G., "Saiducant: Specificationbased automotive intrusion detection using controller area network (can) timing," IEEE Transactions on Vehicular Technology, 69(2), pp. 1484-1494, 2020.
DOI
|
19 |
Tariq, S., Lee, S., Kim, H.K., Woo, S.S., "Can-adf: The controller area network attac kdetection framework," Computers & Security, 94, pp. 101857, 2020.
DOI
|
20 |
Sun, H., Lee, S.Y., Joo, K., Jin, H., Lee, D.H., "Catch id if you can: Dynamic id virtualization mechanism for the controller area network," IEEE Access, 7, pp. 158237-158249, 2019.
DOI
|
21 |
Wang, Q., Lu, Z., Qu, G., "An entropy analysis based intrusion detection system for controller area network in vehicles," In 2018 31st IEEE International System-on-Chip Conference (SOCC), pp. 90-95, 2018.
|
22 |
Sedjelmaci, H., Senouci, S.M., Ansari, N., "Ahierarchical detection and response system to enhance security against lethal cyber-attacks in uav networks," IEEE Transactions on Systems, Man, and Cybernetics: Systems, 48(9), pp. 1594-1606, 2018.
DOI
|
23 |
Levenshtein, V. I., "Binary codes capable of correcting deletions, insertions, and reversals," In Soviet physics doklady, 10(8), pp. 707-710, Feb. 1966.
|
24 |
Pant, S., & Lee, S., "Design and Implementation of a CAN Data Analysis Test Bench based on Raspberry Pi," Journal of Multimedia Information System, 6(4), pp. 239-244, 2019.
DOI
|