Browse > Article

UAV 스마트 디바이스 지상 제어 스테이션 사이버 보안 위협 모델  

Yun, Jong-Hui (영남대학교)
Publication Information
Korea Information Processing Society Review / v.24, no.4, 2017 , pp. 23-30 More about this Journal
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Dalton, W., "RIM's BlackBerry phones may lose public sector monopoly," Retrieved 5/24/13, 2013, from http://www.itproportal.com/2012/08/24/rims-blackberry-phones-maylose-publicsector-monopoly-/, 2012.
2 McGarry, B., "Pentagon Will Open Networks to Apple, Google Devices in 2014," Retrieved 3/21/13, 2013, from http://www.bloomberg.com/news/2013-02-26/pentagon-will-opennetworksto-apple-google-devices-in-2014.html, 2013.
3 Gorman, S., et al., "Insurgents Hack U.S. Drones," The Wall Street Journal, WSJ.com, 2009.
4 Nguyen, T. C., "Virus attacks military drones, exposes vulnerabilities." Retrieved from http://www.smartplanet.com/blog/thinking-tech/virus-attacks-militarydrones-exposes-vulnerabilities/8858, 2011.
5 Paganini, P., "Hacking Drones Overview of the Main Threats," Retrieved from http://resources.infosecinstitute.com/hacking-drones-overviewof-themain-threats/, 2013.
6 Nguyen, T. C., "How college students hijacked a government spy drone," Retrieved from http://www.smartplanet.com/blog/thinking-tech/how-college-studentshijacked- a-government-spy-drone/12214, 2012.
7 Munoz, C., "Report: DOD opens door to Apple, Android-built systems," Retrieved from http://thehill.com/blogs/defconhill/ industry/265395-report-dod-opens-door-to-apple-android-builtsystems, 2013.
8 Oh, T., et al., "Best security practices for android, blackberry, and iOS," Enabling Technologies for Smartphone and Internet of Things (ETSIoT), 2012.
9 Goodwin, B., "IT manufacturers fight cyber espionage risks in the supply chain," Retrieved from http://www.computerweekly.com/news/2240181320/IT-manfucturerstackle-cyber-espionage-risks-in-the-supply-chain, 2013.