1 |
C. Drubin, "The Global UAV Market 2015-2025," Microw. J., Vol.58, No.3, pp.53-54, Mar., 2015.
|
2 |
Y. I. Bae and H. R. Shin, "Prerequisites for Drones Industry Development," Issue & Analysis, No.237, pp.1-25, 2016.
|
3 |
B. Canis, "Unmanned aircraft systems (UAS): Commercial outlook for a new industry," Congressional Research Service, Washington, 2015.
|
4 |
J. H. Jin and G. B. Lee, "Understanding and Trend of UAV / Dron," KICS, Vol.33, No.2, pp.80-85, 2016.
|
5 |
A. R. Lee, "Weekly Tip - Industry," CRPC, Vol.53, 2017.
|
6 |
J. H Lee, Y. T. Kim, J. Y. Seo, and S. J. Hwang, "2015 World Radiocommunication Conference (WRC-15)," TTP. J., Vol.163, pp.105-109, 2016.
|
7 |
A. Y. Javaid, W. Sun, V. K. Devabhaktuni, and M. Alam, "Cyber security threat analysis and modeling of an unmanned aerial vehicle system," Homeland Security (HST), 2012 IEEE Conference on Technologies for. IEEE, pp.585-590, 2012.
|
8 |
N. M. Rodday, R. D. O. Schmidt, and A. Pras, "Exploring security vulnerabilities of unmanned aerial vehicles," Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP. IEEE, pp.993-994, 2016.
|
9 |
J. H. Kim, B. K. Kim, and Y. T Shin, "A Study on the Improvement of security vulnerabilities in Civilian Drone," KIISE, pp.1069-1071, 2016.
|
10 |
C. A. Gomez, "Cybersecurity of unmanned aircraft systems (UAS)," Diss. UTICA COLLEGE, 2015.
|
11 |
S. J. Song and B. O. Kil, "A Study on the Glo UAV Market," KADIS, Vol.22, No.4, pp.49-76, 2015.
|
12 |
F. Schenkelberg, "How reliable does a delivery drone have to be?" Reliability and Maintainability Symposium (RAMS), 2016 Annual, IEEE, 2016.
|
13 |
H. W. Kim, K. S. Kang, D. I. Chang, J. Y. Ahn, "Technical and Standardization Trends on Control and Non-Payload Communications for Unmanned Aircraft Systems," ETRI, Vol.30, No.3, pp.74-83, 2015.
|
14 |
R. J. Kerczewski, and J. H. Griner, "Control and Non-Payload Communications Links for Integrated Unmanned Aircraft Operations," 2012.
|
15 |
Y. H. Kang, "An Efficient Frequency Utilization Policy for UAS in Hyper-Connectivity Era," The Journal of Korean Institute of Electromagnetic Engineering and Science, Vol.26, No.10, pp.914-923, 2015.
DOI
|
16 |
A. Studer, F. Bai, B. Bellur, and A. Perrig, "Flexible, extensible, and efficient VANET authentication," Journal of Communications and Networks, Vol.11, No.6, pp.574-588, 2009.
DOI
|
17 |
R. Maes, "Physically Unclonable Functions," Springer, Berlin, 2013.
|
18 |
G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," Proceedings of the 44th annual Design Automation Conference, ACM, 2007.
|
19 |
B. Jenkins, "Watching the Watchmen: Drone Privacy and the Need for Oversight," Ky. LJ, Vol.102, pp.161-182, 2013.
|
20 |
G., Wang, B. S. Lee, and J. Y. Ahn, "Authentication and Key Management in an LTE-Based Unmanned Aerial System Control and Non-payload Communication Network," In Future Internet of Things and Cloud Workshops (FiCloudW), IEEE International Conference on, IEEE, pp.355-360, Aug., 2016.
|
21 |
U. K. Verma, S. Kumar, and D. Sinha, "A secure and efficient certificate based authentication protocol for MANET," In Circuit, Power and Computing Technologies (ICCPCT), 2016 International Conference on, IEEE, pp.1-7, Mar., 2016.
|
22 |
J A. Kakar, "UAV communications: Spectral requirements, MAV and SUAV channel modeling, OFDM waveform parameters, performance and spectrum management," Diss. Virginia Tech, 2015.
|