2020
DOI: 10.1080/23742917.2020.1846307
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity in unmanned aerial vehicles (UAVs)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
10
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 47 publications
(19 citation statements)
references
References 24 publications
1
10
0
1
Order By: Relevance
“…It was stated that the in-field placement of GCS opens a new range of attacks that are not typical in most UAS deployments [9]. Furthermore, Ly and Ly [10] offered a review of the cyberthreats of UAVs. Their study used the STRIDE threat model to classify cyberattacks.…”
Section: Related Workmentioning
confidence: 99%
“…It was stated that the in-field placement of GCS opens a new range of attacks that are not typical in most UAS deployments [9]. Furthermore, Ly and Ly [10] offered a review of the cyberthreats of UAVs. Their study used the STRIDE threat model to classify cyberattacks.…”
Section: Related Workmentioning
confidence: 99%
“…Menurut Papa, drone atau yang sering dikenal dengan UAV memiliki dua sisi pandang dari para akademisi secara positif dan negatif (Ly & Ly, 2020). Hal ini dapat dilihat dari perkembangannya sejak sebelum Perang Dunia I. Dimulai pada tahun 1849, Austria mengembangkan sebuah balon terbang tanpa awak yang digunakan untuk aksi menyerang Italia dengan mengebom Kota Venesia (Purnomo, 2020).…”
Section: Sejarah Drone Dan Penggunaannyaunclassified
“…A study analyzed cyber-attacks using an unmanned aerial vehicle (UAV). The most common forms of UAV cyber-attacks have been theoretically explained and analyzed in [20]. Kristiyanto, Y. and Ernanstuti tested WiFi connectivity against authentication attacks on IoT devices.…”
Section: Cyber Attacks Against Medical Devicesmentioning
confidence: 99%