2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) 2015
DOI: 10.1109/iccic.2015.7435627
|View full text |Cite
|
Sign up to set email alerts
|

Security incident management in ground transportation system using UAVs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Drones contribute to border security, assist in search and rescue operations, and identify both legal and illegal ships [50]. They can scan maritime environments for potential hazards like red tides and oil spills.…”
Section: Port Security Monitoringmentioning
confidence: 99%
“…Drones contribute to border security, assist in search and rescue operations, and identify both legal and illegal ships [50]. They can scan maritime environments for potential hazards like red tides and oil spills.…”
Section: Port Security Monitoringmentioning
confidence: 99%
“…Projections indicate a noteworthy expansion in the UAV market, with an estimated value reaching USD 38.3 billion by 2027 [1]. UAVs play pivotal roles across diverse civil applications, encompassing express transportation [2], traffic control [3], data acquisition [4], disaster rescue [5], and intelligent agriculture generation [6,7].…”
Section: Introductionmentioning
confidence: 99%
“…While piloting a commercial drone is a relatively easy task, most people are not aware of the information being constantly streamed back to its base, which might include camera feed, laser or radar range data, inertial measurements, and global coordinates from GPS. Because of this constant data sharing, which might be sensitive, information security becomes critical, especially when autonomous aerial vehicles are involved [6]. A robot with no security protocols in place can be brought down immediately by attackers, or its information can be stolen for nefarious purposes, including video footage or its GPS log history.…”
Section: Introductionmentioning
confidence: 99%