The data analysis subsystem of an Unmanned Aerial Vehicle (UAV) includes two main modules: a data acquisition module for data processing and a normalization module. One of the main features of an adaptive UAV protection system is the analysis of its cyber-physical parameters. An attack on a general-purpose computer system mainly affects the integrity, confidentiality and availability of important information. By contrast, an attack on a Cyber-Physical System (CPS), such as a UAV, affects the functionality of the system and may disrupt its operation, ultimately preventing it from fulfilling its tasks correctly. Cyber-physical parameters are the internal parameters of a system node, including the states of its computing resources, data storag...
We consider the trusted operation of cyber-physical processes based on an assessment of the system’s...
Cyber security has emerged as one of the most important issues in unmanned aerial systems for which ...
AbstractA resilient and secure control system should be designed to be as safe and robust as possibl...
The data analysis subsystem of an Unmanned Aerial Vehicle (UAV) includes two main modules: a data ac...
Here, we developed a method for detecting cyber security attacks aimed at spoofing the Global Positi...
Here we developed a method for detecting cyber security attacks aimed at spoofing the Global Positio...
Security of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging probl...
International audienceUnmanned aerial vehicles (UAVs) networks have not yet received considerable re...
International audienceSecurity issues in unmanned aerial vehicle (UAV) networks attract the attentio...
Cyber security has emerged as one of the most important issues in the operation of Unmanned Aerial S...
Unmanned aerial vehicle (UAV) has been increasingly used in a wide range of commercial and civilian ...
The federal aviation administration has estimated that by the year 2020, the United States will have...
The adoption and recent development of Unmanned Aerial Vehicles (UAVs) are because of their widespre...
The recent development and adoption of unmanned aerial vehicles (UAVs) is due to its wide variety of...
Common vulnerabilities in typical intelligent cyber-physical systems such as unmanned aerial vehicle...
We consider the trusted operation of cyber-physical processes based on an assessment of the system’s...
Cyber security has emerged as one of the most important issues in unmanned aerial systems for which ...
AbstractA resilient and secure control system should be designed to be as safe and robust as possibl...
The data analysis subsystem of an Unmanned Aerial Vehicle (UAV) includes two main modules: a data ac...
Here, we developed a method for detecting cyber security attacks aimed at spoofing the Global Positi...
Here we developed a method for detecting cyber security attacks aimed at spoofing the Global Positio...
Security of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging probl...
International audienceUnmanned aerial vehicles (UAVs) networks have not yet received considerable re...
International audienceSecurity issues in unmanned aerial vehicle (UAV) networks attract the attentio...
Cyber security has emerged as one of the most important issues in the operation of Unmanned Aerial S...
Unmanned aerial vehicle (UAV) has been increasingly used in a wide range of commercial and civilian ...
The federal aviation administration has estimated that by the year 2020, the United States will have...
The adoption and recent development of Unmanned Aerial Vehicles (UAVs) are because of their widespre...
The recent development and adoption of unmanned aerial vehicles (UAVs) is due to its wide variety of...
Common vulnerabilities in typical intelligent cyber-physical systems such as unmanned aerial vehicle...
We consider the trusted operation of cyber-physical processes based on an assessment of the system’s...
Cyber security has emerged as one of the most important issues in unmanned aerial systems for which ...
AbstractA resilient and secure control system should be designed to be as safe and robust as possibl...