[PDF][PDF] A secure operating system architecture based on Linux against communication offense with root exploit for unmanned aerial vehicles

KM Koo, W Lee, SR Cho, I Joe - Journal of Information Processing …, 2020 - koreascience.kr
This paper proposes an operating system architecture for unmanned aerial vehicle (UAV),
which is secure against root exploit, resilient to connection loss resulting in the control loss …

Investigating Takeover of Aerospace Systems via Falsification of Sensor Data

GA Jares, J Valasek - AIAA AVIATION 2021 FORUM, 2021 - arc.aiaa.org
View Video Presentation: https://doi. org/10.2514/6.2021-3222. vid Cyberattacks are
becoming an increasing concern in the field of unmanned air systems (UAS) and aircraft …

Towards a Transdisciplinary Cyber Forensics Geo-Contextualization Framework

MM Mirza - 2023 - search.proquest.com
Technological advances have a profound impact on people and the world in which they live.
People use a wide range of smart devices, such as the Internet of Things (IoT), smartphones …

Machine Learning for Intrusion Detection of Cyber-Attacks in Unmanned Aerial Vehicles

AA Molina - 2023 - search.proquest.com
Abstract The introduction of Unmanned Aerial Vehicles (UAVs) has revolutionized civilian
and military aviation operations. Their vast and advantageous applications induce high …

Integrated Navigation for UAV Precise Flight Management with No-Fly Zones

S Yang, Y Hu, R Sun - Artificial Intelligence in China: Proceedings of the …, 2022 - Springer
Abstract The use of Unmanned Aerial Vehicles (UAVs) has increased significantly in recent
decades. Nevertheless, the abuse of the UAVs raises concern in regards to regulations and …

Vulnerability assessment for unmanned systems autonomy services architecture

Y Li, I Frasure, AA Ikusan, J Zhang, R Dai - Network and System Security …, 2018 - Springer
Abstract Unmanned Systems Autonomy Services (UxAS) is a set of networked software
modules that collaboratively automate mission-level decision making for unmanned …

Trajectory Synthesis for a UAV Swarm to Perform Resilient Requirement-Aware Surveillance: A Smart Grid-based Study

MA Rahman, R Masum, M Anderson… - arXiv preprint arXiv …, 2019 - arxiv.org
A smart grid is a widely distributed engineering system with overhead transmission lines.
Physical damage to these power lines, from natural calamities or technical failures, will …

Intrusion Detection for Unmanned Aerial Systems: A Survey

B Di, J Gao, W Yi, Y Zhu, Z Han - International Conference on Guidance …, 2022 - Springer
With the wide application of unmanned aerial systems, cyber security concerns of the system
have attracted more and more attention. Accurate intrusion detection is an important …

Sensing Anomalies as Potential Hazards: Datasets and Benchmarks

LM Gambardella, A Giusti, J Guzzi - … Robotic Systems: 23rd …, 2022 - books.google.com
We consider the problem of detecting, in the visual sensing data stream of an autonomous
mobile robot, semantic patterns that are unusual (ie, anomalous) with respect to the robot's …

Comprehensive Modeling of Industrial Control Systems for Cyber-Security Applications

M Davis - 2017 - search.proquest.com
Abstract Industrial Control Systems (ICS) are crucial for the productivity and efficiency of
modern industrial facilities. ICS technology is used in omnipresent industries such as power …