Investigation of UAV detection by different solid-state marine radars

S Rudys, P Ragulis, A Laučys, D Bručas, R Pomarnacki… - Electronics, 2022 - mdpi.com
The development of unmanned aerial vehicle (UAV) technologies provides not only benefits
but also threats. UAV technologies are developing faster than means of detecting and …

Energy-aware tracking and jamming rogue uavs using a swarm of pursuer UAV agents

P Valianti, P Kolios, G Ellinas - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
Over the recent years, there have been tremendous advances in the development of
unmanned aerial vehicles (UAVs), that are now attracting increased interest for a number of …

System analysis of counter-unmanned aerial systems kill chain in an operational environment

CS Tan, DL Van Bossuyt, B Hale - Systems, 2021 - mdpi.com
The proliferation of Unmanned Aerial System (UAS) capabilities in the commercial sector is
posing potentially significant threats to the traditional perimeter defense of civilian and …

Uas air-risk assessment in and around airports

P Pothana, J Joy, P Snyder… - 2023 Integrated …, 2023 - ieeexplore.ieee.org
The operation of Uncrewed Aircraft Systems (UAS) at airports is becoming more common.
The increased use of small and inexpensive drones pose various challenges associated …

Target defense against a sequentially arriving cooperative intruder team

A Pourghorban, D Maity - Open Architecture/Open Business …, 2023 - spiedigitallibrary.org
We consider a variant of the target defense problem where a single defender is tasked to
guard a target region from a sequence of incoming intruders. Each intruder's objective is to …

A methodology for uav classification using machine learning and full-wave electromagnetic simulations

AN Sayed, MMYR Riad, OM Ramahi… - … Conference (ITC-Egypt …, 2022 - ieeexplore.ieee.org
Using micro-doppler signatures is an effective way to classify different types of UAVs, as well
as other targets like birds. To generate these datasets, researchers used to conduct …

Drone authentication via acoustic fingerprint

Y Diao, Y Zhang, G Zhao, M Khamis - Proceedings of the 38th Annual …, 2022 - dl.acm.org
As drones become widely used in different applications, drone authentication becomes
increasingly important due to various security risks, eg, drone impersonation attacks. In this …

Uav classification utilizing radar digital twins

AN Sayed, OM Ramahi… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The potential dangers of the unauthorized use of Unmanned Air Vehicles (UAVs) have
made remote detection and classification crucial. Radar detection systems are preferred as …

BANDA: A Novel Blockchain-Assisted Network for Drone Authentication

SO Ajakwe, II Saviour, JH Kim, DS Kim… - … on Ubiquitous and …, 2023 - ieeexplore.ieee.org
The development of a comprehensive and decisive drone defense integrated control system
(DDS) that can provide maximum security is crucial for smart aerial mobility to sustain the …

Evaluation of a Resilience-Driven Operational Concept to Manage Drone Intrusions in Airports

D Pascarella, G Gigante, A Vozella, M Sodano… - Information, 2023 - mdpi.com
The drone market's growth poses a serious threat to the negligent, illicit, or non-cooperative
use of drones, especially in airports and their surroundings. Effective protection of an airport …