Cyber Attacks on Commercial Drones: A Review

B Branco, JS Silva, M Correia - IEEE Access, 2025 - ieeexplore.ieee.org
Unmanned Aerial Vehicle (UAV) s, also known as drones, are increasingly used in several
applications and a variety of cyber attacks can be performed on them using several tools …

Incidents and impacts on operator revenue in the telecommunications sector: A multiple case-study approach

EM Asiedu - Journal of Telecommunications and the Digital …, 2024 - search.informit.org
This study adopted a multiple case-study approach to investigate incidents, their impacts on
performance, and revenues in the telecommunications sector using data from Ghana. The …

[PDF][PDF] A FRAMEWORK FOR AUTOMATING ENVIRONMENTAL VULNERABILITY ANALYSIS OF NETWORK SERVICES

D Koutras, P Kotzanikolaou, E Paklatzis, C Grigoriadis… - 2024 - itu.int
The primary objective of this paper is to introduce a comprehensive framework designed to
automate the assess‑ment of environmental vulnerability status of communication protocols …

IoT based WiFi Penetration Testing Toolkit.

S Tamilselvi, R Akash… - … International Journal of …, 2024 - search.ebscohost.com
This Project is a security-related applications. It makes use of technological and computer
techniques. In existing methodology the device gather data like ssid, mac address from any …

[PDF][PDF] Machine Learning-based Intrusion Detection System through WPA3 Protocol in Smart Contract System

M Sayduzzaman, JT Tamanna, S Sazzad, M Rahman… - researchgate.net
Nowadays, the Internet has become one of the basic human needs of professionals. With
the massive number of devices, reliability, and security will be crucial in the coming ages …