Comprehensive review of UAV detection, security, and communication advancements to prevent threats

GEM Abro, SABM Zulkifli, RJ Masood, VS Asirvadam… - Drones, 2022 - mdpi.com
It has been observed that unmanned aerial vehicles (UAVs), also known as drones, have
been used in a very different way over time. The advancements in key UAV areas include …

Visual attention prediction improves performance of autonomous drone racing agents

C Pfeiffer, S Wengeler, A Loquercio, D Scaramuzza - Plos one, 2022 - journals.plos.org
Humans race drones faster than neural networks trained for end-to-end autonomous flight.
This may be related to the ability of human pilots to select task-relevant visual information …

Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS)

F Tlili, S Ayed, LC Fourati - Computers & Security, 2024 - Elsevier
Distributed intrusion detection systems (DIDS) are a specialized subset of conventional IDSs
designed for implementation in distributed environments. Each IDS is integrated into distinct …

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …

Security challenges for UAV Systems Communications: Potential attacks and countermeasures

W BinSaeedan, A Aldawsari, L Alhussain… - … : Challenges and Trends, 2023 - Springer
Unmanned aerial vehicles (UAVs) are aircraft that are guided either remotely by humans
using a remote control or autonomously by an intelligent computer-based autopilot system …

An approach to enhance the security of unmanned aerial vehicles (UAVs)

NA Sabuwala, RD Daruwala - The Journal of Supercomputing, 2024 - Springer
There is a significant surge in unmanned aerial vehicles'(UAVs) popularity with an ongoing
increase in demand due to their multi-functional uses. The capacity of the UAVs to respond …

SLMAS: A Secure and Light Weight Mutual Authentication Scheme for the Smart Wheelchair

AA Almazroi, M Liaqat, RL Ali, A Gani - Applied Sciences, 2023 - mdpi.com
The modern innovation called the Internet of Things (IoT) empowers individuals to connect
to anybody and anything at any point, wherever. The application of the IoT in smart cities …

Empirical Analysis of the Security Threats and Risks that Drones Face, Represent, and Mitigation

Z Oudina, M Derdour, A Dib… - 2024 6th International …, 2024 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs), popularly known as drones, are widely used for safe
aims and some sensitive missions such as monitoring of critical infrastructure, surveillance …

Secure computation protocol of Chebyshev distance under the malicious model

X Liu, W Chen, L Peng, D Luo, L Jia, G Xu, X Chen… - Scientific Reports, 2024 - nature.com
Secure multi-party computation of Chebyshev distance represents a crucial method for
confidential distance measurement, holding significant theoretical and practical implications …

Secure communication for unmanned aerial vehicles

T Madhuvanthi, S Velliangiri - 2023 International Conference …, 2023 - ieeexplore.ieee.org
Advances in UAV communication are being brought about by the widespread adoption of
wireless communication technologies for all indoor and outdoor connectivity. Drone …