共 83 条
[1]
Addady M., The Number of Drones Expected to Sell During the Holiday Seasons is Caring the Government, (2015)
[2]
Al Tawy R., Youssef A.M., Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices, IEEE Access, 4, pp. 959-979, (2016)
[3]
Sastry S., Cardenas A.A., Amin S., Secure control: Towards survivable cyber-physical systems, Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, pp. 495-500, (2008)
[4]
Amazon Revising the Airspace Model for the Safe Integration of Small Unmanned Aircraft Systems, (2015)
[5]
Angelov P., Sense and Avoid in UAS: Research and Applications, (2012)
[6]
Bekmezci I., Sahingoz O.K., Temel S., Flying ad-hoc networks (FANETs): A survey, Ad Hoc Netw., 11, 3, pp. 1254-1270, (2013)
[7]
Bellare M., Namprempre C., Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, Advances in Cryptology-ASIACRYPT, Tatsuaki Okamoto (Ed.), 1976, pp. 531-545, (2000)
[8]
Computers used for Benchmarking Cryptographic Systems, (2016)
[9]
Bethke B., Valenti M., How J.P., UAV task assignment, IEEE Robot. Autom. Mag., 15, 1, pp. 39-44, (2008)
[10]
Birnbaum Z., Dolgikh A., Skormin V., O'Brien E., Muller D., Unmanned aerial vehicle security using recursive parameter estimation, Proceedings of the International Conference on Unmanned Aircraft Systems. IEEE, pp. 692-702, (2014)