共 83 条
[31]
FAA Special Airworthiness Certificate, (2016)
[32]
Faughnan M.S., Hourican B.J., MacDonald G.C., Srivastava M., Wright J.A., Haimes Y.Y., Andrijcic E., Guo Z., White J.C., Risk analysis of unmanned aerial vehicle hijacking and methods of its detection, Proceedings of the IEEE Systems and Information Engineering Design Symposium, pp. 145-150, (2013)
[33]
George S., FAA Unmanned Aircraft Systems (UAS): Cyber Security Initiatives, (2015)
[34]
Gittleson K., Data-stealing Snoopy drone unveiled at Black Hat - BBC News, (2014)
[35]
Han S., Xie M., Hsiao-Hwa Chen, Ling Y., Intrusion detection in cyber-physical systems: Techniques and challenges, IEEE Syst. J., 8, 4, pp. 1049-1059, (2014)
[36]
Hartmann K., Steup C., The vulnerability of UAVs to cyber attacks-an approach to the risk assessment, Proceedings of the 5th International Conference on Cyber Conflict, pp. 1-23, (2013)
[37]
Hodgkins K., Anti-Drone Shoulder Rifle Lets Police take Control of UAVs with Radio Pulses. (2015), (2015)
[38]
Horsman G., Unmanned aerial vehicles: A preliminary analysis of forensic challenges, Dig. Invest., 16, pp. 1-11, (2016)
[39]
Kerns A.J., Shepard D.P., Bhatti J.A., Humphreys T.E., Unmanned aircraft capture and control via GPS spoofing, J. Field Robot., 31, 4, pp. 617-636, (2014)
[40]
Khaitan S., McCalley J.D., Design techniques and applications of cyberphysical systems: A survey, IEEE Syst. J., 9, 2, pp. 350-365, (2015)