The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019 International Conference on Military Technologies (ICMT) 2019
DOI: 10.1109/miltechs.2019.8870103
|View full text |Cite
|
Sign up to set email alerts
|

Cybernetics Fight against the UAV

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…From the attacker's point of view, there are several ways to penetrate the system, differing in danger and enabling different goals to be met [1].…”
Section: Options After Successful Penetration Into the Uav Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…From the attacker's point of view, there are several ways to penetrate the system, differing in danger and enabling different goals to be met [1].…”
Section: Options After Successful Penetration Into the Uav Systemmentioning
confidence: 99%
“…Another indisputable advantage of this device is its low price in combination with normal commercial availability [6]. Figure 5 shows an object with a marked critical defence point (red circle), access roads (3, 5), high-rise areas (1,2,4), and a low building (6), which poses the greatest risk due to the possibility of direct visibility to defended point It is advisable to place the sensors so that they cover most of the area and selected places outside the area from which the UAS control could be performed. The Alfa AWUS036AC device, which is connected to a certain small computer, e.g.…”
Section: The Proposed Concept Applied In the Urban Areamentioning
confidence: 99%
See 1 more Smart Citation