2020
DOI: 10.7249/rr2972
|View full text |Cite
|
Sign up to set email alerts
|

How to Analyze the Cyber Threat from Drones: Background, Analysis Frameworks, and Analysis Tools

Abstract: How to Analyze the Cyber Threat from DronesBackground, Analysis Frameworks, and

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…This will represent tens of millions of drone owners around the world. Unfortunately, this growing use of drones (in particular for recreational activities) raises concerns about privacy, but also security of sensitive areas such as airports, prisons, and industrial and military facilities [3]- [5]. Although in many countries bills are passed and legislation is updated to regulate drone activities [1], [5], [6], it is very likely that an untrained pilot does not know the legislation, and a motivated criminal simply does not care.…”
Section: Introductionmentioning
confidence: 99%
“…This will represent tens of millions of drone owners around the world. Unfortunately, this growing use of drones (in particular for recreational activities) raises concerns about privacy, but also security of sensitive areas such as airports, prisons, and industrial and military facilities [3]- [5]. Although in many countries bills are passed and legislation is updated to regulate drone activities [1], [5], [6], it is very likely that an untrained pilot does not know the legislation, and a motivated criminal simply does not care.…”
Section: Introductionmentioning
confidence: 99%
“…This may include the hardware and software running on the UAV, the Ground Control Station (GCS), the support Cloud Services (CS), and the connections between these entities. Cyberthreats are further accentuated by UAVs connecting to open, wireless networks with access to the Internet [2], [3].…”
Section: Introductionmentioning
confidence: 99%
“…Other known attacks to the UAS include computer virus infection of the mission command center of a US air force base controlling military UAVs [5]. Best et al [3] introduced a framework for understanding and documenting vulnerabilities and attack opportunities of the UAS. It was This project has received funding from the European Union's Horizon 2020 research and innovation program under grant agreement No 861111.…”
Section: Introductionmentioning
confidence: 99%
“…agriculture monitoring [8] and human action recognition [1,2] in the imagery obtained through drones. In addition to detecting different objects from a drone video, it is also important to detect the drone itself from a video captured by another drone to avoid drone attacks [3], drone collisions [33] and safe multi-drone flights [24,32]. Detection of ground objects and aerial drones from drone videos is a very challenging problem due to a large and abrupt camera motion, arbitrary drone shape and view changes, occlusion, and more importantly small object size.…”
Section: Introductionmentioning
confidence: 99%