2022 13th International Conference on Information and Communication Technology Convergence (ICTC) 2022
DOI: 10.1109/ictc55196.2022.9952751
|View full text |Cite
|
Sign up to set email alerts
|

Octopus-Inspired Robot for Underwater Exploration in Military Internet of Battle Operations and Surveillance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…However, deploying a single-modal detection technique in a DDS limits the overall security capabilities of a DDS. The RF technique is deficient in detecting a swarm of drones (Basak et al, 2021); whereas the radar technique creates difficulty in differentiating UAVs from gliding birds (Dini et al, 2022). The acoustic and optical techniques suffer from limitations as well.…”
Section: Drone Detection and Identification Technologiesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, deploying a single-modal detection technique in a DDS limits the overall security capabilities of a DDS. The RF technique is deficient in detecting a swarm of drones (Basak et al, 2021); whereas the radar technique creates difficulty in differentiating UAVs from gliding birds (Dini et al, 2022). The acoustic and optical techniques suffer from limitations as well.…”
Section: Drone Detection and Identification Technologiesmentioning
confidence: 99%
“…Also, there is insufficient awareness of government regulations regarding safety practices for airspace usage when it comes to drone-based logistics and priority-based deliveries. Finally, it is worth pointing out that the promulgation of stiffer laws and sanctions for incriminating airspace, cyberspace, and AI-space offenders that engage in drone hijacking, drone identity theft, droneillance-or drone surveillance (Dini et al, 2022)-for cyberwarfare under the guise of drone-based logistics (Ajakwe et al, 2020), and unprovoked drone warfare on civil targets is highly needed to actualize secured smart aerial mobility via drones. Most cyber-physical attacks on drones (for instance, spoofing and signal jamming), as well as authentication issues (for example, identity theft), arise from loopholes in the existing regulatory framework.…”
Section: Corporate Airspace Security Intelligence In Dds Designmentioning
confidence: 99%