2012
DOI: 10.1007/s10846-012-9698-1
|View full text |Cite
|
Sign up to set email alerts
|

The Small and Silent Force Multiplier: A Swarm UAV—Electronic Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(22 citation statements)
references
References 9 publications
0
16
0
Order By: Relevance
“…UAV swarms are generally considered to be self‐organizing robotic systems consisting of small UAVs with the same or similar targets flying in the same flight mode 9,10 . The organization and management of multidimensional resources of UAV swarm is the basis for completing missions cooperatively, and the reliable and efficient UAV swarm networks (USNET) is the prerequisite for resource status perception and management.…”
Section: Related Workmentioning
confidence: 99%
“…UAV swarms are generally considered to be self‐organizing robotic systems consisting of small UAVs with the same or similar targets flying in the same flight mode 9,10 . The organization and management of multidimensional resources of UAV swarm is the basis for completing missions cooperatively, and the reliable and efficient UAV swarm networks (USNET) is the prerequisite for resource status perception and management.…”
Section: Related Workmentioning
confidence: 99%
“…Rahmes Mark et al designed a multi-UAV countermeasure system and used Q-Learning algorithm to generate radar transmitting frequency [18]. Cevik Polat et al reduced the resource allocation problem in electronic countermeasures to an optimal allocation problem, and proposed a resource allocation algorithm based on particle swarm optimization theory [19].…”
Section: Related Workmentioning
confidence: 99%
“…The jamming attack has been considered in previous research on various wireless networks [9]- [23]. In recent years, various solutions have also been proposed for the jamming attack in the UAVs [9], [13], [15]- [17], [20]. However, the proposed approaches of jamming attack detection for the UAVs are not well suited for FANET as jamming attack detection in the FANET faces three major challenges:…”
Section: Introductionmentioning
confidence: 99%