-
1
-
-
69849103753
-
Optimal multi-UAV convoy protection
-
April
-
X. C. Ding, A. Rahmani, and M. Egerstedt, "Optimal multi-UAV convoy protection", Conference on Robot Communication and Configuration, volume 9, pages 1-6, April 2009.
-
(2009)
Conference on Robot Communication and Configuration
, vol.9
, pp. 1-6
-
-
Ding, X.C.1
Rahmani, A.2
Egerstedt, M.3
-
2
-
-
67649576966
-
Autonomous UAV path planning and estimation
-
J. Tisdale, Z. Kim, J. Hedrick, "Autonomous UAV path planning and estimation". IEEE Robotics and Automation Magazine, 16:35-42, 2009.
-
(2009)
IEEE Robotics and Automation Magazine
, vol.16
, pp. 35-42
-
-
Tisdale, J.1
Kim, Z.2
Hedrick, J.3
-
3
-
-
80052192882
-
A Performance Study of UAV-based Sensor Networks under Cyber Attack
-
Ethan M Puchaty and Daniela A DeLaurentis, "A Performance Study of UAV-based Sensor Networks Under Cyber Attack", Proceedings of the 2011 6th International Conference on System of Systems Engineering, Albuquerque, New Mexico, USA - June 27-30, 2011.
-
Proceedings of the 2011 6th International Conference on System of Systems Engineering, Albuquerque, New Mexico, USA - June 27-30, 2011
-
-
Puchaty, E.M.1
DeLaurentis, D.A.2
-
4
-
-
35648997924
-
UAV Platform designed in WUT for border surveillance
-
Z. Goraj, "UAV Platform designed in WUT for border surveillance", AIAA paper 2965, 2007.
-
(2007)
AIAA Paper 2965
-
-
Goraj, Z.1
-
5
-
-
47249127768
-
Hybrid large scale wireless sensor network for missile defense
-
P. Katopodis, G. Katsis, O. Walker, M. Tummala, J. B. Michael, "Hybrid large scale wireless sensor network for missile defense", IEEE SoSE Conference, San Antonio, TX, 2007.
-
IEEE SoSE Conference, San Antonio, TX, 2007
-
-
Katopodis, P.1
Katsis, G.2
Walker, O.3
Tummala, M.4
Michael, J.B.5
-
8
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: A link layer security architecture for wireless sensor networks", Proceedings of the Second International Conference on Embedded Networked Sensor Systems, SenSys'04, Nov 3-5 2004, pp. 162-175, 2004.
-
(2004)
Proceedings of the Second International Conference on Embedded Networked Sensor Systems, SenSys'04, Nov 3-5 2004
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
10
-
-
0033707464
-
Threat Analysis and Security Architecture of Mobile Agent based Management Systems
-
H. Reiser and G. Vogt, "Threat Analysis and Security Architecture of Mobile Agent based Management Systems", Proceedings of NOMS 2000 IEEE/IFIP Network Operations and Management Symposium, Honolulu, Hawaii, USA, April 2000.
-
Proceedings of NOMS 2000 IEEE/IFIP Network Operations and Management Symposium, Honolulu, Hawaii, USA, April 2000
-
-
Reiser, H.1
Vogt, G.2
-
12
-
-
84874558139
-
SkyGrabber: The $26 software used by insurgents to hack into US drones
-
Dec 17
-
Charles Arthur, "SkyGrabber: the $26 software used by insurgents to hack into US drones", Guardian, Dec 17, 2009. http://www.guardian.co.uk/technology/2009/dec/17/skygrabber-software-drones- hacked
-
(2009)
Guardian
-
-
Arthur, C.1
-
13
-
-
84874575143
-
-
Center for Education and Research in Information Assurance and Security, Purdue University, Dec 18
-
Pascal Meunier, "Drone "Flaw" Known Since 1990s", Center for Education and Research in Information Assurance and Security, Purdue University, Dec 18 2009, http://www.cerias.purdue.edu/site/blog/post/drone-flaw- known-since-1990s-was-a-vulnerability/
-
(2009)
Drone "Flaw" Known since 1990s
-
-
Meunier, P.1
-
14
-
-
84874578488
-
-
Associated Press, Guardian, October 9
-
"Computer virus infects drone plane command center in US", Associated Press, Guardian, October 9, 2011. http://www.guardian.co.uk/ technology/2011/oct/09/virus-infects-drone-plane-command
-
(2011)
Computer Virus Infects Drone Plane Command Center in US
-
-
-
15
-
-
5444275208
-
Wireless sensor and actor networks: Research challenges
-
ELSEVIER
-
Ian F. Akyildiz, Ismail H. Kasimoglu, "Wireless sensor and actor networks: research challenges", Journal on Ad Hoc Networks, vol. 2, page 351-367, 2004, ELSEVIER.
-
(2004)
Journal on Ad Hoc Networks
, vol.2
, pp. 351-367
-
-
Akyildiz, I.F.1
Kasimoglu, I.H.2
-
16
-
-
0011818098
-
Wireless Communications: Past Events and a Future Perspective
-
May
-
Theodore S. Rappaport, A. Annamalai, R. M. Buehrer, and William H. Tranter, "Wireless Communications: Past Events and a Future Perspective", IEEE Communications Magazine 50th Anniversary Commemorative Issue, May 2002.
-
(2002)
IEEE Communications Magazine 50th Anniversary Commemorative Issue
-
-
Rappaport, T.S.1
Annamalai, A.2
Buehrer, R.M.3
Tranter, W.H.4
-
18
-
-
38049161526
-
Security Threat Modeling and Analysis: A Goal-oriented Approach
-
E. A. Oladimeji, S. Supakkul, and L. Chung, "Security Threat Modeling and Analysis: A Goal-oriented Approach", Proceedings of the 10th IASTED, International Association of Science and Technology for Development, Beijing, China, October 8-10, 2007.
-
Proceedings of the 10th IASTED, International Association of Science and Technology for Development, Beijing, China, October 8-10, 2007
-
-
Oladimeji, E.A.1
Supakkul, S.2
Chung, L.3
-
21
-
-
14744271048
-
Application penetration testing
-
H. H. Thompson, "Application penetration testing", IEEE Security and Privacy, Vol. 03, Issue 01, Pages: 66-69, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 66-69
-
-
Thompson, H.H.1
-
22
-
-
84874580194
-
-
International Aerial Robotics Competition, August
-
T. J. Koo, D. H. Shim, O. Shakernia, B. Sinopoli, F. Hoffmann and S. Sastry, "Hierarchical Hybrid System Design on Berkeley UAV", International Aerial Robotics Competition, August 1998.
-
(1998)
Hierarchical Hybrid System Design on Berkeley UAV
-
-
Koo, T.J.1
Shim, D.H.2
Shakernia, O.3
Sinopoli, B.4
Hoffmann, F.5
Sastry, S.6
-
25
-
-
74249112230
-
Security Analysis of UAV Radio Communication System
-
D. Rudniskas, Z. Goraj and J. Stankunas, "Security Analysis of UAV Radio Communication System", Taylor & Francis International Research Journal on Aviation, Vol. 13, Issue 4, Pages 116-121, 2009.
-
(2009)
Taylor & Francis International Research Journal on Aviation
, vol.13
, Issue.4
, pp. 116-121
-
-
Rudniskas, D.1
Goraj, Z.2
Stankunas, J.3
-
29
-
-
0004198635
-
-
th Edition, Prentice Hall of India; 4th edition ISBN-13: 978-8120334151
-
th Edition, Prentice Hall of India; 4th edition (2008), ISBN-13: 978-8120334151
-
(2008)
Security in Computing
-
-
Pfleeger1
Pfleeger2
-
31
-
-
84948972584
-
Security requirements engineering: When anti-requirements hit the fan
-
R. Crook, D. Ince, L. Lin, and B. Nuseibeh, "Security requirements engineering: When anti-requirements hit the fan", Proceedings of International IEEE Requirements Engineering Conference, RE-2002.
-
Proceedings of International IEEE Requirements Engineering Conference, RE-2002
-
-
Crook, R.1
Ince, D.2
Lin, L.3
Nuseibeh, B.4
-
32
-
-
79551627245
-
Cross-Layer Attack and Defense in Cognitive Radio Networks
-
W. Wang, Y. Sun, H. Li and Z. Han, "Cross-Layer Attack and Defense in Cognitive Radio Networks", IEEE Globe Communication Conference (Globecom), Miami, FL, Nov.-Dec. 2010.
-
IEEE Globe Communication Conference (Globecom), Miami, FL, Nov.-Dec. 2010
-
-
Wang, W.1
Sun, Y.2
Li, H.3
Han, Z.4
-
34
-
-
79952751568
-
Mitigation of malicious attacks on networks
-
C. M. Schneidera, A. A. Moreirab, J. S. Andrade, S. Havlinc and H. J. Herrmanna, "Mitigation of malicious attacks on networks", Proceedings of the National Academy of Sciences of the USA, Vol. 108, No. 10.
-
Proceedings of the National Academy of Sciences of the USA
, vol.108
, Issue.10
-
-
Schneidera, C.M.1
Moreirab, A.A.2
Andrade, J.S.3
Havlinc, S.4
Herrmanna, H.J.5
-
36
-
-
80051801375
-
Denial of Service Attacks in Wireless Networks: The case of Jammers
-
K Pelechrinis, M Iliofotou and S. V. Krishnamurthy, "Denial of Service Attacks in Wireless Networks: The case of Jammers", IEEE Communications Surveys & Tutorials, Second Quarter 2011, Vol. 13 Issue 2, page 245-257.
-
(2011)
IEEE Communications Surveys & Tutorials, Second Quarter
, vol.13
, Issue.2
, pp. 245-257
-
-
Pelechrinis, K.1
Iliofotou, M.2
Krishnamurthy, S.V.3
-
37
-
-
84874557192
-
Network attack detection and defense
-
Published at Springerlink.com Feb 24
-
G. Carle, F. Dressler, R. A. Kemmerer, H. Koenig, C.Kruege and P. Laskov, "Network attack detection and defense", Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008, Published at Springerlink.com Feb 24, 2009.
-
(2009)
Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008
-
-
Carle, G.1
Dressler, F.2
Kemmerer, R.A.3
Koenig, H.4
Kruege, C.5
Laskov, P.6
-
38
-
-
32144444346
-
WiMax802.16 Threat Analysis
-
Michel Barbeau, "WiMax802.16 Threat Analysis", International Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet'05, October 13, 2005, Montreal, Quebec, Canada.
-
International Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet'05, October 13, 2005, Montreal, Quebec, Canada
-
-
Barbeau, M.1
|