최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국지능시스템학회 논문지 = Journal of Korean institute of intelligent systems, v.27 no.3, 2017년, pp.230 - 235
As developing information communication technologies, drones are wide applied to various service areas. Under the wireless environment, control messages for a drone are ease revealed to everyone and attacker can get the control privilege of a drone. In this paper, permutation functions are used to e...
Wang Do Huy, Jung Hoon, Yoon Dae Sub, "A Study on Drone Logistics Delivery Use Cases and Development Direction in Future", KISC Proceedings of the 2016 Summer Conference, vol. 60, pp. 624-625, 2016.
KISA Report, Power Review, May 2015.
A. Khan, "Hacking the Drones", Available : https://www.owasp.org/images/5/5e/OWASP201604_Drones.pdf [Accessed: Nov. 7, 2016]
J. Pleban, R. Band, and R. Creutzburg, "Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy", IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics, 2014.
T. Fox-Brewster, "Maldrone: Watch Malware That Wants To Spread Its Wings Kill A Drone Mid-Flight", Forbes Magazine, Available : http://www.forbes.com/sites/thomasbrewster/2015/ 01/27/malware-takes-down-drone/#48c6446dc8 95, [Accessed: Nov. 15, 2016]
J. Won, S. Seo, E. Bertino, "A Secure Communication Protocol for Drones and Smart Objects", ASIA CCS '15 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp.249-260, 2015.
AR.Drone Developer Guide SDK 1.6
Thomas W. Judson, Abstract Algebra Theory and Applications, Orthogonal Publishing L3C; 2015 edition, 2015.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.