최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.32 no.1, 2022년, pp.39 - 48
서강욱 (고려대학교 정보보호대학원) , 김휘강 (고려대학교 정보보호대학원)
In this paper, we propose an anomaly detection system (ADS) to detect anomalies of the in-vehicle network for unmanned aerial vehicle (UAV). The proposed ADS detects the anomalies by measuring the similarity of status messages sequences periodically sent by the UAV to the ground control system. We d...
Hayat, S., Yanmaz, E., Muzaffar, R., "Survey on unmanned aerial vehicle networks for civil applications: A communications viewpoint," IEEE Communications Surveys Tutorials, 18(4), pp. 2624-2661, 2016.
Meier, L., "Dynamic Robot Architecture for Robust Realtime Computer Vision," Ph.D. thesis ETH Zurich, 2017.
Uncomplicated application-layer vehicular computing and Networking. Uncomplicated Application-layer Vehicular Computing And Networking, https://uavcan.org/, November 5. 2021.
Wikimedia Foundation. "Iran-U.S. RQ-170 incident". https://en.wikipedia.org/wiki/Iran%E2%80%93U.S._RQ-170_incident, October 19. 2021.
Bozdal, M., Samie, M., & Jennions, I., "A survey on can bus protocol: Attacks, challenges, and potential solutions," In 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), pp. 201-205, Aug. 2018.
Olufowobi, H., Young, C., Zambreno, J., Bloom, G., "Saiducant: Specificationbased automotive intrusion detection using controller area network (can) timing," IEEE Transactions on Vehicular Technology, 69(2), pp. 1484-1494, 2020.
Sun, H., Lee, S.Y., Joo, K., Jin, H., Lee, D.H., "Catch id if you can: Dynamic id virtualization mechanism for the controller area network," IEEE Access, 7, pp. 158237-158249, 2019.
Tariq, S., Lee, S., Kim, H.K., Woo, S.S., "Can-adf: The controller area network attac kdetection framework," Computers & Security, 94, pp. 101857, 2020.
Wang, Q., Lu, Z., Qu, G., "An entropy analysis based intrusion detection system for controller area network in vehicles," In 2018 31st IEEE International System-on-Chip Conference (SOCC), pp. 90-95, 2018.
Birnbaum, Z., Dolgikh, A., Skormin, V., O'Brien, E., Muller, D., "Unmanned aerial vehicle security using recursive parameter estimation,"In: 2014 International Conference on Unmanned Aircraft Systems (ICUAS), pp. 692-702, 2014.
Kim, K.H., Nalluri, S., Kashinath, A., Wang, Y., Mohan, S., Pajic, M., Li, B., "Security analysis against spoofing attacks for distributed uavs," In: Decentralized IoT Systems and Security, 2020.
Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D., "Cloud-based cyberphysical intrusion detection for vehicles using deep learning," IEEE Access, 6, pp. 3491-3508, 2018.
Sedjelmaci, H., Senouci, S.M., Ansari, N., "Ahierarchical detection and response system to enhance security against lethal cyber-attacks in uav networks," IEEE Transactions on Systems, Man, and Cybernetics: Systems, 48(9), pp. 1594-1606, 2018.
Meng, L., Ren, S., Tang, G., Yang, C., & Yang, W.," Uav sensor spoofing detection algorithm based on gps and optical flow fusion," In Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, pp. 146-151, Jan. 2020.
Kapoor, P., Vora, A., Kang, K.D., "Detecting and mitigating spoofing attack against an automotive radar," In: 2018 IEEE 88th Vehicular Technology Conference (VTCFall). pp. 1-6, 2018.
Panice, G., Luongo, S., Gigante, G., Pascarella, D., Di Benedetto, C., Vozella, A., Pescap'e, A., "A svm-based detection approach for gps-spoofing attacks to uav," In: 2017 23rd International Conference on Automation and Computing (ICAC), pp. 1-11, 2017.
Ebeid, E., Skriver, M., & Jin, J., "A survey on open-source flight control platforms of unmanned aerial vehicle," In 2017 Euromicro Conference on Digital System Design (DSD), pp. 396-402, Aug. 2017.
Koubaa, A., Allouch, A., Alajlan, M., Javed, Y., Belghith, A., & Khalgui, M., "Micro air vehicle link (mavlink) in a nutshell: A survey," IEEE Access, 7, pp. 87658-87680, 2019.
Chandola, V., Banerjee, A., & Kumar, V., "Anomaly detection for discrete sequences: A survey," IEEE transactions on knowledge and data engineering, 24(5), pp. 823-839, 2010.
Levenshtein, V. I., "Binary codes capable of correcting deletions, insertions, and reversals," In Soviet physics doklady, 10(8), pp. 707-710, Feb. 1966.
Jaccard, P. "Etude comparative de la distribution florale dans une portiondes Alpes et des Jura," Bull Soc Vaudoise Sci Nat, 37, pp. 547-579, 1901.
Jaro, M. A., "Advances in record-linkage methodology as applied to matching the 1985 census of Tampa, Florida," Journal of the American Statistical Association, 84(406), pp. 414-420, 1989.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.