최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기항공우주시스템공학회지 = Journal of aerospace system engineering, v.17 no.4, 2023년, pp.133 - 143
서승오 (한국원자력연구원 보안기술연구실) , 이용구 (한국원자력연구원 보안기술연구실) , 이세훈 (한국원자력연구원 보안기술연구실) , 오승렬 (한국원자력연구원 보안기술연구실) , 손준영 (한국원자력연구원 보안기술연구실)
As drones (also known as UAV) become popular with advanced information and communication technology (ICT), they have been utilized for various fields (agriculture, architecture, and so on). However, malicious attackers with advanced drones may pose a threat to critical national infrastructures. Thus...
Wang, Jian, Yongxin Liu, and Houbing Song, "Counter-Unmanned Aircraft System (s)(C-UAS): State of the Art, Challenges, and Future Trends." IEEE Aerospace and Electronic Systems Magazine, 36.3 (2021), pp. 4-29, 2021?
KAERI(Korea Atomic Energy Research Institute), "Development of Intelligent Anti-Drone Technology(Based on Drone-cops and Live-Forensics) " Co-Planning of Research Report, KAERI(Korea Atomic Energy Research Institute), Daejeon, 2020?
Solodov, Alexander, et al, "Analyzing the Threat of Unmanned Aerial Vehicles (UAV) to Nuclear Facilities." Security Journal, 31 (2018), pp. 305-324, 2018?
Belwafi, Kais, et al, "Unmanned Aerial Vehicles' Remote Identification: A Tutorial and Survey." IEEE Access, 10 (2022), pp. 87577-87601, 2022?
Bender, Conner, "DJI Drone IDs are not Encrypted." arXiv preprint, arXiv:2207.10795 (2022), 2022?
DJIDroneIDSpoof, https://github.com/DJISDKUser/metasploit-framework/blob/DJIDroneIDSpoof/modules/auxiliary/dos/wifi/droneid.rb?
ESP8266_DJI_DroneID_Throwie, https://github.com/DJISDKUser/ESP8266_DJI_DroneID_Throwie?
Kerns, Andrew, et al, "Unmanned Aircraft Capture and Control via GPS Spoofing." Journal of Field Robotics, 31.4 (2014), pp. 617-636, 2014?
GASPAR, Joao, et al, "Capture of UAVs through GPS Spoofing", 2018 Global Wireless Summit (GWS), IEEE, pp. 21-26, 2018.?
Brad, Haines, "DEFCON 20: Hacker + Airplanes No Good Can Come Of This", DEFCON 20, 2012?
Costin, Andrei, and Aurelien Francillon, "Ghost in the Air (Traffic): On Insecurity of ADS-B Protocol and Practical Attacks on ADS-B Devices." black hat USA, 1 (2012), pp. 1-12, 2012?
Schafer, Matthias, Vincent Lenders, and Ivan Martinovic, "Experimental Analysis of Attacks on Next Generation Air Traffic Communication." Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Canada, pp. 253-271, 2013.?
Aeroscope-Mobile-Station, https://store.dji.bg/en/aeroscope-mobile-station.html?
CVE-2022-29945, https://cve.mitre.org/cgi-bin/cvename.cgi?nameCVE-2022-29945?
Department 13, "White Paper: Anatomy of DJI's Drone Identification Implementation.", Department 13, Australia, 2017?
Kismet DJI DroneID, https://github.com/kismetwireless/kismet/blob/master/kaitai_definitions_disabled/dot11_ie_221_dji_droneid.ksy?
Drone-ID Receiver for DJI OcuSync 2.0, https://github.com/RUB-SysSec/DroneSecurity?
DJI DroneID RF Analysis, https://github.com/proto17/dji_droneid?
Schiller, Nico, et al, "Drone Security and the Mysterious Case of DJI's DroneID." Network and Distributed System Security Symposium (NDSS), 2023.?
DJI Aeroscope, https://www.dji.com/kr/aeroscope
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.