최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of Internet Computing and Services = 인터넷정보학회논문지, v.25 no.1, 2024년, pp.157 - 166
박병준 (Department of Cyber) , 김철중 (Department of Cyber protection, ROKA Signal school)
The Army TIGER System, which is being deployed to implement a future combat system, is expected to bring innovative changes to the army's combat methods and comabt execution capability such as mobility, networking and intelligence. To this end, the Army will introduce various systems using drones, r...
보안뉴스, "범세계적 사이버 보안 위협 극복방안은??'민관협력'과 파트너국가간 소통", 23.7.17,?https://m.boannews.com/html/detail.html?idx120145
육군본부 사이버작전센터, 사이버작전수행지침
육군본부, Army TIGER 종합발전 실행계획
국방일보, "육군 아미타이거 부대 통합 네트워크 구축 속도 낸다," 23.7.13. https://www.mnd.go.kr/cop/kookbang/kookbangIlboView.do?categoryCodedema0004&boardSeq35434&idmnd_020102000000
김귀근, "백두산 호랑이 상징 AI 지상전투체계 시동,"연합뉴스, 2018.?https://www.yna.co.kr/view/AKR2018093004150001
Junseob Kim, Sangjun Park, Jinho Cha, Yongchul Ki,?"Future tactical communication system development?plan through Army TIGER information distribution?capability analysi", Journal of Convergence for?Information Technology, Vol. 21, No. 4, PP. 23-30,?2021.?https://doi.org/10.22156/CS4SMB.2021.11.06.014
뉴스투데이, "공군, 차세대 사이버방어 기술 MTD?적용한 운영시험 성공", 22.9.29.,?https://www.news2day.co.kr/article/20220929500028
방위산업청, "첨단과학기술을 활용한 미래무기 무인.로봇 체계-미래무기 Part1", 2017.6.20.,?https://m.blog.naver.com/dapapr/221033207078
무인이동체 드론의 취약점분석 및 대응기술 연구 동향, 정보보호학회지, Vol. 30, No. 2, PP.49-57, 2020.?https://scienceon.kisti.re.kr/commons/util/originalView.do?cnJAKO202013965595426&oCnJAKO202013965595426&dbtJAKO&journalNJOU00291864
Arteaga, S. P., Hernandez, L. A. M., Perez, G.S.,?Orozco, A. L. S., and Villalba, L. J. G., "Analysis of?the GPS Spoofing Vulnerability inthe Drone 3DR?Solo," IEEE Access, Vol. 7, pp. 51782-51789, 2019.?https://doi.org/10.1109/ACCESS.2019.2911526
Dey, V., Pudi, V., Chattopadhyay, A., and Elovici, Y.,?"Security vulnerabilities of unmanned aerial vehicles?and countermeasures: An experimental study," 2018?31st International Conference on VLSI Design and 2018?17th International Conference on Embedded Systems?(VLSID), IEEE, pp. 398-403, 2018.?https://doi.org/10.1109/VLSID.2018.97
Son, Y., Noh, J., Choi, J., and Kim, Y., "Gyrosfinger:?Fingerprinting drones for location tracking based on the?outputs of mems gyroscopes." ACM Transactions on?Privacy and Security (TOPS), 21.2, 1-25, 2018.?https://doi.org/10.1145/3177751
Son, Y., Shin, H., Kim, D., Park, Y., Noh, J Choi, K.,?and Kim, Y., "Rocking drones with intentional sound?noise on gyroscopic sensors, In 24th {USENIX}?Security Symposium ({USENIX} Security 15), pp.?881-896., 2015.?https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-son-updated.pdf
Nunez, J., Tran, V., and Katangur, A., "Protecting the?Unmanned Aerial Vehicle from Cyberattacks," In?Proceedings of the International Conference on Security?and Management (SAM), The Steering Committee of?The World Congress in Computer Science, Computer?Engineering and Applied Computing (WorldComp). pp.?154-157, 2019.?https://www.proquest.com/openview/444cac98c1c13da04b8d796e175ed3b6/1.pdf?pq-origsitegscholar&cbl1976342
Kwon, Y. M., Yu, J., Cho, B. M., Eun, Y., and Park,?K. J., "Empirical analysis of mavlink protocol?vulnerability for attacking unmanned aerial vehicles,"?IEEE Access, 6, 43203-43212, 2018.?https://doi.org/10.1109/ACCESS.2018.2863237
Bonilla, C. A. T., Parra, O. J. S., and Forero, J. H. D.,?"Common security attacks on drones," International?Journal of Applied Engineering Research, 13(7),?4982-4988, 2018.?https://www.ripublication.com/ijaer18/ijaerv13n7_51.pdf
Domin, K., Symeonidis, I., and Marin, E. "Security?analysis of the drone communication protocol: Fuzzing?the MAVLink protocol," 2016.?https://www.esat.kuleuven.be/cosic/publications/thesis-284.pdf
동아일보, "규제와 규제개혁사이 나는 드론과 쫓는?규제", 2017.8.4. https://www.donga.com/news/It/article/all/20170804/85682209/1
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.