Club de la sécurité de l'information français (CLUSIF), 2010. ,
Principles of information security, 2012. ,
Detection of gps spoofing based on uav model estimation, IECON 2016 -42nd Annual Conference of the IEEE Industrial Electronics Society, pp.6097-6102, 2016. ,
A vision-based gps-spoofing detection method for small uavs, 2017 13th International Conference on Computational Intelligence and Security (CIS), pp.312-316, 2017. ,
Analysis and decoding of radio signals for remote control of drones, 2016 New Trends in Signal Processing (NTSP), pp.1-5, 2016. ,
A secure communication framework for large-scale unmanned aircraft systems, 2013 Integrated Communications, Navigation and Surveillance Conference (ICNS), pp.1-12, 2013. ,
False data injection on ekf-based navigation control, 2017 International Conference on Unmanned Aircraft Systems (ICUAS), pp.1608-1617, 2017. ,
Controlling uavs with sensor input spoofing attacks, 10th USENIX Workshop on Offensive Technologies ,
, , 2016.
Unmanned aerial vehicle smart device ground control station cyber security threat model, 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp.722-728, 2013. ,
An overview of unmanned aerial vehicle: Cyber security perspective, pp.128-131, 2016. ,
A study on cyber-security of autonomous and unmanned vehicles, The Journal of Defense Modeling and Simulation, vol.12, issue.4, pp.369-381, 2015. ,
A review on cybersecurity vulnerabilities for unmanned aerial vehicles, International Symposium on Safety, Security and Rescue Robotics (SSRR), pp.194-199, 2017. ,
Cyber security threat analysis and modeling of an unmanned aerial vehicle system, 2012 IEEE Conference on Technologies for Homeland Security (HST), pp.585-590, 2012. ,
Drones for smart cities: Issues in cybersecurity, privacy, and public safety, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), pp.216-221, 2016. ,
How to Safely Flight Test a UAV Subject to Cyber-Attacks, Georgia Tech Research Institute, Tech. Rep, 2015. ,
Rocking drones with intentional sound noise on gyroscopic sensors, 24th USENIX Security Symposium (USENIX Security 15, pp.881-896, 2015. ,
, Information technology -Security techniques -Information security risk management, International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) Std, 2011.
Security Application of Failure Mode and Effect Analysis (FMEA), Computer Safety, Reliability, vol.8666, pp.310-325, 2014. ,
Modeling security threats, Dr. Dobb's Journal, 1999. ,
Security requirements for automotive on-board networks based on dark-side scenarios, EVITA, Tech. Rep, 2009. ,
A methodology for systematic attack trees generation for interoperable medical devices, 2016 Annual IEEE Systems Conference (SysCon), pp.1-7, 2016. ,
The use of attack trees in assessing vulnerabilities in SCADA systems, IEEE Conf. International Infrastructure Survivability Workshop (IISW 04). Institute for Electrical and Electronics Engineers, 2004. ,
Specification and evaluation of e-security relevant use cases. deliverable d2.1: Evita. e-safety vehicle intrusion protected applications, 2007. ,
, Guideline on collecting and presenting system and operation information for a specific UAS operation, 2017.
, , vol.102, 2015.
Attack trees for practical security assessment: Ranking of attack scenarios with adtool 2.0," in Quantitative Evaluation of Systems, pp.159-162, 2016. ,