1. Yaacoub, J.P., Noura, H., Salman, O., Chehab, A.: Security analysis of drones systems: Attacks, limitations, and recommendations. Internet Things 11, 100218 (2020)
2. Altawy, R., Youssef, A.M.: Security, privacy, and safety aspects of civilian drones: a survey dl.acm.org, 1(7), 1–25 (2016). https://dl.acm.org/doi/abs/10.1145/3001836
3. Li, J., Zhou, Y., Lamont, L.: Communication architectures and protocols for networking unmanned aerial vehicles. ieeexplore.ieee.org, 2013. https://ieeexplore.ieee.org/abstract/document/6825193/
4. Kumar, K., Kumar, S., Kaiwartya, O., Kashyap, P.K., Lloret, J., Song, H.: Drone assisted flying ad-hoc networks: Mobility and service oriented modeling using neuro-fuzzy. Ad Hoc Netw. 106, 102242 (2020). https://www.sciencedirect.com/science/article/pii/S1570870520301062
5. Zhu, B., Joseph, A., Sastry, S.: A taxonomy of cyber attacks on scada systems, Proceedings - 2011 IEEE International Conferences on Internet of Things and Cyber. Phys. Social Comput., iThings/CPSCom 2011, 380–388 (2011)