1. Comprehensive review of UAV detection, security, and communication advancements to prevent threats;Abro;Drones,2022
2. Cárdenas, A.A., Amin, S., Lin, Z.S., Huang, Y.L., Huang, C.Y., and Sastry, S. (2011). Attacks against process control systems: risk assessment, detection, and response. In Proc. of the 6th ACM symposium on information, computer and communications security, 355–366.
3. Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., and Kohno, T. (2011). Comprehensive experimental analyses of automotive attack surfaces. In Proc. of the 20th USENIX security symposium.
4. Efimov, D., Zolghadri, A., and Simon, P. (2011). Fault detection improving by extended Kalman filter adjustment for oscillatory failure case in aircrafts. In Proc. of 4th European Conference for Aerospace Sciences. St. Petersburg, Russia.
5. The use of unmanned aerial vehicles (uavs) for remote sensing and mapping;Everaerts;The Int. Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences,2008