1. Multi‐level trust‐based intelligence schema for securing of Internet of Things (IoT) against security threats using cryptographic authentication;Mabodi K.;J. Supercomput.,2020
2. T.Fox‐Brewster.Maldrone: Watch Malware That Wants to Spread its Wings Kill a Drone Mid‐Flight.Forbes. Accessed: Feb. 27 2021. [Online]. Available:https://www.forbes.com/sites/thomasbrewster/2015/01/27/malware‐takes‐downdrone/?sh=65e60af44c92.
3. Operator Strategy Model Development in UAV Hacking Detection
4. Security analysis of drones systems: Attacks, limitations, and recommendations
5. Role of Cyber Security in Drone Technology