1. 1 Abbot, C., Donnellan, C., Clarke, M., Hathorn, S., & Hickie, S. (eds) (2016) Hostile Drones: The Hostile Use of Drones by Non-State Actors. Oxford Research Group. Remote Control Project, 2016
2. 2 Adam P. W., Anderson, M. L., & Westfall, J. T. (2021) Countering Malicious small Unmanned Aerial System: Understanding the Problem for Border Security. United States Air Force Academy. AIAA Scitech Conference, Colorado Springs. 2021. 01. 21. Virtual Event. https://www.researchgate.net/publication/348257974_Countering_Malicious_Small_Unmanned_Aerial_Systems_Understanding_the_Problem_for_Border_Security [Letöltve: 2023. 10. 27.]
3. 3 Almohammad, A., & Speckhard, A. (2017) ISIS Drones: Evolution, Leadership, Bases, Operations and Logistics. International Center for the Study of Violent Extremism. http://www.icsve.org/research-reports/isis-drones-evolution-leadership-bases-operations-and-logistics/ [Letöltve: 2024. 01. 05.]
4. 4 Al-Obaidi, A. S. M., Phang, S. K., & How, Y. G. (2019) Improving aerodynamic efficiency of a Skywalker drone. 13th International Engineering Research Conference (13th EURECA 2019). https://www.researchgate.net/publication/341171260_Improving_aerodynamic_efficiency_of_a_Skywalker_drone [Letöltve: 2023. 10. 29.]
5. 5 Altawy, R., & Youssef, A. M. (2016) Security, privacy, and safety aspects of civilian drones a survey. ACM Transactionson Cyber-Physical Systems, Vol. 1. No. 2. pp. 1-25.