The vulnerability of UAVs to cyber attacks - An approach to the risk assessment.
Kim HartmannChristoph SteupPublished in: CyCon (2013)
Keyphrases
- risk assessment
- cyber attacks
- network security
- cyber security
- intrusion detection system
- countermeasures
- information security
- critical infrastructure
- security policies
- dos attacks
- risk analysis
- unmanned aerial vehicles
- intrusion detection
- risk management
- risk factors
- computer networks
- network traffic
- decision making
- computer systems
- security issues
- smart grid
- anomaly detection
- real world
- cost effective
- security mechanisms
- access control
- artificial neural networks
- artificial intelligence