Login / Signup

UAV Attack Detection and Mitigation Using a Localization Verification-Based Autoencoder.

Ahmed AladiEmad Alsusa
Published in: IEEE Access (2023)
Keyphrases
  • attack detection
  • multistage
  • intrusion detection system
  • intrusion detection
  • risk management
  • attack scenarios
  • anomaly detection
  • network traffic
  • computer networks
  • cyber attacks
  • product recommendation