Login / Signup
Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones.
Narayana Murari Gowrishetty
Sai Sree Laya Chukkapalli
Anupam Joshi
Published in:
INFOCOM Workshops (2023)
Keyphrases
</>
command and control
countermeasures
malicious attacks
situation awareness
target tracking
databases
ddos attacks
attack detection
information systems
image sequences
target recognition
security risks
digital watermark
malicious users