Sign in

Vulnerabilities and Attacks Analysis for Military and Commercial IoT Drones.

Ralph RestituyoThaier Hayajneh
Published in: UEMCON (2018)
Keyphrases
  • data analysis
  • data sets
  • management system
  • digital images
  • denial of service attacks