Nothing Special   »   [go: up one dir, main page]

Ding et al., 2018 - Google Patents

An amateur drone surveillance system based on the cognitive Internet of Things

Ding et al., 2018

View PDF
Document ID
4039997987535082767
Author
Ding G
Wu Q
Zhang L
Lin Y
Tsiftsis T
Yao Y
Publication year
Publication venue
IEEE Communications Magazine

External Links

Snippet

Drones, also known as mini-unmanned aerial vehicles, have attracted increasing attention due to their boundless applications in communications, photography, agriculture, surveillance, and numerous public services. However, the deployment of amateur drones …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Similar Documents

Publication Publication Date Title
Ding et al. An amateur drone surveillance system based on the cognitive Internet of Things
Wang et al. Counter-unmanned aircraft system (s)(C-UAS): State of the art, challenges, and future trends
Kang et al. Protect your sky: A survey of counter unmanned aerial vehicle systems
Solodov et al. Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities
Khan et al. On the detection of unauthorized drones—Techniques and future perspectives: A review
Laghari et al. Unmanned aerial vehicles: A review
US11521128B2 (en) Threat assessment of unmanned aerial systems using machine learning
Alhafnawi et al. A survey of indoor and outdoor uav-based target tracking systems: Current status, challenges, technologies, and future directions
Swinney et al. A review of security incidents and defence techniques relating to the malicious use of small unmanned aerial systems
Thakur et al. Artificial intelligence techniques in smart cities surveillance using UAVs: A survey
Saleh et al. Proposing a privacy protection model in case of civilian drone
Yasmine et al. Survey on current anti-drone systems: process, technologies, and algorithms
Dwivedi et al. Intelligent autonomous drones in Industry 4.0
Lee et al. A systems analysis of energy usage and effectiveness of a counter-unmanned aerial system using a cyber-attack approach
Shah et al. Use of AI applications for the drone industry
Topalli et al. Real time implementation of drone detection using tensorflow and mobilenetv2-ssd
Umer et al. Enhanced Machine Learning Ensemble Approach for Securing Small Unmanned Aerial Vehicles from GPS Spoofing Attacks
Ajakwe et al. Radicalization of Airspace Security: Prospects and Botheration of Drone Defense System Technology
Diamantidou et al. A multimodal AI-leveraged counter-UAV framework for diverse environments
Hossain et al. MT-AAAU: Design of monitoring and tracking for anti-abuse of amateur UAV
Intwala et al. System to capture WiFi based Drones using IoT
Gonzalez-Jorge et al. Counter Drone Technology: A Review
Ghazlane et al. Real-Time Airborne Target Tracking using DeepSort Algorithm and Yolov7 Model.
Xie et al. Cybersecurity trends in low-altitude air traffic management
Chidella et al. Prior detection of explosives to defeat tragic attacks using knowledge based sensor networks