Ding et al., 2018 - Google Patents
An amateur drone surveillance system based on the cognitive Internet of ThingsDing et al., 2018
View PDF- Document ID
- 4039997987535082767
- Author
- Ding G
- Wu Q
- Zhang L
- Lin Y
- Tsiftsis T
- Yao Y
- Publication year
- Publication venue
- IEEE Communications Magazine
External Links
Snippet
Drones, also known as mini-unmanned aerial vehicles, have attracted increasing attention due to their boundless applications in communications, photography, agriculture, surveillance, and numerous public services. However, the deployment of amateur drones …
- 230000001149 cognitive 0 title abstract description 22
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ding et al. | An amateur drone surveillance system based on the cognitive Internet of Things | |
Wang et al. | Counter-unmanned aircraft system (s)(C-UAS): State of the art, challenges, and future trends | |
Kang et al. | Protect your sky: A survey of counter unmanned aerial vehicle systems | |
Solodov et al. | Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities | |
Khan et al. | On the detection of unauthorized drones—Techniques and future perspectives: A review | |
Laghari et al. | Unmanned aerial vehicles: A review | |
US11521128B2 (en) | Threat assessment of unmanned aerial systems using machine learning | |
Alhafnawi et al. | A survey of indoor and outdoor uav-based target tracking systems: Current status, challenges, technologies, and future directions | |
Swinney et al. | A review of security incidents and defence techniques relating to the malicious use of small unmanned aerial systems | |
Thakur et al. | Artificial intelligence techniques in smart cities surveillance using UAVs: A survey | |
Saleh et al. | Proposing a privacy protection model in case of civilian drone | |
Yasmine et al. | Survey on current anti-drone systems: process, technologies, and algorithms | |
Dwivedi et al. | Intelligent autonomous drones in Industry 4.0 | |
Lee et al. | A systems analysis of energy usage and effectiveness of a counter-unmanned aerial system using a cyber-attack approach | |
Shah et al. | Use of AI applications for the drone industry | |
Topalli et al. | Real time implementation of drone detection using tensorflow and mobilenetv2-ssd | |
Umer et al. | Enhanced Machine Learning Ensemble Approach for Securing Small Unmanned Aerial Vehicles from GPS Spoofing Attacks | |
Ajakwe et al. | Radicalization of Airspace Security: Prospects and Botheration of Drone Defense System Technology | |
Diamantidou et al. | A multimodal AI-leveraged counter-UAV framework for diverse environments | |
Hossain et al. | MT-AAAU: Design of monitoring and tracking for anti-abuse of amateur UAV | |
Intwala et al. | System to capture WiFi based Drones using IoT | |
Gonzalez-Jorge et al. | Counter Drone Technology: A Review | |
Ghazlane et al. | Real-Time Airborne Target Tracking using DeepSort Algorithm and Yolov7 Model. | |
Xie et al. | Cybersecurity trends in low-altitude air traffic management | |
Chidella et al. | Prior detection of explosives to defeat tragic attacks using knowledge based sensor networks |