참고문헌
- Z. Birnbaum, A. Dolgikh, V. Skormin, E. O'Brien, D. Muller, and C. Stracquodaine, "Unmanned aerial vehicle security using recursive parameter estimation," Journal of Intelligent & Robotic Systems, vol. 84, no. 1-4, pp. 107-120, 2016. https://doi.org/10.1007/s10846-015-0284-1
- J. Kwak and Y. Sung, "Beacon-based indoor location measurement method to enhanced common chordbased trilateration," Journal of Information Processing Systems, vol. 13, no. 6, pp. 1640-1651, 2017. https://doi.org/10.3745/JIPS.04.0053
- Z. Birnbaum, A. Dolgikh, V. Skormin, E. O'Brien, D. Muller, and C. Stracquodaine, "Unmanned aerial vehicle security using behavioral profiling," in Proceedings of 2015 International Conference on Unmanned Aircraft Systems (ICUAS), Denver, CO, 2015, pp. 1310-1319.
- E. Rivera, R. Baykov, and G. Gu, "A study on unmanned vehicles and cyber security," 2014; http://students.cse.tamu.edu/emy/report.pdf.
- A. R. Sobhy, R. A. Sadek, and A. Hashad, "Secure routing in UAV," International Journal of Computer Science and Information Security, vol. 11, no. 6, pp. 109-122, 2013.
- D. Stiawan, M. Y. B. Idris, and A. H. Abdullah, "Penetration testing and network auditing: Linux," Journal of Information Processing Systems, vol. 11, no. 1, pp. 104-115, 2015. https://doi.org/10.3745/JIPS.03.0013
- Common Vulnerabilities and Exposures, "CVE-2015-0235 (Ghost)," https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0235.
- Common Weakness Enumeration, "CWE-416: Use After Free," 2019; https://cwe.mitre.org/data/definitions/416.html.
- "Amazon IoT operating system FreeRTOS has serious vulnerabilities," 2018; https://blog.360totalsecurity. com/en/amazon-iot-operating-system-freertos-has-serious-vulnerabilities/.
- H. Choi, M. Geeves, B. Alsalam, and F. Gonzalez, "Open source computer-vision based guidance system for UAVs on-board decision making," in Proceedings of 2016 IEEE Aerospace Conference, Big Sky, MT, 2016, pp. 1-5.
- L. C. B. Da Silva, R. M. Bernardo, H. A. De Oliveira, and P. F. Rosa, "Multi-UAV agent-based coordination for persistent surveillance with dynamic priorities," in Proceedings of 2017 International Conference on Military Technologies (ICMT), Brno, Czech Republic, 2017, pp. 765-771.
- F. Yu, G. Chen, N. Fan, Y. Song, and L. Zhu, "Autonomous flight control law for an indoor UAV quadrotor," in Proceedings of the 29th Chinese Control and Decision Conference (CCDC), Chongqing, China, 2017, pp. 6767-6771.
- S. H. VanderLeest, "The open source, formally-proven seL4 microkernel: considerations for use in avionics," in Proceedings of 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), Sacramento, CA, 2016, pp. 1-9.
- A. Lackorzynski and A. Warg, "Demo abstract: timing aware hardware virtualization on the L4Re microkernel systems," in Proceedings of 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), Vienna, Austria, 2016, pp. 1-1.
- X. Wang, R. Habeeb, X. Ou, S. Amaravadi, J. Hatcliff, M. Mizuno, M. Neilsen, S. Raj Rajagopalan, and S. Varadarajan, "Enhanced security of building automation systems through microkernel-based controller platforms," in Proceedings of 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), Atlanta, GA, 2017, pp. 37-44.