ТЕХНОЛОГІЇ ТА СИСТЕМИ ПРОТИДІЇ ЗАГРОЗАМ ВІД МАЛИХ ДРОНІВ
Анотація
Технології протидії дронам (дронам) можуть мати різне призначення, але водночас відігравати важливу роль у забезпеченні безпеки. Усі системи протидії загрозам безпілотників можна розділити на дві великі категорії: обладнання для моніторингу та засоби протидії.Посилання
Advanced in the telecommunications 2019: monograph / by edited M.Y. Ilchenko, S.O. Kravchuk, Kyiv, 2019, 336 p. (ISBN 978-617-7734-12-2).
Kaidenko, M., Kravchuk, S. (2023). Principles of Constructing Communication and Control Systems Protected from the Effects of Jamming Attacks for Small-Sized Unmanned Aerial Vehicles. In: Ilchenko, M., Uryvsky, L., Globa, L. (eds) Progress in Advanced Information and Communication Technology and Systems. MCiT 2021. Lecture Notes in Networks and Systems, vol 548. Springer, Cham. (ISSN2367-3370, E-ISSN2367-3389) – pp. 399-418, https://doi.org/10.1007/978-3-031-16368-5_20
Kaidenko M., Kravchuk S. Protection against the effect of different classes of attacks on UAV control channels // Information and Telecommunication Sciences. – No. 1 (2022) . – р. 35-43, DOI: https://doi.org/10.20535/2411-2976.12022.35-43
##submission.downloads##
Опубліковано
Як цитувати
Номер
Розділ
Ліцензія
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.