Cyber Security Issues in The Control of UAV’s Robotic and IoT Systems

2018-10-26
Başaran, Dilek
Konukseven, Erhan İlhan

Suggestions

Cyber threat intelligence sharing technologies and threat sharing model using blockchain
Özdemir, Ahmet; Acar, Aybar Can; Özgit, Attila; Department of Cybersecurity (2021-5-7)
Against the measures taken, the nature of the threats in the cyber environment is evolving day by day. While script kiddie made amateur cyber attacks were usually experienced beforehand, more sophisticated and targeted attacks are frequently encountered nowadays. Besides that, commonly used signature based techniques for attack detection and threat information staying within organization is insufficient for dynamically changing, organized and targeted threats. Furthermore, with the advance of new technolog...
Cyber Security by a New Analogy: "The Allegory of the 'Mobile'Cave"
Canbek, Gurol (Informa UK Limited, 2018-01-01)
Mobile devices as the most pervasive technology enablers also bring new security risks in cyberspace. However, related cyber security studies mainly focus on technologies and practices rather than fundamentals and root causes. These studies may also omit the current scientific knowledge gained on other relevant or irrelevant domains that may be adapted to cyber security and ignore human nature that is more important than technology and processes. This study surveys and associates all the analogical methods ...
Cyber Warfare Integration to Conventional Combat Modeling: A Bayesian Framework
Sengul, Zafer; Acartürk, Cengiz (2021-01-01)
© 2021 IEEE.Malware propagation is capable of introducing adverse effects in military operations since today's high-tech military weapons and command, control, and communication systems are essentially interconnected ICT systems. Conventional warfare models have been recently upgraded to include cyber warfare elements to reflect the potential influence of cyber-attacks. In the present study, we propose and evaluate a framework for modeling the integrated effect of the spread of malware through computer netw...
Wireless Measurement of Elastic and Plastic Deformation by a Metamaterial-Based Sensor
Ozbey, Burak; DEMİR, Hilmi Volkan; Kurç, Özgür; ERTÜRK, VAKUR BEHÇET; ALTINTAŞ, AYHAN (2014-10-01)
We report remote strain and displacement measurement during elastic and plastic deformation using a metamaterial-based wireless and passive sensor. The sensor is made of a comb-like nested split ring resonator (NSRR) probe operating in the near-field of an antenna, which functions as both the transmitter and the receiver. The NSRR probe is fixed on a standard steel reinforcing bar (rebar), and its frequency response is monitored telemetrically by a network analyzer connected to the antenna across the whole ...
Smart sensing system for enhanceing reliability of power electronic devices used in wind turbines
Teay, S. H.; Batunlu, C.; Albarbar, A. (2017-06-01)
Reliability of modern power systems, in particular those use wind and solar energies, is affected by the relatively short lifetime of the associated power electronic converters (PECs). Thermal stress has been identified as one of the commonest causes for failures in PECs. However, existing thermal monitoring systems are expensive, bulky and with no intelligent capabilities, which limit their full acceptance as monitoring and control tools in operational power plants. This work presents autonomous and inexpe...
Citation Formats
D. Başaran and E. İ. Konukseven, “Cyber Security Issues in The Control of UAV’s Robotic and IoT Systems,” 2018, Accessed: 00, 2021. [Online]. Available: https://hdl.handle.net/11511/82747.