[1] Lasi, H., Fettke, P., Kemper, H-G., Feld, T., & Hoffmann, M. (2014). Industry 4.0.
Business & Information Systems Engineering,
6(4), 239-242.
https://doi.org/10.1007/s12599-014-0334-4
[3] Choudhary, G., Sharma, V., Gupta, T., Kim, J., & You, I. (2018, Auguest 29- September 1).
Internet of drones (iod): Threats, vulnerability, and security perspectives. The 3rd International Symposium on Mobile Internet Security, Cebu, Philippines.
https://doi .org/10.48550/arXiv.1808.00203
[5] Yazdinejad, A., Parizi, R. M., Dehghantanha, A., Karimipour, H., Srivastava, G., & Aledhari, M. (2021). Enabling Drones in the Internet of Things With Decentralized Blockchain-Based Security.
Institute of Electrical and Electronics Engineers Internet of Things Journal,
8(8), 6406-6415.
https://doi.org/10.1109/JIOT.2020.3015382
[6] Boursianis, A. D., Papadopoulou, M. S., Diamantoulakis, P., Liopa-Tsakalidi, A., Barouchas, P., Salahas, G., Karagiannidis, G., Wan, S., & Goudos, S. K. (2022). Internet of Things (IoT) and Agricultural Unmanned Aerial Vehicles (UAVs) in smart farming: A comprehensive review.
Internet of Things,
18(24), 100187.
https://doi.org/10.1016/j .iot.2020.100187
[7] Magistretti, S., & Dell’Era, C. (2019). Unveiling opportunities afforded by emerging technologies: evidences from the drone industry.
Technology Analysis & Strategic Management,
31(5), 606-623.
https://doi.org/10.1080/09537325.2018.1538497
[9] Vattapparamban, E., İ, G., Yurekli, A. İ., Akkaya, K., & Uluağaç, S. (2016, September 5-9).
Drones for smart cities: Issues in cybersecurity, privacy, and public safety. 2016 International Wireless Communications and Mobile Computing Conference, Paphos, Cyprus.
https://doi.org/10.1109/IWCMC.2016.7577060
[11] Kharchenko, V., & Torianyk, V. (2018, May 24-27).
Cybersecurity of the Internet of Drones: Vulnerabilities analysis and IMECA based assessment. 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies, Kyiv, UKraine
https://doi.org/10.1109/DESSERT.2018.8409160
[12] Riahi Manesh, M., & Kaabouch, N. (2019). Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions.
Computers & Security,
85, 386-401.
https://doi.org/10.1016/j.cose.2019.05.003
[14] Altawy, R., & Youssef, A. M. (2016). Security, privacy, and safety aspects of civilian drones: A survey.
Association for Computing Machinery Transactions on Cyber-Physical Systems,
1(2), 1-25.
https://doi.org/10.1145/3001836
[15] Singh, M., Aujla, G. S., Bali, R. S., Vashisht, S., Singh, A., & Jindal, A. (2020, September 25).
Blockchain-enabled secure communication for drone delivery: A case study in COVID-like scenarios. The 26th Annual International Conference on Mobile Computing and Networking, London, England, United Kingdom.
https://doi.org/10.1145/34140 45.3415937
[16] Garg, N., & Roy, N. (2020, March 3).
Acoustic Sensing for Detecting Projectile Attacks on Small Drones. Proceedings of the 21st International Workshop on Mobile Computing Systems and Applications, Austin, TX, USA.
https://doi.org/10.1145/3376897.3379167
[17] Garg, N., & Roy, N. (2020, March 3).
Enabling Self-defense in Small Drones. Proceedings of the 21st International Workshop on Mobile Computing Systems and Applications, Austin, TX, USA.
https://doi.org/10.1145/3376897.3377866
[18] Srinivas, J., Das, A. K., Kumar, N., & Rodrigues, J. J. P. C. (2019). TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment.
IEEE Transactions on Vehicular Technology,
68(7), 6903-6916.
https://doi.org/10.1109/TVT.2019.2911672
[19] Ali, Z., Chaudhry, S. A., Ramzan, M. S., & Al-Turjman, F. (2020). Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles.
Internet of Drones. Institute of Electrical and Electronics Engineers Access,
8, 43711-43724.
https://doi.org/10.1109/ACCESS.2020.2977817
[21] Yaacoub, J-P., Noura, H., Salman, O., & Chehab, A. (2020). Security analysis of drones systems: Attacks, limitations, and recommendations.
Internet of Things,
11, 100218.
https://doi.org/10.1016/j.iot.2020.100218
[22] Pandey, G. K., Gurjar, D. S., Nguyen, H. H., & Yadav, S. (2022). Security Threats and Mitigation Techniques in UAV Communications: A Comprehensive Survey.
Institute of Electrical and Electronics Engineers Access,
10, 112858-112897.
https://doi.org/ 10.1109/ACCESS.2022.3215975
[24] Agyapong, R. A., Nabil, M., Nuhu, A. R., Rasul, M. I., & Homaifar, A. (2021, December 5-7).
Efficient Detection of GPS Spoofing Attacks on Unmanned Aerial Vehicles Using Deep Learning 2021 IEEE Symposium Series on Computational Intelligence, Orlando, Florida, USA.
https://doi.org/10.1109/SSCI50451.2021.9659972
[25] Zhang, D., Chen, X., Wang, D., & Shi, J. (2018, June 18-21).
A Survey on Collaborative Deep Learning and Privacy-Preserving. 2018 IEEE Third International Conference on Data Science in Cyberspace, Guangzhou, China
https://doi.org/10.1109/DSC.20 18.00104
[27] Acar, A., Aksu, H., Uluagac, A. S., & Conti, M. (2018). A Survey on Homomorphic Encryption Schemes: Theory and Implementation.
Association for Computing Machinery Computing Surveys,
51(4), 1-35.
https://doi.org/10.1145/3214303
[29] Dehghan, M., & Sadeghiyan, B. (2019). Privacy-preserving collision detection of moving objects.
Transactions on Emerging Telecommunications Technologies,
30(3), e3484.
https://doi.org/10.1002/ett.3484
[30] Dehghan, M., Sadeghiyan, B., & Khosravian, E. (2021). Private Trajectory Intersection Testing: Is Garbled Circuit Better than Custom Protocols?
International Journal of Engineering,
34(4), 863-872.
https://doi.org/10.5829/ije.2021.34.04a.12