UAVCAN Dataset Description

Dongsung Kim, Yuchan Song, Soonhyeon Kwon, Haerin Kim,Jeong Do Yoo,Huy Kang Kim

arxiv(2022)

引用 0|浏览1
暂无评分
摘要
We collected attack data from unmanned vehicles using the UAVCAN protocol, and public and described technical documents. A testbed was built with a drone using PX4, and a total of three attacks, Flooding, Fuzzy, and Replay, were performed. The attack was carried out in a total of 10 scenarios. We expect that the attack data will help develop technologies such as anomaly detection to solve the security threat problem of drones.
更多
查看译文
关键词
description
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要