ORPP logo
Image from Google Jackets

Countermeasures for Aerial Drones.

By: Contributor(s): Material type: TextTextPublisher: Norwood : Artech House, 2020Copyright date: ©2020Edition: 1st edDescription: 1 online resource (249 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781630818029
Subject(s): Genre/Form: Additional physical formats: Print version:: Countermeasures for Aerial DronesDDC classification:
  • 623.7469
LOC classification:
  • UG1242.D7 .M375 2021
Online resources:
Contents:
Intro -- Contents -- Preface -- Acknowledgments -- Chapter 1 The Drone Threat Landscape -- 1.1 Introduction -- 1.2 The Future of Flight -- 1.3 Aircraft Alert -- 1.4 Political Protest -- 1.4.1 Climate Change Direct Action -- 1.4.2 Drone Disorder -- 1.5 Hostile Reconnaissance and Rogue Dro -- 1.5.1 Theatres of Conflict -- 1.5.2 Drone Surveillance -- 1.6 Adoption of Drones for Organized Cri -- 1.6.1 Drone Drug Trafficking -- 1.6.2 Contraband Drones -- 1.7 Terrorist Threat from Drones -- 1.7.1 Terror Tactics -- 1.8 Adaption of Drones for Cyberattack -- 1.8.1 Cyber Threats Take Flight -- 1.8.2 Cyber Drone-Jacking -- 1.8.3 Malicious Drone Malware -- 1.9 Reducing the Risk -- References -- Chapter 2 Understanding Drone Technologies -- 2.1 Introduction -- 2.2 The Most Common UAV Applications -- 2.3 UAV Configurations -- 2.4 Categories of UAVs and Their Classif -- 2.4.1 Categories of UAVs -- 2.4.2 Classification According to Size -- References -- Chapter 3 Know Your Enemy -- 3.1 Introduction -- 3.2 Drone Architecture -- 3.3 UAV Propulsion System -- 3.4 Navigation Systems for Drones -- 3.4.1 Introduction -- 3.4.2 Satellite Navigation -- 3.4.3 Non-GPS-Based Navigation -- 3.5 Communication Links -- 3.5.1 Introduction -- 3.5.2 UAV Control -- 3.5.3 Video Transmission -- 3.5.4 Communication Systems for Military -- 3.5.5 Communications for Swarm of UAVs -- 3.6 UAV Payload -- 3.7 Summary -- References -- Chapter 4 The C-UAV Problem -- 4.1 Introduction -- 4.2 Comprehensive Approach to C-UAV and -- References -- Chapter 5 C-UAV Sensors and Situation Awareness -- 5.1 Situation Awareness -- 5.2 Radars as C-UAV Sensors -- 5.2.1 Introduction to Radars and Radar S -- 5.2.2 Radar Systems -- 5.2.3 Radars in C-UAV Systems -- 5.2.4 Summary -- 5.3 RF Detection Sensors -- 5.3.1 SkyArcher (ST Engineering, Singapo -- 5.3.2 SKYPERION (METIS Aerospace, United.
5.3.3 Drone Hunter DHS-PRO (Fortunio, Hu -- 5.3.4 AIRFENCE (Sensofusion, Finland) -- 5.4 Optical Detection Systems -- 5.4.1 Types of Optical Detection Systems -- 5.4.2 Optical Detection with AI -- 5.4.3 Detection Algorithm Overview -- 5.4.4 Classification Algorithm Overview -- 5.5 Acoustic Sensors -- References -- Chapter 6 Countermeasures -- 6.1 Introduction -- 6.2 The C-UAV Neutralization Chain -- 6.3 Neutralization Tools -- 6.3.1 Jamming -- 6.3.2 Jamming Systems from Russia -- 6.4 Interceptor Drones -- 6.5 Lasers -- 6.6 Spoofing -- 6.7 Guns -- 6.8 Effectiveness -- 6.9 Legality -- References -- Chapter 7 Standardization andRegulatory Activities -- 7.1 C-UAV Standardization by NATO and ED -- 7.2 Standardization in EUROCAE and RTCA -- 7.3 Conclusions -- References -- Chapter 8 A Strategic Approach to Counter Rogue Dr -- 8.1 Introduction -- 8.2 Social Acceptance -- 8.3 Counter-Drone Strategy -- 8.4 Review and Reform -- 8.5 Regulatory Frameworks -- 8.6 International Challenge -- 8.7 European Regulations -- 8.8 Enforcement -- 8.9 Balancing Act -- 8.10 Counter-Drone Innovation -- 8.11 Research to Reality -- 8.12 A Model Approach -- 8.13 Critical Success Factors -- References -- About the Authors.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- Contents -- Preface -- Acknowledgments -- Chapter 1 The Drone Threat Landscape -- 1.1 Introduction -- 1.2 The Future of Flight -- 1.3 Aircraft Alert -- 1.4 Political Protest -- 1.4.1 Climate Change Direct Action -- 1.4.2 Drone Disorder -- 1.5 Hostile Reconnaissance and Rogue Dro -- 1.5.1 Theatres of Conflict -- 1.5.2 Drone Surveillance -- 1.6 Adoption of Drones for Organized Cri -- 1.6.1 Drone Drug Trafficking -- 1.6.2 Contraband Drones -- 1.7 Terrorist Threat from Drones -- 1.7.1 Terror Tactics -- 1.8 Adaption of Drones for Cyberattack -- 1.8.1 Cyber Threats Take Flight -- 1.8.2 Cyber Drone-Jacking -- 1.8.3 Malicious Drone Malware -- 1.9 Reducing the Risk -- References -- Chapter 2 Understanding Drone Technologies -- 2.1 Introduction -- 2.2 The Most Common UAV Applications -- 2.3 UAV Configurations -- 2.4 Categories of UAVs and Their Classif -- 2.4.1 Categories of UAVs -- 2.4.2 Classification According to Size -- References -- Chapter 3 Know Your Enemy -- 3.1 Introduction -- 3.2 Drone Architecture -- 3.3 UAV Propulsion System -- 3.4 Navigation Systems for Drones -- 3.4.1 Introduction -- 3.4.2 Satellite Navigation -- 3.4.3 Non-GPS-Based Navigation -- 3.5 Communication Links -- 3.5.1 Introduction -- 3.5.2 UAV Control -- 3.5.3 Video Transmission -- 3.5.4 Communication Systems for Military -- 3.5.5 Communications for Swarm of UAVs -- 3.6 UAV Payload -- 3.7 Summary -- References -- Chapter 4 The C-UAV Problem -- 4.1 Introduction -- 4.2 Comprehensive Approach to C-UAV and -- References -- Chapter 5 C-UAV Sensors and Situation Awareness -- 5.1 Situation Awareness -- 5.2 Radars as C-UAV Sensors -- 5.2.1 Introduction to Radars and Radar S -- 5.2.2 Radar Systems -- 5.2.3 Radars in C-UAV Systems -- 5.2.4 Summary -- 5.3 RF Detection Sensors -- 5.3.1 SkyArcher (ST Engineering, Singapo -- 5.3.2 SKYPERION (METIS Aerospace, United.

5.3.3 Drone Hunter DHS-PRO (Fortunio, Hu -- 5.3.4 AIRFENCE (Sensofusion, Finland) -- 5.4 Optical Detection Systems -- 5.4.1 Types of Optical Detection Systems -- 5.4.2 Optical Detection with AI -- 5.4.3 Detection Algorithm Overview -- 5.4.4 Classification Algorithm Overview -- 5.5 Acoustic Sensors -- References -- Chapter 6 Countermeasures -- 6.1 Introduction -- 6.2 The C-UAV Neutralization Chain -- 6.3 Neutralization Tools -- 6.3.1 Jamming -- 6.3.2 Jamming Systems from Russia -- 6.4 Interceptor Drones -- 6.5 Lasers -- 6.6 Spoofing -- 6.7 Guns -- 6.8 Effectiveness -- 6.9 Legality -- References -- Chapter 7 Standardization andRegulatory Activities -- 7.1 C-UAV Standardization by NATO and ED -- 7.2 Standardization in EUROCAE and RTCA -- 7.3 Conclusions -- References -- Chapter 8 A Strategic Approach to Counter Rogue Dr -- 8.1 Introduction -- 8.2 Social Acceptance -- 8.3 Counter-Drone Strategy -- 8.4 Review and Reform -- 8.5 Regulatory Frameworks -- 8.6 International Challenge -- 8.7 European Regulations -- 8.8 Enforcement -- 8.9 Balancing Act -- 8.10 Counter-Drone Innovation -- 8.11 Research to Reality -- 8.12 A Model Approach -- 8.13 Critical Success Factors -- References -- About the Authors.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.