TABLE OF TABLES

Chapter 3: Understanding Hostile Use and Cyber-Vulnerabilities of UAS: Components, Autonomy vs. Automation, Sensors, SAA, SCADA and Cyber Attack Taxonomy  

Table 3-1 UAS Automation Scale
Table 3-2 UAS Collaboration
Table 3-3 Commercial sUAS Parameters
Table 3-4 Typical Sensor Coordinate Systems
Table 3-5 Standard Sensor Parameters
Table 3-6 Common components found in UAS autopilots
Table 3-7 SAA Systems Include (Smart Skies Project)
Table 3-8 SCADA
Table 3-9 SCADA Functions
Table 3-10 Examples of SCADA Design Vulnerabilities
Table 3-11 Common Attack Vectors

Chapter 4: INFOSEC – Protecting UAS Information Channels & Components

Table 4-1 Policy and Security Attributes
Table 4-2 Information Security Parameters and Process

Chapter 7: UAS SAA Methodologies, Conflict Detection & Resolution Principles

Table 7-1 2007 Listing Remote Sensing Use of EMS
Table 7-2 Common Wavelengths units for Electromagnetic Radiation

Chapter 8: Designing UAS Systems for Stealth

Table 8-1 Battlespace Dimensions

Chapter 10: UAS Intelligence, Surveillance and Reconnaissance (ISR) 

Table 10-1 ISR Platform Tradeoffs
Table 10-2 Surface, map shape, and flight altitude

Chapter 11: UAS Weapons

Table 11-1 Future Weapons

Chapter 12: UAS System Deployment and Information Dominance (ID) 

Table 12-1 General Technology Categories for Information Warfare
Table 12-2 Extracted Information Infrastructure Row from Waltz Attack Categories

Chapter 13: Data Links Functions, Attributes and Latency

Table 13-1 Standard Definitions of Radio Spectrum Segments
Table 13-2 Shows RF band designations

Chapter 14: Exposing UAS Vulnerabilities via Electronic Warfare (EW) and Countering with Low Probability Intercept Signals (LPI)

Table 14-1 Types of Jamming
Table 14-2 Tri-band Anti Drone Rifle KWT-FZQ/DG10-A

Chapter 17: High – Altitude Platforms (HAPS) – A Promise not Reached 

Table 17-1 “HAPS Capabilities Compared to Terrestrial and Satellite Systems for Telecommunications
Table 17-2 “HAPS Platform Advanced Telecommunications Services in various stages of engineering and development
Table 17-3 Basic Characteristics of Terrestrial, Satellite and HAPS Systems
Table 17-4 HAPS design communication payload constraints / requirements / elements / subsystems
Table 17-5 Functions of TT & C Subsystem
Table 17-6 Frequency spectrum available for HAPS prior to May 2019 ITU meeting
Table 17-7 HAPS link budget analysis for Ka -band for clear sky.

Chapter 19: Audiology, Acoustic Countermeasures against Swarms and Building IFF Libraries

Table 19-1 Principal Physical Properties

Chapter 20: Legal and Regulatory – Where it Was, where it is and what’s Ahead?

Table 20-1 North Carolina Regulatory Framework

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Unmanned Aircraft Systems in the Cyber Domain by R. K. Nichols; H.C. Mumm; W.D. Lonstein; C. M. Carter; and J.P. Hood is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book