Abstract: Recently, unmanned aerial vehicles have received great attention in many applications, e.g., exploration, environmental monitoring, and search missions. These tasks need to implement a ...
By putting conflicting metadata in LNK files, a researcher found four new ways to spoof targets, hide arguments, and run unintended programs in Windows Explorer.
Abstract: Efficient aerial data collection is important in many remote sensing applications. In large-scale monitoring scenarios, deploying a team of unmanned aerial vehicles (UAVs) offers improved ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results