
pp. 324-332, 2024, doi:
10.1109/CCNC51664.2024.10454860.
[9] A. Feyzioglu, and Y. S. Taspinar, “Malicious
UAVs Classification Using Various CNN
Architectures Features and Machine Learning
Algorithms,” International Journal of 3D
Printing Technologies and Digital Industry,
vol. 7(2), pp. 277-285, 2023,
https://doi.org/10.46519/ij3dptdi.1268605
[10] M. A. Sayeed, R. Kumar and V. Sharma,
“Safeguarding unmanned aerial systems: an
approach for identifying malicious aerial
nodes,” IET Communications, vol. 14(17), pp.
3000-3012,2020, https://doi.org/10.1049/iet-
com.2020.0073.
[11] S. Al-Dharrab, “Detection Performance of
Malicious UAV using Massive IoT
Networks,” 2023 IEEE 97th Vehicular
Technology Conference, Florence, Italy, pp.
1-5, 2023, doi: 10.1109/VTC2023-
Spring57618.2023.10200462
[12] S. Birnbach, R. Baker, S. Eberz and I.
Martinovic, “#PrettyFlyForAWiFi: Real-
world Detection of Privacy Invasion Attacks
by Drones,” ACM Transactions on Privacy
and Security, vol. 24(4) pp. 1–34, 2021,
https://doi.org/10.1145/3473672.
[13] E. Unlu, E. Zenou, N. Riviere and P.-E.
Dupouy, “Deep learning-based strategies for
the detection and tracking of drones using
several cameras”. IPSJ Transactions on
Computer Vision and Applications, vol. 11(7),
2019, https://doi.org/10.1186/s41074-019-
0059-x.
[14] P. Zhu, L. Wen, D. Du, X. Bian, H. Fan, Q.
Hu and H. Ling, “Detection and Tracking
Meet Drones Challenge,” IEEE Transactions
on Pattern Analysis and Machine Intelligence,
vol. 44(11), , pp. 7380-7399, 2022, doi:
10.1109/TPAMI.2021.3119563.
[15] R. Hamatapa and C. Vongchumyen, “Image
Processing for Drones Detection,” 2019 5th
International Conference on Engineering,
Applied Sciences and Technology (ICEAST),
Luang Prabang, Laos, 2019, pp. 1-4, doi:
10.1109/ICEAST.2019.8802578.
[16] A. Carrio, J. Tordesillas, S. Vemprala, S.
Saripalli, P. Campoy and J. P. How, “Onboard
Detection and Localization of Drones Using
Depth Maps,” IEEE Access, vol. 8, pp. 30480
– 30490, 2020, doi:
10.1109/ACCESS.2020.2971938.
[17] M. W. Ashraf, W. Sultani and M. Shah,
“Dogfight: Detecting Drones from Drones
Videos,” 2021 IEEE/CVF Conference on
Computer Vision and Pattern Recognition
(CVPR), Nashville, TN, USA, 2021, pp. 7063-
7072, doi: 10.1109/CVPR46437.2021.00699.
[18] K. Abbasi, A. Batool, F. M. A. Asghar, A.
Saeed, M. J. Khan and M. U. Rehman, “A
Vision-Based Amateur Drone Detection
Algorithm for Public Safety Applications,”
2019 UK/ China Emerging Technologies
(UCET), Glasgow, UK, 2019, pp. 1-5, doi:
10.1109/UCET.2019.8881879.
[19] S. Scholes, A. Ruget, G. Mora-Martín, F. Zhu,
I. Gyongy and J. Leach, “DroneSense: The
Identification, Segmentation, and Orientation
Detection of Drones via Neural Networks,”
IEEE Access, vol. 10, pp. 38154-38164, 2022,
doi: 10.1109/ACCESS.2022.3162866.
[20] S. Luesutthiviboon, G. C. H. E. de Croon, A.
V. N. Altena, M. Snellen and M. Voskuijl,
“Bio-inspired enhancement for optical
detection of drones using convolutional neural
networks,” Proc. SPIE vol. 12742, Artificial
Intelligence for Security and Defence
Applications, Amsterdam, Netherlands,
127420F (17 October 2023);
https://doi.org/10.1117/12.2673788.
[21] R. Tiwari and A. K. Dubey, “Detection of
Camouflaged Drones using Computer Vision
and Deep Learning Techniques,” 2022 12th
International Conference on Cloud
Computing, Data Science & Engineering
(Confluence), Noida, India, 2022, pp. 380-
383, doi:
10.1109/Confluence52989.2022.9734191.
[22] C. J. Swinney and J. C. Woods, “A Review of
Security Incidents and Defence Techniques
Relating to the Malicious Use of Small
Unmanned Aerial Systems,” IEEE Aerospace
and Electronic Systems Magazine, vol. 37(5),
pp. 14-28, 2022, doi:
10.1109/MAES.2022.3151308.
[23] P. Crippa, “Cyber Security and Drones,” In:
Masys, A.J. (eds) Handbook of Security
Science, pp. 619-633, Springer, Cham, 2022,
https://doi.org/10.1007/978-3-319-91875-
4_60.
[24] M. Elsayed, M. Reda, A. S. Mashaly and A.
S. Amein, “Review on Real-Time Drone
Detection Based on Visual Band Electro-
Optical (EO) Sensor,” 2021 Tenth
International Conference on Intelligent
Computing and Information Systems (ICICIS),
Cairo, Egypt, 2021, pp. 57-65, doi:
10.1109/ICICIS52592.2021.9694151.
[25] K. A. Gallagher, “Harmonic Radar: Theory
and Applications to Non-Linear Target
WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS
DOI: 10.37394/23209.2024.21.42
Athanasios N. Skraparlis, Klimis S. Ntalianis,
Maria S. Ntaliani, Filotheos S. Ntalianis,
Nikos E. Mastorakis