[1]M. Navabi and F. Malekpour, "Satellite status control using tabulation gain controller in a variable parameter system,"
Journal of Space Science and Technology, vol. 15, no. 2, pp. 15-25, 2022, (in Persian),
https://doi.org/10.30699/jsst.2021.244891.1309.
[2] R. Ghasrizadeh and A. A. Nikkhah, "Improved spoofing loosely coupled INS /GPS with steady state Kalman matrix gain,"
Journal of Space Science and Technology, vol. 16, no. 3, pp. 37-49, 2023, (in Persian),
https://doi.org/10.30699/jsst.2023.1425.
[3] M. Ebrahimi Kachoie, M. Arbabmir, and M. Norouz, "A survey on vision navigation methods for UAV navigation applications," Journal of Space Science and Technology, vol. 10, no. 2, pp. 33-52, 2017, (in Persian).
[4] E. Khosravian and M. Dehghan, "Advancing situation awareness systems: Evaluating decision-making methods with UAV applications,"
Management Strategies and Engineering Sciences, vol. 6, no. 4, pp. 122-133, 2024,
https://doi.org/10.61838/msesj.6.4.13.
[5] C. Rani, H. Modares, R. Sriram, D.Mikulski, and F. l. Lewis, “Security of unmanned aerial vehicle systems against cyber-physical attacks,”
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, vol. 13, no. 3. pp. 331-342, 2015,
https://doi.org/10.1177/1548512915617252.
[6] M. Dehghan and B. Sadeghiyan, "Privacy-preserving collision detection of moving objects,"
Transactions on Emerging Telecommunications Technologies, vol. 30, no. 3, 2019, Art. no. e3484,
https://doi.org/10.1002/ett.3484.
[7] Z. Yu, Z. Wang, J. Yu, D. Liu, H. Herbert Song and Z. Li, "Cybersecurity of unmanned aerial vehicles: a survey,"
Aerospace and Electronic Systems Magazine, vol. 39, no. 9, pp. 182-215, 2024,
https://doi.org/10.1109/MAES.2023.3318226.
[8] S. C. Hassler, U. A. Mughal and M. Ismail, "Cyber-physical intrusion detection system for unmanned aerial vehicles,"
Transactions on Intelligent Transportation Systems, vol. 25, no. 6, pp. 6106-6117, 2024,
https://doi.org/10.1109/TITS.2023.3339728.
[9] M. Dehghan and E. Khosravian, “A review of cognitive UAVs: AI-driven situation awareness for enhanced operations,”
AI and Tech in Behavioral and Social Sciences, vol. 2, no. 4, pp. 54-65, 2024,
https://doi.org/10.61838/kman.aitech.2.4.6.
[10] B. S. Sarıkaya and Ş. Bahtiyar, "A survey on security of UAV and deep reinforcement learning,"
Ad Hoc Networks, vol. 164, 2024, Art. no. 103642,
https://doi.org/10.1016/j.adhoc.2024.103642.
[11] S. Niyonsaba, K. Konate, and M. M. Soidridine, “Deep learning based intrusion detection for cybersecurity in unmanned aerial vehicles network,” in 4th International Conference on Electrical, Computer and Energy Technologies (ICECE), Sydney, Australia, 2024.
[12] D. Javeed, T. Gao, P. Kumar, S. Shoukat, I. Ahmad and R. Kumar, "An Intelligent and Interpretable Intrusion Detection System for Unmanned Aerial Vehicles," in
International Conference on Communications (ICC), Denver, CO, USA, 2024, pp. 1951-1956,
https://doi.org/10.1109/ICC51166.2024.10622703.
[13] A. Alzahrani, "Novel approach for intrusion detection attacks on small drones using ConvLSTM model,"
IEEE Access, vol. 12, pp. 149238-149253, 2024,
https://doi.org/10.1109/ACCESS.2024.3471806.
[14] M. Dehghan and E. Khosravian, "Private federated learning for APT detection in internet of drones,"
Karafan Journal, vol. 20, no. 3, pp. 465-484, 2023, (in Persian),
https://doi.org/10.48301/kssa.2023.409787.2649.
[15] M. Rizwanullah
et al., “Modelling of metaheuristics with machine learning-enabled cybersecurity in unmanned aerial vehicles"
Sustainability, vol. 14, no. 24, 2022, Art. no. 16741,
https://doi.org/10.3390/su142416741.
[16] K. Arulkumaran, M. P. Deisenroth, M. Brundage and A. A. Bharath, "Deep Reinforcement Learning: A Brief Survey,"
Signal Processing Magazine, vol. 34, no. 6, pp. 26-38, 2017,
https://doi.org/10.1109/MSP.2017.2743240.
[17] M. Dehghan, B. Sadeghiyan, E. Khosravian, A. S. Moghaddam, and F. Nooshi, “ProAPT: Projection of APT threats with deep reinforcement learning,’
arXiv:2209.07215, 2022,
https://doi.org/10.48550/arXiv.2209.07215.
[18] V. François-Lavet, P. Henderson, R. Islam, M. G. Bellemare, and J. Pineau, "An introduction to deep reinforcement learning,"
Foundations and Trends® in Machine Learning, vol. 11, no. 3-4, pp. 219-354, 2018,
http://dx.doi.org/10.1561/2200000071.
[19] Z. Ding, Y. Huang, H. Yuan, and H. Dong, "Introduction to Reinforcement Learning," in
Deep Reinforcement Learning: Fundamentals, Research and Applications, H. Dong, Z. Ding, and S. Zhang, Eds. Singapore: Springer Singapore, 2020, pp. 47-123,
https://doi.org/10.1007/978-981-15-4095-0_2.
[20] J. S. Bergstra, R. Bardenet, Y. Bengio, and B. Kégl, “Algorithms for hyper-parameter optimization,” in Advances in neural information processing systems24 (NeurIPS 2011), J. Shawe-Taylor, R. Zemel, P. Bartlett, F. Pereira, and K. Weinberger, Eds. Curan Associates, Inc., 2011, pp. 2546-2554.
[21] D. V. Carvalho, E. M. Pereira and J. S. Cardoso, “Machine learning interpretability: A survey on methods and metrics,”
Electronics, vol. 8, no. 8, 2019, Art. no. 832,
https://doi.org/10.3390/electronics8080832.
[22] M. Saarela and S. Jauhiainen, “Comparison of feature importance measures as explanations for classification models,”
SN Applied Sciences, vol. 3, 2021, Art. no. 272,
https://doi.org/10.1007/s42452-021-04148-9.