I am reading this paper found that they have proposed algorithm to hijack the drone. But it is not quite clear how they done it in simulator?
(PDF) A Secure Communication Protocol for Unmanned Aerial Vehicles (researchgate.net)
I am reading this paper found that they have proposed algorithm to hijack the drone. But it is not quite clear how they done it in simulator?
(PDF) A Secure Communication Protocol for Unmanned Aerial Vehicles (researchgate.net)