CI Cybersécurité des drones et robots/en: Revision history

From Wiki Campus Cyber

Diff selection: Mark the radio buttons of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

11 January 2024

14 December 2023

12 December 2023

  • curprev 13:2413:24, 12 December 2023Angèle talk contribs 1,567 bytes −89 Page créée avec « The community has identified the following topics and assigned them a lower priority * Jamming and anti-jamming techniques * Interception techniques * Security repository * Drone as a service »
  • curprev 13:2413:24, 12 December 2023Angèle talk contribs 1,656 bytes −161 Page créée avec « '''Progress of the reflection phase''' »
  • curprev 13:2413:24, 12 December 2023Angèle talk contribs 1,817 bytes −89 Page créée avec « ==Logbook== ''''Conclusion of the Initiation Phase''' * The community of interest will meet once every 2 Wednesdays from 9.30am to 11am. »
  • curprev 13:2413:24, 12 December 2023Angèle talk contribs 1,906 bytes −101 Page créée avec « == Deliverables== * Proposal of safety criteria for the "European Trusted Drone" label (Cf. DG MOVE Drone Strategy 2.0 Flagship Action 19) * Once the label criteria have been adopted by the European Commission, test methodology * White paper on trusted drones and robots * White paper on identity management and strong authentication for drones and robots »
  • curprev 13:2313:23, 12 December 2023Angèle talk contribs 2,007 bytes −123 Page créée avec « == Description == Share best practices on securing drones and robots and their specific features Move towards interoperability of identities and authentication methods for drones and robots. Use drone cybersecurity as an example to positively influence IoT cybersecurity in general. Develop a reference framework for the development of a trusted European drone »
  • curprev 13:2313:23, 12 December 2023Angèle talk contribs 2,130 bytes +2,130 Page créée avec « CI : Drone and robots cybersecurity »