Skip to main content
. 2020 May 8;11:100218. doi: 10.1016/j.iot.2020.100218

Fig. 5.

Fig. 5

Possible drone attacks and the corresponding countermeasures