Minimal-time trajectories for interception of malicious drones in constrained environments | Publicación