Analysis of jamming and spoofing cyber-attacks on drones | Publicación