<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>An integrated decision-tree framework for UAV forensic data recovery: bridging hardware chip-off and logical analysis methods</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Azamat Baibussinov</string-name>
          <email>azamat_b_astana@mail.ru</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gulnara Abitova</string-name>
          <email>gulya.abitova@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kaisarbek Yesbergenov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Astana IT University</institution>
          ,
          <addr-line>Astana, Z05T3C8</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Defense University of the Republic of Kazakhstan</institution>
          ,
          <addr-line>Astana, Z05M2B7</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <abstract>
        <p>Unmanned aerial vehicles (UAVs) generate mission-critical data for reconnaissance, surveillance, and forensic investigations. However, this information is frequently compromised by storage failures, traditionally addressed through isolated physical or logical recovery methods, creating a significant operational gap. This paper introduces a novel integrated hardware-software methodology that unifies advanced chip-off techniques with structured digital forensic workflows within a decision-tree framework. The research involved 43 UAV storage devices (microSD, eMMC, SSD, mono-lithic NAND) subjected to controlled physical and logical failure scenarios. Hardware recovery utilized PC-3000 and Resolute spider Board systems, establishing a critical thermal recoverability threshold at 142 ± 3°C. Logical recovery experiments employed R-Studio, TestDisk, PhotoRec, and X-Ways Forensics to address filesystem corruption, partition errors, and metadata loss. The core contribution is a diagnostic decision-tree algorithm that reduces recovery time by 38% by enabling optimal method selection based on failure characteristics. Results demonstrate superior performance: 92.3% recovery success for physical damage and up to 97% file recovery with 92% completeness for logical corruption. Mission-critical data (GPS coordinates, telemetry logs) was recon-structed with 93% positional accuracy and 89% temporal consistency. The study concludes that the integrated framework surpasses conventional isolated approaches, establishing a new benchmark for UAV forensics. Challenges include proprietary encryption, high equipment costs, and non-standardized architectures. Future work will focus on machine learning-assisted pinout detection and validation for proprietary military systems.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;UAV forensics</kwd>
        <kwd>data recovery</kwd>
        <kwd>decision-tree framework</kwd>
        <kwd>chip-off analysis</kwd>
        <kwd>logical corruption</kwd>
        <kwd>integrated forensic methodology</kwd>
        <kwd>unmanned aerial vehicles 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Unmanned aerial vehicles (UAVs) have become indispensable assets in modern military operations,
reconnaissance, and civilian applications [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. They generate vast amounts of mission-critical
data, including high-resolution imagery, telemetry, and navigation logs. Preserving the integrity of
this information is crucial for post-mission analysis, battlefield forensics, and legal investigations [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
However, UAV storage devices – commonly microSD cards, embedded multimedia cards (eMMC),
and solid-state drives (SSDs) – remain highly vulnerable to both physical and logical failures [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        Problems. Current research on UAV data recovery typically addresses these issues in isolation. On
the one hand, hardware-based recovery studies focus on physically damaged storage through chip-off
methods, pinout tracing, and NAND flash analysis [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. On the other hand, software-oriented
studies explore logical corruption such as filesystem failures, metadata overwrites, or partition table
errors [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. This frag-mentation leaves a critical gap: field investigators require an integrated
framework capable of addressing both physical and logical data loss scenarios [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>Actually. This methodological fragmentation poses a critical operational challenge for forensic
investigators. In field conditions, rapid triage is essential. The inability to quickly diagnose the
primary failure mode – physical or logical – often leads to the misapplication of recovery techniques.
This can result in irreversible data loss through unnecessary chip-off procedures on logically
corruptible devices or wasted operational windows spent on futile software-based recovery attempts
on physically destroyed me-dia. Consequently, there is an urgent need for a unified diagnostic
framework that systematically guides investigators to the most efficient recovery pathway,
optimizing both time and resource utilization. This justifies the relevance of the study.</p>
      <p>Purpose of study. Therefore, the aim of the study is to examine the relationship between the
success of UAV data recovery and the type of damage and the storage media parameters using a new
forensic methodology.</p>
      <p>This study proposes and validates a unified hardware-software forensic methodology that
combines advanced chip-off recovery with structured digital forensics workflows. By merging
empirical findings from physically compromised UAV storage with experimental analysis of logically
corrupted devices, we establish an integrated approach that provides consistent recovery strategies
across diverse failure modes. This contribution directly addresses the urgent operational demand for
reliable UAV data recovery in both defense and civilian domains.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Materials and methods</title>
      <p>Description of the nature of damage. Information generated and transmitted by UAVs is often
compromised by storage failures, which are traditionally addressed through isolated physical or
logical recovery methods, creating a significant operational disruption.</p>
      <sec id="sec-2-1">
        <title>2.1. Experimental design: defect modeling</title>
        <p>The study followed a two-stage experimental design, examining both physical and logical failure
modes in UAV storage devices. Specifically, the study involved UAV storage devices (microSD,
eMMC, SSD, monolithic NAND). These drives were subjected to controlled physical and logical
failure scenarios, simulating defects in the form of physical and logical failures.</p>
        <p>
          The study followed a dual-track experimental design, addressing both physical and logical failure
modes in UAV storage devices. A total of 43 storage units were analyzed, comprising microSD cards,
eMMC modules, SSDs, and monolithic NAND chips recovered from UAV platforms (including DJI
Phantom 4 and SkyWalker X5) [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. The experimental workflow was conducted in an ISO Class 5
cleanroom environment to minimize contamination during chip-off operations and under controlled
laboratory conditions for logical recovery simulations [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Hardware Recovery: Modeling physical failures</title>
        <p>To investigate physical damage scenarios, 23 compromised storage units were subjected to chip-off
recovery. The primary equipment included:



</p>
        <p>PC-3000 Flash system (v3.5) for NAND-level data extraction and reconstruction.
Rusolut Spider Board adapters and Visual NAND Reconstructor (v9.0) for adaptive pinout
tracing of undocumented monolithic chips.</p>
        <p>Keyence VHX-7000 digital microscope for pad mapping and trace continuity inspection (500–
1000x magnification).</p>
        <p>Element 862D++ IR thermal station calibrated with NIST-traceable thermocouples for
controlled thermal cycling in the range of 200–480°C.</p>
        <p>
          Controlled reheating experiments determined the recoverability thresholds of NAND devices,
identifying 142 ± 3°C as the critical degradation limit [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. Binary integrity was validated through
CRC32 checksums and ECC correction, followed by logical reconstruction with PC-3000 custom
NAND profiles.
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Software recovery: modeling logical failures</title>
        <p>
          For logical corruption scenarios, 20 test cases were engineered using UAV storage media (microSD,
eMMC, SSD). Controlled failures included: filesystem corruption (FAT32, exFAT, ext4, NTFS),
partition table overwrites, logical file deletions, and metadata overwrites [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
        <p>The following forensic tools were evaluated:



</p>
        <p>TestDisk for partition and filesystem structural repair.</p>
        <p>PhotoRec for signature-based file carving.</p>
        <p>R-Studio for hybrid structural-signature recovery.</p>
        <p>X-Ways Forensics for combined automated and manual analysis.</p>
        <p>
          Test environments were configured with forensic workstations (Intel Xeon W-2255, 128 GB RAM)
to eliminate hardware bottlenecks. The recovery results were tested using three success criteria: the
proportion of recovered files, structural integrity, and content identifiability [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. Statistical
significance was assessed using ANOVA analysis of variance with a significance threshold of p &lt; 0.01
[
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], which confirms the success of the modeling results: all 20 simulated test trials yield identifiable,
approximately identical results.
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>2.4. Integrated forensic workflow: development of a new algorithm</title>
        <p>
          To unify hardware and software recovery, a decision-tree algorithm was designed. The workflow
begins with initial damage assessment: physical failure suspected → chip-off workflow; logical
failure suspected → logical recovery workflow. Cross-validation of recovered data was performed
using binary checksum verification, metadata consistency, and semantic coherence checks (GPS logs,
mission telemetry) [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
        <p>
          The integrated framework reduces diagnostic time by up to 38% compared to conventional
sequential approaches, while improving overall recovery rates through targeted method selection
[
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
        </p>
        <p>The proposed decision-tree algorithm for initial damage assessment and recovery path selection is
illustrated in Figure 1.</p>
      </sec>
      <sec id="sec-2-5">
        <title>2.5. Statistical analysis</title>
        <p>Statistical significance of the differences in recovery success rates between the methods was assessed
using one-way Analysis of Variance (ANOVA) with a post-hoc Tukey test for pairwise comparisons,
setting the confidence threshold at p &lt; 0.01. The sample size (N=43) provided a statistical power of
over 0.8 for detecting large effect sizes, ensuring the robustness of the comparative findings. All
analyses were performed using IBM SPSS Statistics.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Results</title>
      <sec id="sec-3-1">
        <title>3.1. Hardware recovery outcomes</title>
        <p>
          Analysis of 23 physically damaged UAV storage units revealed that recovery success rates strongly
depended on the device type and thermal exposure [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. MicroSD cards showed the highest resilience
(95 ± 2.1%), primarily limited by controller fractures. eMMC modules achieved 85 ± 3.4% recovery,
with trace degradation under BGA packages as the most common failure mode. Monolithic NAND
chips posed the greatest challenges, with initial recovery success of 70 ± 5.2% improved to 90% when
adaptive pinout tracing was applied [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. Controlled thermal experiments established that data
recoverability dropped from 90% below 130°C to &lt;5% beyond 142°C [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. Overall, the integrated
chipoff methodology achieved 92.3% recovery success for non-encrypted devices.
        </p>
        <p>Table 1 summarizes the recovery outcomes across different device types and the overall efficacy of
the chip-off methodology. The results demonstrate a clear dependence on the device packaging and
thermal exposure.
X-Ways Forensics
(manual)</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Software recovery outcomes</title>
        <p>
          In 20 cases of logical corruption, recovery performance varied significantly by method. Structural
analysis tools such as TestDisk achieved 72% file recovery with 81% data completeness [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
Signaturebased carving with PhotoRec recovered 88% of files but only 63% completeness due to fragmentation
[
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Hybrid approaches provided the best balance: R-Studio achieved 94% recovery with 89%
completeness [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], while X-Ways Forensics achieved up to 97% file recovery with 92% completeness,
albeit at higher operator time cost [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. Statistical analysis confirmed significant performance
differences among methods (p &lt; 0.01) [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ].
        </p>
        <p>Figure 2 provides a comparative visualization of the performance metrics (recovery success and
data completeness) achieved by the different logical recovery tools, highlighting the superiority of
hybrid approaches.</p>
        <p>X-Ways</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Integrated workflow efficiency</title>
        <p>The proposed decision-tree algorithm (Figure 1) significantly streamlined the forensic process. By
enabling rapid diagnosis and optimal method selection, it reduced the mean time from device intake
to successful data extraction by 38% compared to a sequential trial-and-error approach.</p>
        <p>Temperature (°C)</p>
        <p>The relationship between thermal exposure and data recoverability, a critical finding for physical
recovery, is presented in Figure 3. It clearly illustrates the sharp degradation curve and the
established threshold of 142°C ± 3°C.</p>
        <p>Table 1 offers a consolidated overview of all key results, facilitating a direct comparison between
the hardware and software recovery domains and their respective limitations.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Discussion</title>
      <p>This study demonstrates that UAV data recovery cannot be effectively addressed by hardware or
software methods alone. The proposed integrated framework bridges this gap by systematically
combining chip-off recovery for physically damaged devices with advanced digital forensic
techniques for logical failures.</p>
      <sec id="sec-4-1">
        <title>4.1. Result comparison with existing research</title>
        <p>
          Previous research on UAV or NAND memory forensics has focused predominantly on
singledimension recovery strategies. Hardware-oriented works emphasize chip-off methods but often
neglect logical-level reconstruction once raw NAND data has been extracted [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. Conversely,
soft-ware-oriented studies explore filesystem repair and file carving without addressing cases where
the device itself is electrically non-functional [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. Our results confirm that such isolated
approaches leave investigators with incomplete recovery capabilities. By merging both domains into
a unified forensic workflow, this study achieves best recovery rates that surpass conventional
methods by over 20% [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ], [21], thereby establishing a new benchmark for UAV forensics.
        </p>
        <p>Quantitative differences in the results obtained:</p>
        <p>A) Time reduction: The developed diagnostic tree-based algorithm reduces recovery time by 38%
by selecting the optimal method based on failure characteristics.</p>
        <p>B) Recovery completeness: The recovery success rate for physical damage was 92.3%, and for
logical damage, up to 97% of recovered files were recovered with 92% completeness.</p>
        <p>C) Increased accuracy: Critical data (GPS coordinates, telemetry logs) was reconstructed with 93%
positional accuracy and 89% temporal consistency.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Practical implications</title>
        <p>
          For military digital forensics, the implications are immediate. Recovery of geospatial logs with
93% positional accuracy and telemetry reconstruction with 89% temporal consistency enables reliable
post-incident analysis, such as reconstructing UAV flight paths within &lt;2 m accuracy [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. This
level of precision is critical for battlefield intelligence, crash investigations, and evidence
preservation in judicial processes. Furthermore, the decision-tree algorithm accelerates recovery by
38%, reducing the time-to-insight in time-sensitive missions [21].
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Human factor and training</title>
        <p>
          One of the most significant findings concerns operator expertise. Recovery success in chip-off
scenarios was strongly correlated with technician skill level (R² = 0.85), accounting for up to 78% of
outcome variance [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. Similarly, the most effective logical recovery methods – particularly
XWays Forensics – required extensive manual verification [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. These findings suggest that investment
in personnel training may yield higher returns than equipment acquisition alone, especially in
military contexts where operational readiness depends on timely data access.
        </p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Limitations</title>
        <p>
          Despite its strengths, the integrated framework faces three critical limitations. First, proprietary
encryption remains an insurmountable barrier [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. Second, the high cost of professional-grade
hardware (~$28,000) and the requirement of more than 120 hours of specialized training per operator
restrict wide deployment to forensic laboratories rather than field units [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. Third, the study
primarily addressed civilian file systems (FAT32, exFAT, NTFS, ext4), while proprietary autopilot
storage formats common in military UAVs were beyond the current scope [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ].
        </p>
        <p>Furthermore, while controlled laboratory conditions ensured internal validity, they may not fully
capture the environmental stressors (e.g., dust, moisture, time pressure) present in real battlefield
recovery scenarios, potentially inflating the reported success rates.</p>
        <p>For instance, moderate dust contamination or humidity levels typically encountered in field
conditions can raise the physical recovery failure rate by an estimated 15-20% due to complications in
micro-soldering and electrical connectivity.</p>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. Future research directions</title>
        <p>
          Several pathways can further strengthen this framework. Machine learning-assisted pinout tracing
could reduce recovery time per device below four hours [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. Semi-automated logical recovery
pipelines may enable faster triage of corrupted file systems with minimal human oversight [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
Additionally, testing with proprietary autopilot file systems and encrypted storage architectures is
necessary to ensure applicability in classified military contexts [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Finally, standardization of
UAV storage designs – including documented pinout layouts and robust thermal protections – would
greatly enhance data survivability and recovery success in combat environments [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-6">
        <title>4.6. Theoretical and practical implications</title>
        <p>Theoretically, this study contributes a unified framework that bridges two traditionally disparate
sub-domains of digital forensics. It provides a conceptual model for understanding failure
interdependence in UAV storage systems, suggesting that the physical-logical dichotomy is often a
false binary in real-world scenarios.</p>
        <p>Practically, the findings mandate a revision of standard operating procedures for military and
forensic units dealing with UAV incidents. The proposed decision-tree algorithm can be directly
integrated into field manuals, emphasizing a 'software-first' approach when possible, to preserve
evidence integrity and avoid destructive methods. For manufacturers, the results highlight the
critical need for standardized pinout documentation and improved thermal protection in UAV
storage designs to facilitate future recovery efforts.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>This study demonstrates that the traditional isolation of physical and logical data recovery methods
is inherently limiting for UAV forensics. The proposed integrated decision-tree framework
effectively bridges this gap, providing a systematic methodology for diagnosing failure modes and
selecting the optimal recovery pathway. Our results establish that this approach is not merely
complementary but essential, achieving recovery rates above 92% and reducing processing time by
38% compared to conventional non-integrated methods.</p>
      <p>The results establish three key contributions:


</p>
      <p>Hardware recovery efficiency – up to 92.3% success in reconstructing data from physically
damaged storage when operating below the thermal threshold of 142°C.</p>
      <p>Software recovery superiority – hybrid forensic methods (R-Studio, X-Ways) achieved
recovery completeness of 94–97%, significantly outperforming standalone approaches.
Integrated forensic workflow – a decision-tree algorithm reduced diagnostic and recovery
time by 38%, enabling investigators to systematically select optimal recovery strategies across
diverse failure scenarios.</p>
      <p>These findings hold direct value for military and forensic practice, enabling reliable
reconstruction of UAV flight paths, telemetry, and mission logs with evidentiary accuracy. At the
same time, several challenges remain: proprietary encryption, high equipment costs, and the absence
of standardized UAV storage architecture limit the universal adoption of this methodology.</p>
      <p>Future research should prioritize the development of semi-automated forensic systems, machine
learning-assisted failure classification, and validation across proprietary autopilot file systems. Such
advancements will strengthen the resilience of UAV data in combat and civilian missions, ensuring
that critical information can be pre-served and analyzed even under the most adverse conditions.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used Grammarly in order to: Grammar and spelling
check. After using this tool, the authors reviewed and edited the content as needed and take full
responsibility for the publication’s content.
[21] Sihag, V., Choudhary, G., Choudhary, P., &amp; Dragoni, N. (2023). Cyber4Drone: A Systematic
Review of Cyber Security and Forensics in Next-Generation Drones. Drones, 7(7), 430.
https://doi.org/10.3390/drones7070430.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S. C.</given-names>
            <surname>Nayak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. K.</given-names>
            <surname>Samanthula</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Tiwari</surname>
          </string-name>
          ,
          <article-title>"Investigating Drone Data Recovery Beyond the Obvious Using Digital Forensics,"</article-title>
          <source>2023 IEEE 14th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)</source>
          , New York, NY, USA,
          <year>2023</year>
          , pp.
          <fpage>0254</fpage>
          -
          <lpage>0260</lpage>
          , doi: 10.1109/UEMCON59035.
          <year>2023</year>
          .
          <volume>10315995</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Hamdi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Iqbal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Alam</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>Kazim and Á</article-title>
          .
          <source>MacDermott, "Drone Forensics: A Case Study on DJI Phantom 4," 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)</source>
          ,
          <source>Abu Dhabi, United Arab Emirates</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/AICCSA47632.
          <year>2019</year>
          .
          <volume>9035302</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Ojo</surname>
            ,
            <given-names>Taiwo</given-names>
          </string-name>
          &amp; Chi, Hongmei &amp; Erskine,
          <string-name>
            <surname>Samuel.</surname>
          </string-name>
          (
          <year>2023</year>
          ).
          <article-title>Unmanned Aerial Vehicle Forensics Investigation Performance under Different Attacks</article-title>
          .
          <volume>10</volume>
          .1109/CSCI58124.
          <year>2022</year>
          .
          <volume>00235</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Syed</surname>
            ,
            <given-names>Naeem</given-names>
          </string-name>
          &amp; Khan, Majid &amp; Mohammad, Nazeeruddin &amp; Brahim, Ghassen &amp; Baig,
          <string-name>
            <surname>Zubair.</surname>
          </string-name>
          (
          <year>2022</year>
          ).
          <source>Unsupervised Machine Learning for Drone Forensics through Flight Path Analysis. 1-6. 10.1109/ISDFS55398</source>
          .
          <year>2022</year>
          .
          <volume>9800808</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5] ISO/IEC 27037:
          <year>2012</year>
          .
          <article-title>Guidelines for identification, collection, acquisition and preservation of digital evidence</article-title>
          . - Geneva: International Organization for Standardization,
          <year>2012</year>
          . - 66 p.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>K. A. -P.</given-names>
            <surname>Angamutu</surname>
          </string-name>
          and
          <string-name>
            <given-names>V. A. -P.</given-names>
            <surname>Selvarajah</surname>
          </string-name>
          ,
          <article-title>"An Insight into the Data Recovery of Deleted or Heavily Damaged Storage Media Through the Lens of R-</article-title>
          <string-name>
            <surname>Studio</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>2023 International Conference on Integrated Intelligence and Communication Systems (ICIICS)</source>
          , Kalaburagi, India,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.1109/ICIICS59993.
          <year>2023</year>
          .
          <volume>10421397</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>C.</given-names>
            <surname>Liambas</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Manios</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Performance Comparison Analysis of Digital Forensic Tools in Various Operating Systems," 2024 12th International Symposium on Digital Forensics and Security (ISDFS)</source>
          , San Antonio, TX, USA,
          <year>2024</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.1109/ISDFS60797.
          <year>2024</year>
          .
          <volume>10527289</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>N.</given-names>
            <surname>Asim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Osamor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Olajide</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Iwendi</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Okeke</surname>
          </string-name>
          ,
          <article-title>"Detecting and Mitigating Anti-Forensic Techniques: A Comprehensive Framework for Digital Investigators," 2025 AI-Driven Smart Healthcare for Society 5</article-title>
          .0,
          <string-name>
            <surname>Kolkata</surname>
          </string-name>
          , India,
          <year>2025</year>
          , pp.
          <fpage>66</fpage>
          -
          <lpage>72</lpage>
          , doi: 10.1109/IEEECONF64992.
          <year>2025</year>
          .
          <volume>10963229</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Deng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Lei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          and
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <article-title>"Research on Power Control Method of Fuel Cell UAV DC System with Constant Power Load,"</article-title>
          <source>2023 IEEE 14th International Symposium on Power Electronics for Distributed Generation Systems (PEDG)</source>
          , Shanghai, China,
          <year>2023</year>
          , pp.
          <fpage>879</fpage>
          -
          <lpage>885</lpage>
          , doi: 10.1109/PEDG56097.
          <year>2023</year>
          .
          <volume>10215215</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Chunhui</surname>
            <given-names>Wang</given-names>
          </string-name>
          , Zhou Jian,
          <string-name>
            <given-names>Yuanhang</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <surname>Shi Zhong</surname>
            , Chuangmian Huang,
            <given-names>Yunfan Yang.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>An Anomaly Detecting System for Power System of Four-Rotor UAV</article-title>
          .
          <fpage>109</fpage>
          -
          <lpage>114</lpage>
          .
          <fpage>10</fpage>
          .1109/ISAS49493.
          <year>2020</year>
          .
          <volume>9378868</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>C.</given-names>
            <surname>Yuan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Huangfu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Bai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Shi</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <article-title>"Stability Analysis and Stabilization Improvement of the DC Power System for Unmanned Aerial Vehicle Based on the Finite-Time Controller,"</article-title>
          <source>in IEEE Transactions on Industry Applications</source>
          , vol.
          <volume>59</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>7570</fpage>
          -
          <lpage>7583</lpage>
          ,
          <string-name>
            <surname>Nov</surname>
          </string-name>
          .- Dec.
          <year>2023</year>
          , doi: 10.1109/TIA.
          <year>2023</year>
          .
          <volume>3299261</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Debas</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Albuali</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Member</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2024</year>
          ).
          <article-title>Forensic Examination of Drones: A Comprehensive Study of Frameworks, Challenges, and Machine Learning Applications</article-title>
          . IEEE Access,
          <volume>12</volume>
          ,
          <fpage>111505</fpage>
          -
          <lpage>111522</lpage>
          . https://doi.org/10.1109/ACCESS.
          <year>2024</year>
          .
          <volume>3426028</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Alotaibi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Al-Dhaqm</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Al-Otaibi</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Alsewari</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>A Comprehensive Collection and Analysis Model for the Drone Forensics Field Sensors</article-title>
          (Basel; Switzerland),
          <volume>22</volume>
          . https://doi.org/10.3390/s22176486.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Fu</surname>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            , and
            <given-names>Yunyan</given-names>
          </string-name>
          <string-name>
            <surname>Shuai</surname>
          </string-name>
          .
          <article-title>"An Efficient Data Collection Method by UAV Based on Data Recovery,"</article-title>
          <source>International Journal of Information System Modeling and Design (IJISMD) 16</source>
          , no.
          <issue>1</issue>
          :
          <fpage>1</fpage>
          -
          <lpage>22</lpage>
          . https://doi.org/10.4018/IJISMD.370948.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Xu</surname>
          </string-name>
          and
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <surname>"UAV-Enabled</surname>
            <given-names>IoT</given-names>
          </string-name>
          :
          <article-title>Cascading Failure Model and TopologyControl-Based Recovery Scheme,"</article-title>
          <source>in IEEE Internet of Things Journal</source>
          , vol.
          <volume>11</volume>
          , no.
          <issue>12</issue>
          , pp.
          <fpage>22562</fpage>
          -
          <lpage>22577</lpage>
          ,
          <fpage>15</fpage>
          <lpage>June15</lpage>
          ,
          <year>2024</year>
          , doi: 10.1109/JIOT.
          <year>2024</year>
          .
          <volume>3381735</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          et al.,
          <article-title>"Multi-UAV Collaborative Surveillance Network Recovery via Deep Reinforcement Learning,"</article-title>
          <source>in IEEE Internet of Things Journal</source>
          , vol.
          <volume>11</volume>
          , no.
          <issue>21</issue>
          , pp.
          <fpage>34528</fpage>
          -
          <issue>34540</issue>
          , 1 Nov.1,
          <year>2024</year>
          , doi: 10.1109/JIOT.
          <year>2024</year>
          .
          <volume>3446878</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Teng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Shan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhu</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Research on Deep Learning-Based Compression Processing Technology for UAV Inspection Images," 2025 International Conference on Electrical Automation and Artificial Intelligence (ICEAAI)</source>
          , Guangzhou, China,
          <year>2025</year>
          , pp.
          <fpage>1395</fpage>
          -
          <lpage>1399</lpage>
          , doi: 10.1109/ICEAAI64185.
          <year>2025</year>
          .
          <volume>10956570</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Nayerifard</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Amintoosi</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghaemi</surname>
            <given-names>Bafghi</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            , and
            <surname>Dehghantanha</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          , “
          <article-title>Machine Learning in Digital Forensics: A Systematic Literature Review”</article-title>
          , arXiv e-prints, Art. no.
          <source>arXiv:2306.04965</source>
          ,
          <year>2023</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.2306.04965.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>H.</given-names>
            <surname>Studiawan</surname>
          </string-name>
          , G. Grispos, and
          <string-name>
            <surname>K.-K. R. Choo</surname>
          </string-name>
          , “
          <article-title>Unmanned Aerial Vehicle (UAV) Forensics: The Good, The Bad, and the Unaddressed,”</article-title>
          <source>Computers &amp; Security</source>
          , vol.
          <volume>132</volume>
          , p.
          <fpage>103340</fpage>
          ,
          <string-name>
            <surname>Sept</surname>
          </string-name>
          .
          <year>2023</year>
          , doi: 10.1016/j.cose.
          <year>2023</year>
          .
          <volume>103340</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seo</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2023</year>
          ).
          <article-title>Digital Forensic Research for Analyzing Drone Pilot: Focusing on DJI Remote Controller</article-title>
          . Sensors,
          <volume>23</volume>
          (
          <issue>21</issue>
          ),
          <volume>8934</volume>
          . https://doi.org/10.3390/s23218934.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>