Secure platforms Secure platforms Secure systems Secure systems Autonomous UAV hardening Autonomous UAV hardening E2E secure Autonomous computing E2E secure Autonomous computing Security in power constrained autonomous UAV Security in power constrained autonomous UAV Secure and resilient communication Secure and resilient communication