UAS (Unmanned Aerial Systems) are commonly used in 3D (dull, dirty and dangerous) missions, because these are not endangering the operators life, while reduce maintenance costs and increase maneuvering capabilities. Despite of these advantages we should consider the possible vulnerabilities of this technology as well. Unmanned vehicles can be controlled via direct communication link, or they can work in a preprogrammed mode. Usually the preprogrammed mode is based on radio navigation systems, so we can draw a conclusion that both depend on the RF environment. In this paper I analyze a possibility to effectively evaluate the communication link of an UAS. Developers have to consider several key factors (type of operation, endurance, payload type and size, propulsion, communication link, etc.) during the development process. They are also responsible that the final product meets the predefined requirements. On the other side commercial UAS owners should have a possibility to compare and evaluate the UAS before the acquisition. Finally, operators and frequency management entities need tools to diagnose the possible sources of interference regarding the unmanned vehicles. To understand the consequences of interference in the RF spectrum we have to be able to measure the quality of the communication link in different usage scenarios. In my research I evaluate the usage of SDRs (Software Defined Radios) in RF Test and Evaluation processes. After analyzing the possibilities for a flexible testbed, I demonstrate the usability with some measurements in the GNU Radio signal processing framework.
Örs Darabont, Konrád József Kiss and József Domokos
Conference on Cloud Computing Technology and Science , 2010, pp. 480-487.
 Kaur D., Bhathal G. S., “Thin Client Cloud Computing: An Overview”, International Journal for Multi Disciplinary Engineering and Business Management , Volume-2, Issue-1, pp. 8-10, 2014.
 MSDN blog Tools to simulate CPU / Memory / Disk Load, Windows sysinternals CPU Stress application: http://blogs.msdn.com/b/vijaysk/archive/2012/10/27/tools-to-simulate-cpu-memory-diskload.aspx .
 Pék G., Buttyán L., Bencsáth B., “A Survey of Security Issues in Hardware Virtualization