Security Analysis of HolyStone Drones: Examining Attack Vectors and Data Extraction Techniques