Abstract: In this research work, we consider the availability of mobile eavesdroppers and wardens, and investigate the covert and secure communication performance in UAV-ISAC-assisted D2D networks. To ...