{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:18:21Z","timestamp":1725700701522},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361328","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0814-0819","source":"Crossref","is-referenced-by-count":0,"title":["Cybersecurity Risks and Threats in Avionics and Autonomous Systems"],"prefix":"10.1109","author":[{"given":"Yibing","family":"Xie","sequence":"first","affiliation":[{"name":"School of Engineering, RMIT University,Melbourne,Australia"}]},{"given":"Alessandro","family":"Gardi","sequence":"additional","affiliation":[{"name":"Khalifa University,Abu Dhabi,UAE"}]},{"given":"Roberto","family":"Sabatini","sequence":"additional","affiliation":[{"name":"Khalifa University,Abu Dhabi,UAE"}]}],"member":"263","reference":[{"volume-title":"Aviation under attack from a wave of cybercrime","year":"2021","key":"ref1"},{"volume-title":"EUROCONTROL Data Snapshot #39 on ransomware groups targeting aviations supply chain","year":"2023","key":"ref2"},{"volume-title":"Doc 10039, Manual on System Wide Information Management (SWIM) Concept","year":"2015","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2495\/safe170211"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.paerosci.2016.10.001"},{"volume-title":"NextGen Implementation Plan","year":"2018","key":"ref6"},{"volume-title":"System Wide Information Management (SWIM)","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00024-0_13"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s42405-020-00345-9"},{"volume-title":"Unmanned Aircraft System Traffic Management (UTM)","year":"2020","key":"ref10"},{"volume-title":"Concept of operations for European UTM systems","year":"2019","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2022.3208865"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/aerospace7110154"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s12239-023-0038-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/aerospace8080224"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6815901"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DASC55683.2022.9925840"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.003"},{"volume-title":"Security and Privacy of Controller Pilot Data Link Communication","year":"2018","author":"Wernberg","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2017.10.002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.507"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.11003\/JPNT.2015.4.2.057"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SSRR.2017.8088163"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.trpro.2019.12.021"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/en12040725"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/UVS.2019.8658279"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66717-7_17"},{"journal-title":"ICSVE Brief Reports","article-title":"The Potential Threats Posed by ISISs Use of Weaponized Air Drones and How to Fight Back","year":"2017","author":"Yayla","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1353\/gia.2018.0012"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00024-0_12"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DASC43569.2019.9081646"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS52807.2021.9441649"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/s18051636"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSURV.2016.7486395"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSURV.2019.8735139"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2017.8102083"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100218"},{"volume-title":"Safety vs. Security: Attacking Avionic Systems with Humans in the Loop","year":"2019","author":"Smith","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3326298"},{"journal-title":"A Simple Demonstration that the Global Positioning System (GPS) is Vulnerable to Spoofing","author":"Warner","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3121230"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2016.7778088"},{"article-title":"A 1090 Extended Squitter Automatic Dependent Surveillance - Broadcast (ADS-B) Reception Model for Air-Traffic-Management Simulations","volume-title":"AIAA Modeling and Simulation Technologies Conference and Exhibit","year":"2012","author":"William","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.2988514"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973763"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2991762"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.23919\/IConAC.2017.8081999"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2019.8651804"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc2040035"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09717-4"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-019-00925-6"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/RED-UAS.2017.8101647"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1177\/20539517211017593"},{"volume-title":"Introduction to machine learning with Python a guide for data scientists","year":"2017","author":"M\u00fcller","key":"ref55"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0048-x"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361328.pdf?arnumber=10361328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T19:56:39Z","timestamp":1705089399000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361328\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361328","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}