{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:55:43Z","timestamp":1730213743289,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004070","name":"Khalifa University","doi-asserted-by":"publisher","award":["FSU-2022-013"],"id":[{"id":"10.13039\/501100004070","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361519","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0717-0721","source":"Crossref","is-referenced-by-count":0,"title":["Cybersecurity Challenges of Multi-Domain Traffic Management and Aerospace Cyber-Physical Systems"],"prefix":"10.1109","author":[{"given":"Kathiravan","family":"Thangavel","sequence":"first","affiliation":[{"name":"Khalifa University of Science and Technology,Department of Aerospace Engineering,Abu Dhabi,United Arab Emirates"}]},{"given":"Alessandro","family":"Gardi","sequence":"additional","affiliation":[{"name":"Khalifa University of Science and Technology,Department of Aerospace Engineering,Abu Dhabi,United Arab Emirates"}]},{"given":"Roberto","family":"Sabatini","sequence":"additional","affiliation":[{"name":"Khalifa University of Science and Technology,Department of Aerospace Engineering,Abu Dhabi,United Arab Emirates"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.11610\/isij.3906"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.11610\/isij.4102"},{"volume-title":"The intelligence challenges of hybrid threats: Focus on cyber and virtual realm","year":"2018","author":"Treverton","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.88156"},{"volume":"abs\/2010.10872","journal-title":"SOK: Building a Launchpad for Impactful Satellite Cyber-Security Research","year":"2020","author":"Pavur","key":"ref5"},{"journal-title":"NAVAL WAR COLL NEWPORT RI JOINT MILITARY OPERATIONS DEPT","article-title":"Space Dependence - A Critical Vulnerability of the Net-Centric Operational Commander","year":"2005","author":"Grant","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2019.8756904"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2514\/6.2018-5275"},{"volume-title":"IEEE Distinguished Lecture: Aerospace Cyber-Physical and Autonomous Systems","year":"2020","author":"Sabatini","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.88648"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DASC43569.2019.9081646"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2021.3064616"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2020.3033475"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8270"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8401.ipd"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DASC55683.2022.9925759"},{"article-title":"Towards Multi-Domain Traffic Management","volume-title":"proceedings of 7 2nd International Astronautical Congress, IAC 2021","author":"Thangavel","key":"ref17"},{"volume-title":"Ground Station as a Service: A Space Cybersecurity Analysis","year":"2021","author":"Meyrick","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75307-2_12"},{"article-title":"Space, the Final Frontier for Cybersecurity?","volume-title":"proceedings","year":"2016","author":"Dsc","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.34190\/iccws.17.1.17"},{"volume-title":"Application and Certification Challenges for AI\/ML Techniques in Safety Critical Avionics Systems","year":"2022","author":"Sabatini","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DASC43569.2019.9081646"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361519.pdf?arnumber=10361519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:45:21Z","timestamp":1705092321000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361519\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361519","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}