{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:14:42Z","timestamp":1730283282033,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,29]]},"DOI":"10.1109\/milcom52596.2021.9652900","type":"proceedings-article","created":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T21:06:10Z","timestamp":1640898370000},"page":"316-322","source":"Crossref","is-referenced-by-count":8,"title":["Security Threats Analysis of the Unmanned Aerial Vehicle System"],"prefix":"10.1109","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-9128-574X","authenticated-orcid":false,"given":"Rune Hylsberg","family":"Jacobsen","sequence":"first","affiliation":[{"name":"Aarhus University,Department of Electrical and Computer Engineering,Aarhus,Denmark"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2290-4495","authenticated-orcid":false,"given":"Ali","family":"Marandi","sequence":"additional","affiliation":[{"name":"Aarhus University,Department of Electrical and Computer Engineering,Aarhus,Denmark"}]}],"member":"263","reference":[{"key":"ref30","first-page":"1","volume":"1 4","year":"2007","journal-title":"TCG Specification Architecture Overview"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2020.1846307"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459914"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.110"},{"journal-title":"Threat Modeling Designing for Security","year":"2014","author":"shostack","key":"ref13"},{"key":"ref14","article-title":"ROS: an open-source Robot Operating System","volume":"3","author":"quigley","year":"2009","journal-title":"Proc of ICRA Wksp on open source Softw"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"15068","DOI":"10.1109\/TVT.2020.3033060","article-title":"SecAu-thUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication","volume":"69","author":"naren","year":"2020","journal-title":"IEEE Trans on Veh Technol"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2021.104340"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3392221"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSN50589.2020.00037"},{"key":"ref19","article-title":"Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer","author":"humphreys","year":"2008","journal-title":"Proc of the Inst of Navig GNSS (ION GNSS+)"},{"journal-title":"An architectural overview of UNIX network security","year":"1993","author":"reinhardt","key":"ref28"},{"journal-title":"Us drones hacked by iraqi insurgents","year":"0","author":"guardian","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2984797"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.7249\/RR2972"},{"journal-title":"Cyber security incidence response team","year":"0","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.54"},{"journal-title":"Computer virus infects drone plane command centre in US","year":"0","author":"guardian","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516716"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LARS\/SBR\/WRE51543.2020.9307107"},{"journal-title":"The European Union Agency for Cybersecurity (ENISA) ENISA Threat Landscape 2020","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT-144147971.2020.9213789"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IROS51168.2021.9635924"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref22","article-title":"Application-level security for ROS-based applications","author":"diebcr","year":"2016","journal-title":"Proc of IEEE\/RSJ Int Conf on Intell Robot and Syst (IROS)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAPENERGY.2017.8397268"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1117\/12.819082"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1117\/12.2016189"},{"key":"ref26","article-title":"SkyNET: a 3G-enabled mobile attack drone and stealth botmastcr","author":"reed","year":"2011","journal-title":"Proc of 5th Usenix Wksp on Offensive Technol"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.023"}],"event":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2021,11,29]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2021,12,2]]}},"container-title":["MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9652874\/9652880\/09652900.pdf?arnumber=9652900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:09:15Z","timestamp":1659485355000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9652900\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,29]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/milcom52596.2021.9652900","relation":{},"subject":[],"published":{"date-parts":[[2021,11,29]]}}}