{"id":"https://openalex.org/W4206720504","doi":"https://doi.org/10.1109/milcom52596.2021.9652900","title":"Security Threats Analysis of the Unmanned Aerial Vehicle System","display_name":"Security Threats Analysis of the Unmanned Aerial Vehicle System","publication_year":2021,"publication_date":"2021-11-29","ids":{"openalex":"https://openalex.org/W4206720504","doi":"https://doi.org/10.1109/milcom52596.2021.9652900"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom52596.2021.9652900","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":"https://pure.au.dk/portal/files/226667029/MILCOM_Security_Threats_Analysis_of_the_UAV_System_PREPRINT.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081841065","display_name":"Rune Hylsberg Jacobsen","orcid":"https://orcid.org/0000-0001-9128-574X"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Rune Hylsberg Jacobsen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Aarhus University, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007663724","display_name":"Ali Marandi","orcid":"https://orcid.org/0000-0002-2290-4495"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Ali Marandi","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Aarhus University, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.025,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":9,"citation_normalized_percentile":{"value":0.822851,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":86,"max":87},"biblio":{"volume":null,"issue":null,"first_page":"316","last_page":"322"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.9862,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.9862,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9839,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12597","display_name":"Fire Detection and Safety Systems","score":0.9764,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.553395},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5015805},{"id":"https://openalex.org/C145424490","wikidata":"https://www.wikidata.org/wiki/Q618465","display_name":"Remotely operated underwater vehicle","level":4,"score":0.46139666},{"id":"https://openalex.org/C178802073","wikidata":"https://www.wikidata.org/wiki/Q8421","display_name":"Aeronautics","level":1,"score":0.37112173},{"id":"https://openalex.org/C19966478","wikidata":"https://www.wikidata.org/wiki/Q4810574","display_name":"Mobile robot","level":3,"score":0.28261113},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15586323},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14498398},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.12056026}],"mesh":[],"locations_count":3,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom52596.2021.9652900","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://pure.au.dk/portal/da/publications/security-threats-analysis-of-the-unmanned-aerial-vehicle-system(1919580f-3b28-41d0-b1af-825399681586).html","pdf_url":"https://pure.au.dk/portal/files/226667029/MILCOM_Security_Threats_Analysis_of_the_UAV_System_PREPRINT.pdf","source":{"id":"https://openalex.org/S4306400063","display_name":"Scopus (Elsevier)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://pure.au.dk/ws/files/226667029/MILCOM_Security_Threats_Analysis_of_the_UAV_System_PREPRINT.pdf","pdf_url":"https://pure.au.dk/ws/files/226667029/MILCOM_Security_Threats_Analysis_of_the_UAV_System_PREPRINT.pdf","source":{"id":"https://openalex.org/S4306400063","display_name":"Scopus (Elsevier)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://pure.au.dk/portal/da/publications/security-threats-analysis-of-the-unmanned-aerial-vehicle-system(1919580f-3b28-41d0-b1af-825399681586).html","pdf_url":"https://pure.au.dk/portal/files/226667029/MILCOM_Security_Threats_Analysis_of_the_UAV_System_PREPRINT.pdf","source":{"id":"https://openalex.org/S4306400063","display_name":"Scopus (Elsevier)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":24,"referenced_works":["https://openalex.org/W187386450","https://openalex.org/W1921864689","https://openalex.org/W1963856035","https://openalex.org/W1965654413","https://openalex.org/W1989065208","https://openalex.org/W2098836126","https://openalex.org/W2169685348","https://openalex.org/W2545823459","https://openalex.org/W2566510693","https://openalex.org/W2566780507","https://openalex.org/W2810140724","https://openalex.org/W2901136733","https://openalex.org/W2999989552","https://openalex.org/W3010422676","https://openalex.org/W3021577838","https://openalex.org/W3087030391","https://openalex.org/W3094603038","https://openalex.org/W3104122952","https://openalex.org/W3109515903","https://openalex.org/W3120908245","https://openalex.org/W3155127170","https://openalex.org/W3184774605","https://openalex.org/W3200667636","https://openalex.org/W572872720"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W4319442894","https://openalex.org/W4312767556","https://openalex.org/W4312370102","https://openalex.org/W2982615283","https://openalex.org/W2921408402","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2290286193","https://openalex.org/W2071768959"],"abstract_inverted_index":{"Autonomous":[0],"Unmanned":[1],"Aerial":[2],"Vehicles":[3],"(UAVs)":[4],"find":[5],"increasing":[6],"use":[7],"in":[8,30,66],"the":[9,51,67,73,93,131],"civil":[10],"airspace":[11],"where":[12],"multi-UAV":[13,27,78,89,135],"systems":[14,28,90],"are":[15,99],"deployed":[16],"to":[17,61,106,110,126],"perform":[18],"operations":[19],"supervised":[20],"by":[21,114],"remote":[22],"control":[23],"facilities.":[24],"Since":[25],"these":[26],"operate":[29],"public":[31],"locations":[32],"and":[33,56],"connect":[34],"using":[35],"open":[36],"communication":[37],"standards,":[38],"it":[39],"raises":[40],"significant":[41],"security":[42,64,74,119],"concerns.":[43],"While":[44],"most":[45],"UAV":[46],"designers":[47],"befittingly":[48],"deal":[49],"with":[50,102,128],"complexity":[52],"of":[53,77,85,88,118,133],"autonomy,":[54],"communication,":[55],"control,":[57],"they":[58],"often":[59],"ignore":[60],"consider":[62],"system":[63],"aspects":[65],"early":[68],"design":[69,75,120,132],"phase.":[70],"To":[71],"support":[72],"process":[76],"systems,":[79],"this":[80],"paper":[81],"provides":[82],"an":[83],"analysis":[84],"cybersecurity":[86],"threats":[87,98],"based":[91],"on":[92],"STRIDE":[94],"model.":[95],"The":[96],"identified":[97],"subsequently":[100],"linked":[101],"a":[103,116],"risk":[104],"assessment":[105],"be":[107],"prioritized":[108],"according":[109],"severity.":[111],"We":[112],"conclude":[113],"establishing":[115],"set":[117],"recommendations":[121],"for":[122,130],"connected":[123],"inspection":[124],"UAVs":[125],"contribute":[127],"guidance":[129],"future":[134],"systems.":[136]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4206720504","counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2025-01-18T04:52:54.712654","created_date":"2022-01-25"}