{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T11:02:57Z","timestamp":1758279777173},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030322571"},{"type":"electronic","value":"9783030322588"}],"license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32258-8_38","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T09:31:35Z","timestamp":1569922295000},"page":"323-332","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial Vehicles in Crisis Management Systems"],"prefix":"10.1007","author":[{"given":"Vasily","family":"Desnitsky","sequence":"first","affiliation":[]},{"given":"Nikolay","family":"Rudavin","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Rodday, N.M., Schmidt, R.O., Pras, A.: Exploring security vulnerabilities of unmanned aerial vehicles. In: NOMS 2016\u20132016 IEEE\/IFIP Network Operations and Management Symposium, pp. 993\u2013994. IEEE (2016)","DOI":"10.1109\/NOMS.2016.7502939"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Samland, F., Fruth, J., Hildebrandt, M., Hoppe, T., Dittmann, J.: AR.Drone: security threat analysis and exemplary attack to track persons. In: Intelligent Robots and Computer Vision XXIX: Algorithms and Techniques, vol. 8301. International Society for Optics and Photonics (2012)","DOI":"10.1117\/12.902990"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Pleban, J.S., Band, R., Creutzburg, R.: Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy. In: Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014, vol. 9030. International Society for Optics and Photonics (2014)","DOI":"10.1117\/12.2044868"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Vasconcelos, G., Carrijo, G., Miani, R., Souza, J., Guizilini, V.: The impact of DoS attacks on the AR.Drone 2.0. In: 2016 XIII Latin American Robotics Symposium and IV Brazilian Robotics Symposium (LARS\/SBR), pp. 127\u2013132. IEEE (2016)","DOI":"10.1109\/LARS-SBR.2016.28"},{"issue":"4","key":"38_CR5","doi-asserted-by":"publisher","first-page":"423","DOI":"10.5028\/jatm.v8i4.632","volume":"8","author":"LA Faria","year":"2016","unstructured":"Faria, L.A., Silvestre, C.A.M., Correia, M.A.F.: GPS-dependent systems: vulnerabilities to electromagnetic attacks. J. Aerosp. Technol. Manage. 8(4), 423\u2013430 (2016)","journal-title":"J. Aerosp. Technol. Manage."},{"key":"38_CR6","unstructured":"Shepard, D.P., Bhatti, J.A., Humphreys, T.E., Fansler, A.A.: Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks (2012)"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Muraleedharan, R., Osadciw, L.A.: Jamming attack detection and countermeasures in wireless sensor network using ant system. In: Wireless Sensing and Processing, vol. 6248. International Society for Optics and Photonics (2006)","DOI":"10.1117\/12.666330"},{"key":"38_CR8","unstructured":"Domin, K., Symeonidis, I., Marin, E.: Security analysis of the drone communication protocol: fuzzing the MAVLink protocol (2016)"},{"key":"38_CR9","unstructured":"Geethanjali, N., Gayathri, E.: A survey on energy depletion attacks in wireless sensor networks (2012)"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Chang, S.Y., Kumar, S.L.S., Tran, B.A.N., Viswanathan, S., Park, Y., Hu, Y.-C.: Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks. In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 52\u201357. ACM (2017)","DOI":"10.1145\/3098243.3098265"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Martin, T., Hsiao, M., Ha, D., Krishnaswami, J.: Denial-of-service attacks on battery-powered mobile computers. In: Proceedings of the 2004 IEEE Second IEEE Annual Conference on Pervasive Computing and Communications, pp. 309\u2013318 (2004)","DOI":"10.1109\/PERCOM.2004.1276868"},{"issue":"1","key":"38_CR12","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/s11227-013-0977-9","volume":"66","author":"Y Kim","year":"2013","unstructured":"Kim, Y., Kim, C.-M., Han, Y.-H., Jeong, Y.-S., Park, D.-S.: An efficient strategy of nonuniform sensor deployment in cyber physical systems. J. Supercomput. 66(1), 70\u201380 (2013)","journal-title":"J. Supercomput."},{"issue":"1","key":"38_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MCOM.2017.1700454","volume":"56","author":"T Long","year":"2018","unstructured":"Long, T., Ozger, M., Cetinkaya, O., Akan, O.B.: Energy neutral internet of drones. IEEE Commun. Mag. 56(1), 22\u201328 (2018)","journal-title":"IEEE Commun. Mag."},{"issue":"11","key":"38_CR14","doi-asserted-by":"publisher","first-page":"3751","DOI":"10.3390\/s18113751","volume":"18","author":"R Valentino","year":"2018","unstructured":"Valentino, R., Jung, W.S., Ko, Y.B.: A design and simulation of the opportunistic computation offloading with learning-based prediction for Unmanned Aerial Vehicle (UAV) clustering networks. Sensors 18(11), 3751 (2018)","journal-title":"Sensors"},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"Mersheeva, V., Friedrich, G.: Multi-UAV monitoring with priorities and limited energy resources. In: 25-th International Conference on Automated Planning and Scheduling (2015)","DOI":"10.1609\/icaps.v25i1.13695"},{"key":"38_CR16","doi-asserted-by":"publisher","first-page":"5","DOI":"10.15622\/sp.48.1","volume":"48","author":"V Desnitsky","year":"2016","unstructured":"Desnitsky, V., Chechulin, A., Kotenko, I., Levshun, D., Kolomeec, M.: Combined design technique for secure embedded devices exemplified by a perimeter protection system. SPIIRAS Proc. 48, 5\u201331 (2016)","journal-title":"SPIIRAS Proc."},{"key":"38_CR17","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-319-99626-4_30","volume-title":"Intelligent Distributed Computing XII","author":"V Desnitsky","year":"2018","unstructured":"Desnitsky, V., Kotenko, I., Rudavin, N.: Ensuring availability of wireless mesh networks for crisis management. In: Del Ser, J., Osaba, E., Bilbao, M., Sanchez-Medina, J., Vecchio, M., Yang, X.S. (eds.) Intelligent Distributed Computing XII. Studies in Computational Intelligence, vol. 798, pp. 344\u2013353. Springer, Cham (2018)"},{"key":"38_CR18","doi-asserted-by":"crossref","unstructured":"Desnitsky, V.A., Kotenko, I.V., Rudavin, N.N.: Protection mechanisms against energy depletion attacks in cyber-physical systems. In: 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 214\u2013219 (2019)","DOI":"10.1109\/EIConRus.2019.8656795"},{"key":"38_CR19","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-319-66379-1_23","volume-title":"Intelligent Distributed Computing XI","author":"V Desnitsky","year":"2018","unstructured":"Desnitsky, V., Kotenko, I.: Modeling and analysis of IoT energy resource exhaustion attacks. In: Ivanovi\u0107, M., B\u0103dic\u0103, C., Dix, J., Jovanovi\u0107, Z., Malgeri, M., Savi\u0107, M. (eds.) Intelligent Distributed Computing XI. Studies in Computational Intelligence, vol. 737, pp. 263\u2013270. Springer, Cham (2018)"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32258-8_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T17:19:08Z","timestamp":1664558348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32258-8_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"ISBN":["9783030322571","9783030322588"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32258-8_38","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/idc2019.ru\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}