{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:56:43Z","timestamp":1743127003001,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030628390"},{"type":"electronic","value":"9783030628406"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62840-6_3","type":"book-chapter","created":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T19:03:09Z","timestamp":1607972589000},"page":"45-67","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Assessing the Cyber Risk of Small Unmanned Aerial Vehicles"],"prefix":"10.1007","author":[{"given":"Dillon","family":"Pettit","sequence":"first","affiliation":[]},{"given":"Scott","family":"Graham","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,15]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"E. Ancel, F. Capristan, J. Foster and R. Condotta, Real-time risk assessment framework for unmanned aircraft system (UAS) traffic management (UTM), Proceedings of the Seventeenth AIAA Aviation Technology, Integration and Operations Conference, 2017","DOI":"10.2514\/6.2017-3273"},{"key":"3_CR2","unstructured":"B. Clinton, Executive Order 13010: Critical Infrastructure Protection, The White House, Washington, DC (www.hsdl.org\/?abstract&did=1613), 1996"},{"key":"3_CR3","unstructured":"F. Corrigan, DJI Mavic 2 Pro and Zoom Review of Features, Specs with FAQs, DroneZon (www.dronezon.com\/drone-reviews\/dji-mavic-2-pro-zoom-review-of-features-specifications-with-faqs), April 20, 2020"},{"key":"3_CR4","unstructured":"Dimensional Research, Trends in Security Framework Adoption: A Survey of IT and Security Professionals, Sunnyvale, California (static.tenable.com\/marketing\/tenable-csf-report.pdf), 2016"},{"key":"3_CR5","unstructured":"DJI, Mavic 2 Pro\/Zoom User Manual v2.0, Shenzen, China (dl.djicdn.com\/downloads\/Mavic_2\/20190417\/Mavic_2_Pro_Zoom_User_Manual_v2.0_en.pdf), 2019"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"P. Fahlstrom and T. Gleason, Introduction to UAV Systems, John Wiley and Sons, Chichester, United Kingdom, 2012","DOI":"10.1002\/9781118396780"},{"key":"3_CR7","unstructured":"J. Feist, Intel\u2019s drone business explained \u2013 Falcon 8+, Shooting Star and Insight, Drone Rush (www.dronerush.com\/intel-drone-business-12568), May 8, 2018"},{"key":"3_CR8","unstructured":"Forum of Incident Response and Security Teams (FIRST), Common Vulnerability Scoring System SIG, Cary, North Carolina (www.first.org\/cvss), 2020"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"J. Gray, Design and Implementation of a Unified Command and Control Architecture for Multiple Cooperative Unmanned Vehicles Utilizing Commercial-off-the-Shelf Components, M.S. Thesis, Department of Systems Engineering and Management, Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, 2015","DOI":"10.21236\/AD1003560"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"K. Hartmann and K. Giles, UAV exploitation: A new domain for cyber power, Proceedings of the Eighth International Conference on Cyber Conflict, pp. 205\u2013221, 2016","DOI":"10.1109\/CYCON.2016.7529436"},{"key":"3_CR11","unstructured":"K. Hartmann and C. Steup, The vulnerability of UAVs to cyber attacks \u2013 An approach to risk assessment, Proceedings of the Fifth International Conference on Cyber Conflict, 2013"},{"key":"3_CR12","unstructured":"Intel, Intel Falcon 8+ System, Santa Clara, California (www.intel.com\/content\/www\/us\/en\/products\/drones\/falcon-8), 2020"},{"key":"3_CR13","unstructured":"P. Kopardekar, Unmanned Aerial System (UAS) Traffic Management (UTM): Enabling Civilian Low-Altitude Airspace and UAS Operations, Technical Report NASA\/TM-2014-218299, NASA Ames Research Center, Moffett Field, California, 2014"},{"key":"3_CR14","unstructured":"P. Kopardekar, Unmanned Aircraft Systems Traffic Management, U.S. Patent No. 0275801 A1, September 22, 2016"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"F. Mohammed, A. Idries, N. Mohammed, J. Al-Jaroodi and I. Jawhar, UAVs for smart cities: Opportunities and challenges, Proceedings of the International Conference on Unmanned Aircraft Systems, pp. 267\u2013273, 2014","DOI":"10.1109\/ICUAS.2014.6842265"},{"key":"3_CR16","unstructured":"Parrot, Anafi, Paris, France (www.parrot.com\/global\/drones\/anafi), 2020"},{"key":"3_CR17","unstructured":"D. Pettit, R. Dill and S. Graham, Zero stars: Analysis of cybersecurity risk of small COTS UAVs, Proceedings of the Thirteenth International Conference on Emerging Security Information, Systems and Technologies, pp. 90\u201395, 2019"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"K. Scarfone and P. Mell, An analysis of CVSS version 2 vulnerability scoring, Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, pp. 516\u2013525, 2009","DOI":"10.1109\/ESEM.2009.5314220"},{"key":"3_CR19","unstructured":"I. Stine, A Cyber Risk Scoring System for Medical Devices, M.S. Thesis, Department of Electrical and Computer Engineering, Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, 2017"},{"key":"3_CR20","unstructured":"Subcommittee on Security, Drone Security: Enhancing Innovation and Mitigating Supply Chain Risks, Hearing, Committee on Commerce, Science and Transportation, U.S. Senate, Washington, DC (www.commerce.senate.gov\/2019\/6\/drone-security-enhancing-innovation-and-mitigating-supply-chain-risks), June 18, 2019"}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection XIV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62840-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T00:02:34Z","timestamp":1734134554000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-62840-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030628390","9783030628406"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62840-6_3","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"15 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Infrastructure Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccip2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ifip1110.org\/Conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}