{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:35:32Z","timestamp":1763346932262,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032008275","type":"print"},{"value":"9783032008282","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-00828-2_1","type":"book-chapter","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T16:23:36Z","timestamp":1760631816000},"page":"3-23","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Runtime Anomaly Detection for\u00a0Drones: An Integrated Rule-Mining and\u00a0Unsupervised-Learning Approach"],"prefix":"10.1007","author":[{"given":"Ivan","family":"Tan","sequence":"first","affiliation":[]},{"given":"Wei","family":"Minn","sequence":"additional","affiliation":[]},{"given":"Christopher M.","family":"Poskitt","sequence":"additional","affiliation":[]},{"given":"Lwin Khin","family":"Shar","sequence":"additional","affiliation":[]},{"given":"Lingxiao","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"1_CR1","unstructured":"Simulator (ArduPilot Dev Team) (2025). https:\/\/ardupilot.org\/dev\/docs\/-simulator-software-in-the-loop.html"},{"key":"1_CR2","unstructured":"Ardupilot documentation (2025). https:\/\/ardupilot.org\/dev\/docs"},{"key":"1_CR3","unstructured":"RADD repository (2025). https:\/\/github.com\/ivantanweihan\/RADD"},{"key":"1_CR4","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-319-33630-5_7","volume-title":"ICT Systems Security and Privacy Protection","author":"S Adepu","year":"2016","unstructured":"Adepu, S., Mathur, A.: Using process invariants to detect cyber attacks on a water treatment system. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 91\u2013104. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33630-5_7"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.is.2015.04.007","volume":"53","author":"SR Aghabozorgi","year":"2015","unstructured":"Aghabozorgi, S.R., Shirkhorshidi, A.S., Teh, Y.W.: Time-series clustering - a decade review. Inf. Syst. 53, 16\u201338 (2015)","journal-title":"Inf. Syst."},{"issue":"23","key":"1_CR6","doi-asserted-by":"publisher","first-page":"3001","DOI":"10.3390\/electronics10233001","volume":"10","author":"A Alqahtani","year":"2021","unstructured":"Alqahtani, A., Ali, M., Xie, X., Jones, M.W.: Deep time-series clustering: a review. Electronics 10(23), 3001 (2021)","journal-title":"Electronics"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Amruthnath, N., Gupta, T.: A research study on unsupervised machine learning algorithms for early fault detection in predictive maintenance. In: ICIEA, pp. 355\u2013361. IEEE (2018)","DOI":"10.1109\/IEA.2018.8387124"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Chen, Y., Poskitt, C.M., Sun, J.: Learning from mutants: using code mutation to learn and monitor invariants of a cyber-physical system. In: IEEE Symposium on Security and Privacy, pp. 648\u2013660. IEEE Computer Society (2018)","DOI":"10.1109\/SP.2018.00016"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Choi, H., et al.: Detecting attacks against robotic vehicles: a control invariant approach. In: CCS, pp. 801\u2013816. ACM (2018)","DOI":"10.1145\/3243734.3243752"},{"key":"1_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.09.004","volume":"90","author":"JP Condomines","year":"2019","unstructured":"Condomines, J.P., Zhang, R., Larrieu, N.: Network intrusion detection system for uav ad-hoc communication: from methodology design to real test validation. Ad Hoc Netw. 90, 101759 (2019)","journal-title":"Ad Hoc Netw."},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Feng, C., Li, T., Chana, D.: Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks. In: DSN, pp. 261\u2013272. IEEE Computer Society (2017)","DOI":"10.1109\/DSN.2017.34"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Feng, C., Palleti, V.R., Mathur, A., Chana, D.: A systematic framework to generate invariants for anomaly detection in industrial control systems. In: NDSS. The Internet Society (2019)","DOI":"10.14722\/ndss.2019.23265"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Goh, J., Adepu, S., Tan, M., Lee, Z.S.: Anomaly detection in cyber physical systems using recurrent neural networks. In: HASE, pp. 140\u2013145. IEEE Computer Society (2017)","DOI":"10.1109\/HASE.2017.36"},{"key":"1_CR14","unstructured":"Gudla, C., Rana, M.S., Sung, A.H.: Defense techniques against cyber attacks on unmanned aerial vehicles. In: ESCS, pp. 110\u2013116 (2018)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Han, R., Yang, C., Ma, S., Ma, J., Sun, C., Li, J., Bertino, E.: Control parameters considered harmful: Detecting range specification bugs in drone configuration modules via learning-guided search. In: ICSE, pp. 462\u2013473. ACM (2022)","DOI":"10.1145\/3510003.3510084"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Harada, Y., Yamagata, Y., Mizuno, O., Choi, E.: Log-based anomaly detection of CPS using a statistical method. In: IWESEP, pp.\u00a01\u20136. IEEE Computer Society (2017)","DOI":"10.1109\/IWESEP.2017.12"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Inoue, J., Yamagata, Y., Chen, Y., Poskitt, C.M., Sun, J.: Anomaly detection for a water treatment system using unsupervised machine learning. In: ICDM Workshops, pp. 1058\u20131065. IEEE Computer Society (2017)","DOI":"10.1109\/ICDMW.2017.149"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Kim, H., Ozmen, M.O., Bianchi, A., Celik, Z.B., Xu, D.: PGFUZZ: policy-guided fuzzing for robotic vehicles. In: NDSS. The Internet Society (2021)","DOI":"10.14722\/ndss.2021.24096"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Kiss, I., Genge, B., Haller, P.: A clustering-based approach to detect cyber attacks in process control systems. In: INDIN, pp. 142\u2013148. IEEE (2015)","DOI":"10.1109\/INDIN.2015.7281725"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Kravchik, M., Shabtai, A.: Detecting cyber attacks in industrial control systems using convolutional neural networks. In: CPS-SPC@CCS, pp. 72\u201383. ACM (2018)","DOI":"10.1145\/3264888.3264896"},{"issue":"4","key":"1_CR21","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1109\/TDSC.2021.3050101","volume":"19","author":"M Kravchik","year":"2022","unstructured":"Kravchik, M., Shabtai, A.: Efficient cyber attack detection in industrial control systems using lightweight neural networks and PCA. IEEE Trans. Dependable Secur. Comput. 19(4), 2179\u20132197 (2022)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"1_CR22","volume":"38","author":"R Kumar","year":"2021","unstructured":"Kumar, R., Agrawal, A.K.: Drone GPS data analysis for flight path reconstruction: a study on DJI, Parrot & Yuneec make drones. Forensic Sci. Int. Dig. Investigat. 38, 301182 (2021)","journal-title":"Forensic Sci. Int. Dig. Investigat."},{"issue":"2","key":"1_CR23","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.ifacol.2018.03.075","volume":"51","author":"M Liukkonen","year":"2018","unstructured":"Liukkonen, M., Hiltunen, Y.: Recognition of systematic spatial patterns in silicon wafers based on SOM and k-means. IFAC-PapersOnLine 51(2), 439\u2013444 (2018)","journal-title":"IFAC-PapersOnLine"},{"issue":"14","key":"1_CR24","first-page":"1","volume":"2016","author":"MX Ma","year":"2016","unstructured":"Ma, M.X., Ngan, H.Y., Liu, W.: Density-based outlier detection by local outlier factor on largescale traffic data. Electron. Imaging 2016(14), 1\u20134 (2016)","journal-title":"Electron. Imaging"},{"key":"1_CR25","first-page":"139","volume":"2","author":"LM Manevitz","year":"2001","unstructured":"Manevitz, L.M., Yousef, M.: One-class SVMs for document classification. J. Mach. Learn. Res. 2, 139\u2013154 (2001)","journal-title":"J. Mach. Learn. Res."},{"key":"1_CR26","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-030-34353-8_13","volume-title":"Future Network Systems and Security","author":"SH Mekala","year":"2019","unstructured":"Mekala, S.H., Baig, Z.: Digital forensics for drone data \u2013 intelligent clustering using self organising maps. In: Doss, R., Piramuthu, S., Zhou, W. (eds.) FNSS 2019. CCIS, vol. 1113, pp. 172\u2013189. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34353-8_13"},{"key":"1_CR27","unstructured":"M\u00fcnz, G., Li, S., Carle, G.: Traffic anomaly detection using k-means clustering. In: GI\/ITG Workshop MMBnet, vol.\u00a07 (2007)"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Renduchintala, A.L.S., Albehadili, A., Javaid, A.Y.: Drone forensics: digital flight log examination framework for micro drones. In: CSCI, pp. 91\u201396. IEEE (2017)","DOI":"10.1109\/CSCI.2017.15"},{"key":"1_CR29","unstructured":"Shankland, S.: Facebook drone investigation: Wind gust led to broken wing (2016). https:\/\/www.cnet.com\/tech\/services-and-software\/facebook-drone-investigation-wind-gust-led-to-broken-wing"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Shar, L.K., Minn, W., Duong, T.N.B., Fan, J., Jiang, L., Kiat, D.L.W.: DronLomaly: runtime detection of anomalous drone behaviors via log analysis and deep learning. In: APSEC, pp. 119\u2013128. IEEE (2022)","DOI":"10.1109\/APSEC57359.2022.00024"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Silalahi, S., Ahmad, T., Studiawan, H., Anthi, E., Williams, L.: Severity-oriented multiclass drone flight logs anomaly detection. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3396926"},{"key":"1_CR32","unstructured":"Son, Y., et al.: Rocking drones with intentional sound noise on gyroscopic sensors. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 881\u2013896 (2015)"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Wang, D., et al.: An exploratory investigation of log anomalies in unmanned aerial vehicles. In: ICSE, pp. 210:1\u2013210:13. ACM (2024)","DOI":"10.1145\/3597503.3639186"},{"key":"1_CR34","doi-asserted-by":"publisher","unstructured":"Yoong, C.H., Palleti, V.R., Maiti, R.R., Silva, A., Poskitt, C.M.: Deriving invariant checkers for critical infrastructure using axiomatic design principles. Cybersecurity 4(1), 1\u201324 (2021). https:\/\/doi.org\/10.1186\/s42400-021-00069-7","DOI":"10.1186\/s42400-021-00069-7"},{"issue":"2","key":"1_CR35","doi-asserted-by":"publisher","first-page":"1376","DOI":"10.1109\/TWC.2019.2892461","volume":"18","author":"G Zhang","year":"2019","unstructured":"Zhang, G., Wu, Q., Cui, M., Zhang, R.: Securing UAV communications via joint trajectory and power control. IEEE Trans. Wirel. Commun. 18(2), 1376\u20131389 (2019)","journal-title":"IEEE Trans. Wirel. Commun."}],"container-title":["Lecture Notes in Computer Science","Engineering of Complex Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00828-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T16:23:44Z","timestamp":1760631824000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00828-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"ISBN":["9783032008275","9783032008282"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00828-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"17 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICECCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Engineering of Complex Computer Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iceccs2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iceccs2025-hangzhou.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}