{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T23:24:02Z","timestamp":1769556242999,"version":"3.49.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319914664","type":"print"},{"value":"9783319914671","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91467-1_13","type":"book-chapter","created":{"date-parts":[[2018,6,2]],"date-time":"2018-06-02T08:01:43Z","timestamp":1527926503000},"page":"154-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Human Augmentation of UAV Cyber-Attack Detection"],"prefix":"10.1007","author":[{"given":"Haibei","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Mahmoud","family":"Elfar","sequence":"additional","affiliation":[]},{"given":"Miroslav","family":"Pajic","sequence":"additional","affiliation":[]},{"given":"Ziyao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mary L.","family":"Cummings","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,3]]},"reference":[{"issue":"4","key":"13_CR1","doi-asserted-by":"publisher","first-page":"281","DOI":"10.14358\/PERS.81.4.281","volume":"81","author":"G Pajares","year":"2015","unstructured":"Pajares, G.: Overview and current status of remote sensing applications based on unmanned aerial vehicles (UAVs). Photogram. Eng. Remote Sens. 81(4), 281\u2013329 (2015)","journal-title":"Photogram. Eng. Remote Sens."},{"key":"13_CR2","unstructured":"Humphreys, T.E., Ledvina, B.M., Psiaki, M.L., O\u2019Hanlon, B.W., Kintner Jr., P.M.: Assessing the spoofing threat: development of a portable GPS civilian spoofer. In: Proceedings of the ION GNSS International Technical Meeting of the Satellite Division, vol. 55, p. 56, September 2008"},{"issue":"3","key":"13_CR3","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.ijcip.2012.09.003","volume":"5","author":"DP Shepard","year":"2012","unstructured":"Shepard, D.P., Humphreys, T.E., Fansler, A.A.: Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks. Int. J. Crit. Infrastruct. Prot. 5(3), 146\u2013153 (2012)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"13_CR4","unstructured":"Shane, S., Sanger, D.E.: Drone Crash in Iran reveals secret US surveillance effort. The N. Y. Times 7 (2011). https:\/\/www.nytimes.com\/2011\/12\/08\/world\/middleeast\/drone-crash-in-iran-reveals-secret-us-surveillance-bid.html"},{"key":"13_CR5","volume-title":"Telerobotics, Automation, and Human Supervisory Control","author":"TB Sheridan","year":"1992","unstructured":"Sheridan, T.B.: Telerobotics, Automation, and Human Supervisory Control. MIT press, Cambridge (1992)"},{"key":"13_CR6","volume-title":"Automation Architecture for Single Operator","author":"ML Cummings","year":"2007","unstructured":"Cummings, M.L., Bruni, S., Mercier, S., Mitchell, P.J.: Automation Architecture for Single Operator. Multiple UAV Command and Control. Massachusetts Institute of Technology, Cambridge (2007)"},{"issue":"4","key":"13_CR7","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1002\/rob.21513","volume":"31","author":"AJ Kerns","year":"2014","unstructured":"Kerns, A.J., Shepard, D.P., Bhatti, J.A., Humphreys, T.E.: Unmanned aircraft capture and control via GPS spoofing. J. Field Robot. 31(4), 617\u2013636 (2014)","journal-title":"J. Field Robot."},{"key":"13_CR8","unstructured":"Wesson, K.D., Shepard, D.P., Bhatti, J.A., Humphreys, T.E.: An evaluation of the vestigial signal defense for civil GPS anti-spoofing. In: Proceedings of the ION GNSS Meeting, September 2011"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Broumandan, A., Jafarnia-Jahromi, A., Dehghanian, V., Nielsen, J., Lachapelle, G.: GNSS spoofing detection in handheld receivers based on signal spatial correlation. In: 2012 IEEE\/ION Position Location and Navigation Symposium (PLANS), pp. 479\u2013487. IEEE, April 2012","DOI":"10.1109\/PLANS.2012.6236917"},{"issue":"3","key":"13_CR10","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1002\/navi.14","volume":"59","author":"K Wesson","year":"2012","unstructured":"Wesson, K., Rothlisberger, M., Humphreys, T.: Practical cryptographic civil GPS signal authentication. Navigation 59(3), 177\u2013193 (2012)","journal-title":"Navigation"},{"issue":"4","key":"13_CR11","doi-asserted-by":"publisher","first-page":"2250","DOI":"10.1109\/TAES.2013.6621814","volume":"49","author":"ML Psiaki","year":"2013","unstructured":"Psiaki, M.L., O\u2019Hanlon, B.W., Bhatti, J.A., Shepard, D.P., Humphreys, T.E.: GPS spoofing detection via dual-receiver correlation of military signals. IEEE Trans. Aerosp. Electron. Syst. 49(4), 2250\u20132267 (2013)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"2","key":"13_CR12","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MCS.2016.2643239","volume":"37","author":"M Pajic","year":"2017","unstructured":"Pajic, M., Weimer, J., Bezzo, N., Sokolsky, O., Pappas, G.J., Lee, I.: Design and implementation of attack-resilient cyberphysical systems: with a focus on attack-resilient state estimators. IEEE Control Syst. 37(2), 66\u201381 (2017)","journal-title":"IEEE Control Syst."},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Wesson, K.D., Evans, B.L., Humphreys, T.E.: A combined symmetric difference and power monitoring GNSS anti-spoofing technique. In: 2013 IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 217\u2013220. IEEE, December 2013","DOI":"10.1109\/GlobalSIP.2013.6736854"},{"issue":"2","key":"13_CR14","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1109\/TAES.2013.6494400","volume":"49","author":"TE Humphreys","year":"2013","unstructured":"Humphreys, T.E.: Detection strategy for cryptographic GNSS anti-spoofing. IEEE Trans. Aerosp. Electron. Syst. 49(2), 1073\u20131090 (2013)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"11","key":"13_CR15","doi-asserted-by":"publisher","first-page":"1778","DOI":"10.3390\/s16111778","volume":"16","author":"J Sun","year":"2016","unstructured":"Sun, J., Li, B., Jiang, Y., Wen, C.Y.: A Camera-based target detection and positioning UAV system for search and rescue (SAR) purposes. Sensors 16(11), 1778 (2016)","journal-title":"Sensors"},{"issue":"3","key":"13_CR16","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1109\/TIP.2004.838698","volume":"14","author":"RJ Radke","year":"2005","unstructured":"Radke, R.J., Andra, S., Al-Kofahi, O., Roysam, B.: Image change detection algorithms: a systematic survey. IEEE Trans. Image Process. 14(3), 294\u2013307 (2005)","journal-title":"IEEE Trans. Image Process."},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Blacknell, D., Griffiths, H.: Radar automatic target recognition (ATR) and non-cooperative target recognition (NCTR). The Institution of Engineering and Technology (2013)","DOI":"10.1049\/PBRA033E"},{"issue":"1","key":"13_CR18","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/0010-0285(80)90005-5","volume":"12","author":"AM Treisman","year":"1980","unstructured":"Treisman, A.M., Gelade, G.: A feature-integration theory of attention. Cogn. Psychol. 12(1), 97\u2013136 (1980)","journal-title":"Cogn. Psychol."},{"issue":"11","key":"13_CR19","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1109\/34.730558","volume":"20","author":"L Itti","year":"1998","unstructured":"Itti, L., Koch, C., Niebur, E.: A model of saliency-based visual attention for rapid scene analysis. IEEE Trans. Pattern Anal. Mach. Intell. 20(11), 1254\u20131259 (1998)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"12","key":"13_CR20","doi-asserted-by":"publisher","first-page":"1323","DOI":"10.1016\/0042-6989(88)90064-8","volume":"28","author":"B De Bruyn","year":"1988","unstructured":"De Bruyn, B., Orban, G.A.: Human velocity and direction discrimination measured with random dot patterns. Vis. Res. 28(12), 1323\u20131335 (1988)","journal-title":"Vis. Res."},{"issue":"6","key":"13_CR21","doi-asserted-by":"publisher","first-page":"1180","DOI":"10.1109\/TSMCA.2010.2046731","volume":"40","author":"B Donmez","year":"2010","unstructured":"Donmez, B., Nehme, C., Cummings, M.L.: Modeling workload impact in multiple unmanned vehicle supervisory control. IEEE Trans. Syst. Man Cyber.-Part A Syst. Hum. 40(6), 1180\u20131190 (2010)","journal-title":"IEEE Trans. Syst. Man Cyber.-Part A Syst. Hum."},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Elfar, M., Zhu, H., Raghunathan, A., Tay, Y.Y., Wubbenhorst, J., Cummings, M.L., Pajic, M.: Platform for security-aware design of human-on-the-loop cyber-physical systems. In: Proceedings of the 8th International Conference on Cyber-Physical Systems, p. 93. ACM, April 2017","DOI":"10.1145\/3055004.3064846"},{"issue":"1","key":"13_CR23","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1111\/j.0963-7214.2005.00332.x","volume":"14","author":"DJ Simons","year":"2005","unstructured":"Simons, D.J., Ambinder, M.S.: Change blindness: theory and consequences. Curr. Dir. Psychol. Sci. 14(1), 44\u201348 (2005)","journal-title":"Curr. Dir. Psychol. Sci."},{"issue":"2","key":"13_CR24","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1518\/001872000779656480","volume":"42","author":"JG Temple","year":"2000","unstructured":"Temple, J.G., Warm, J.S., Dember, W.N., Jones, K.S., LaGrange, C.M., Matthews, G.: The effects of signal salience and caffeine on performance, workload, and stress in an abbreviated vigilance task. Hum. Factors 42(2), 183\u2013194 (2000)","journal-title":"Hum. Factors"},{"issue":"7","key":"13_CR25","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.1016\/j.engappai.2011.04.008","volume":"24","author":"Y Boussemart","year":"2011","unstructured":"Boussemart, Y., Cummings, M.L.: Predictive models of human supervisory control behavioral patterns using hidden semi-Markov models. Eng. Appl. Artif. Intell. 24(7), 1252\u20131262 (2011)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"3","key":"13_CR26","doi-asserted-by":"publisher","first-page":"71","DOI":"10.2514\/1.46767","volume":"8","author":"Y Boussemart","year":"2011","unstructured":"Boussemart, Y., Cummings, M.L., Las Fargeas, J.C., Roy, N.: Supervised vs. unsupervised learning for operator state modeling in unmanned vehicle settings. JACIC 8(3), 71\u201385 (2011)","journal-title":"JACIC"},{"issue":"5","key":"13_CR27","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1023\/A:1022877405718","volume":"48","author":"G Pallier","year":"2003","unstructured":"Pallier, G.: Gender differences in the self-assessment of accuracy on cognitive tasks. Sex Roles 48(5), 265\u2013276 (2003)","journal-title":"Sex Roles"}],"container-title":["Lecture Notes in Computer Science","Augmented Cognition: Users and Contexts"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91467-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T00:15:17Z","timestamp":1657152917000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91467-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319914664","9783319914671"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91467-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"3 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Augmented Cognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Las Vegas, NV","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ac2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2018.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}