{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T22:25:11Z","timestamp":1775946311164,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811575297","type":"print"},{"value":"9789811575303","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-7530-3_3","type":"book-chapter","created":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T15:50:27Z","timestamp":1597333827000},"page":"28-39","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Security, Safety and Privacy Issues of Unmanned Aerial Vehicle Systems"],"prefix":"10.1007","author":[{"given":"Najla","family":"Al-nabhan","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,14]]},"reference":[{"key":"3_CR1","unstructured":"Carr, E.B.: Unmanned aerial vehicles: examining the safety, security, privacy and regulatory issues of integration into US airspace, National Centre for Policy Analysis (NCPA) (2013)"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1057\/s41284-017-0102-5","volume":"31","author":"A Solodov","year":"2018","unstructured":"Solodov., A., Williams., A., Al Hanaei., S., et al.: Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities. Secur. J. 31, 305\u2013324 (2018). \nhttps:\/\/doi.org\/10.1057\/s41284-017-0102-5","journal-title":"Secur. J."},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3337791","volume":"52","author":"F Jahan","year":"2019","unstructured":"Jahan., F., Sun., W.Q., Niyaz., Q., Alam., M.: Security modeling of autonomous systems: a survey. ACM Comput. Surv. 52, 1\u201334 (2019)","journal-title":"ACM Comput. Surv."},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3001836","volume":"1","author":"R Altawy","year":"2016","unstructured":"Altawy., R., Youssef., A.M.: Security, privacy, and safety aspects of civilian drones: a survey. ACM Trans. Cyber Phys. Syst. 1, 1\u201325 (2016). \nhttps:\/\/doi.org\/10.1145\/3001836","journal-title":"ACM Trans. Cyber Phys. Syst."},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"Javaid, A.Y., Sun, W., Alam, M., Devabhaktuni, V.K.: Cyber security threat analysis and modeling of an unmanned aerial vehicle system (2012). \nhttps:\/\/doi.org\/10.1109\/ths.2012.6459914","DOI":"10.1109\/ths.2012.6459914"},{"key":"3_CR6","unstructured":"Hartmann, K., Steup, C.: The vulnerability of UAVs to cyber attacks\u2014an approach to the risk assessment. In: Podins, K., Stinissen, J., Maybaum, M., (eds.) 2013 5th International Conference on Cyber Conflict (cycon) (2013)"},{"issue":"5","key":"3_CR7","doi-asserted-by":"publisher","first-page":"1190","DOI":"10.1109\/TMC.2017.2750144","volume":"17","author":"I Mahjri","year":"2018","unstructured":"Mahjri., I., Dhraief., A., Belghith., A., AlMogren., A.: SLIDE: a straight line conflict detection and alerting algorithm for multiple unmanned aerial vehicles. IEEE Trans. Mobile Comput. (TMC) 17(5), 1190\u20131203 (2018)","journal-title":"IEEE Trans. Mobile Comput. (TMC)"},{"issue":"1","key":"3_CR8","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s10846-017-0766-4","volume":"92","author":"J Yang","year":"2018","unstructured":"Yang., J., Yin., D., Shen., L., Cheng., Q., Xie., X.: Cooperative deconflicting heading maneuvers applied to unmanned aerial vehicles in non-segregated airspace. J. Intell. Rob. Syst. 92(1), 187\u2013201 (2018). \nhttps:\/\/doi.org\/10.1007\/s10846-017-0766-4","journal-title":"J. Intell. Rob. Syst."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Wollkind, S., Valasek, J., Ioerger, T.R.: Automated conflict resolution for air traffic management using cooperative multiagent negotiation. In: Proceedings AIAA Guidance, Navigation, and Control Conference and Exhibit Providence, Rhode Island (2004)","DOI":"10.2514\/6.2004-4992"},{"issue":"4","key":"3_CR10","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1109\/6979.898217","volume":"1","author":"JK Kuchar","year":"2000","unstructured":"Kuchar., J.K., Yang., L.C.: A review of conflict detection and resolution modeling methods. IEEE Trans. Intell. Transp. Syst. 1(4), 179\u2013189 (2000)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"3_CR11","volume-title":"Sense and avoid in UAS: research and applications","author":"JS Lai","year":"2012","unstructured":"Lai., J.S., Ford., J.J., Mej\u00edas., L.F., O\u2019Shea., P.J., Walker., R.A.: See and avoid using onboard computer vision. In: Angelov., P. (ed.) Sense and avoid in UAS: research and applications. Wiley, West Sussex (2012)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Rodday, M., de Schmidt, R.O., Pras, A.: Exploring security vulnerabilities of unmanned aerial vehicles. In: NOMS 2016\u20132016 IEEE\/IFIP Network Operations and Management Symposium, Istanbul, pp. 993\u2013994 (2016)","DOI":"10.1109\/NOMS.2016.7502939"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Javaid, Y., Sun, W., Devabhaktuni, V.K., Alam, M.: Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), Waltham, MA, pp. 585\u2013590 (2012)","DOI":"10.1109\/THS.2012.6459914"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Rana, T., Shankar, A., Sultan, M.K., Patan, R., Balusamy, B.: An intelligent approach for uav and drone privacy security using blockchain methodology. In: 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, pp. 162\u2013167 (2019)","DOI":"10.1109\/CONFLUENCE.2019.8776613"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Mansfield, K., Eveleigh, T., Holzer, T.H., Sarkani, S.: Unmanned aerial vehicle smart device ground control station cyber security threat model. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST), Waltham, MA, pp. 722\u2013728 (2013)","DOI":"10.1109\/THS.2013.6699093"},{"key":"3_CR16","doi-asserted-by":"publisher","unstructured":"Ya dereli, E., Gemci, C., Akta\u015f, A.Z.: A study on cyber-security of autonomous and unmanned vehicles. J. Defense Model. Simul. Appl. Methodol. Technol. 12, 369\u2013381 (2015). \nhttps:\/\/doi.org\/10.1177\/1548512915575803","DOI":"10.1177\/1548512915575803"},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1177\/1548512915617252","volume":"13","author":"C Rani","year":"2015","unstructured":"Rani., C., Modares., H., Sriram., R., Mikulski., D., Lewis., F.L.: Security of unmanned aerial vehicle systems against cyber-physical attacks. J. Defense Model. Simul. Appl. Methodol. Technol. 13, 331\u2013342 (2015). \nhttps:\/\/doi.org\/10.1177\/1548512915617252","journal-title":"J. Defense Model. Simul. Appl. Methodol. Technol."},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, G., Wu, Q., Cui, M., Zhang, R.: Securing UAV communications via trajectory optimization. In: GLOBECOM 2017\u20132017 IEEE Global Communications Conference, Singapore, pp. 1\u20136 (2017)","DOI":"10.1109\/GLOCOM.2017.8254971"},{"issue":"5","key":"3_CR19","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1002\/wcm.75","volume":"2","author":"J Kong","year":"2002","unstructured":"Kong., J., Luo., H., Xu., K.D., Gu., L.L., Gerla., M., Lu., S.: Adaptive security for multilevel ad hoc networks. Wireless Commun. Mobile Comput. 2(5), 533\u2013547 (2002)","journal-title":"Wireless Commun. Mobile Comput."},{"issue":"2","key":"3_CR20","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1002\/asjc.1120","volume":"18","author":"L Fan","year":"2016","unstructured":"Fan., L., Tang., J., Ling., Y., Liu., G., Li., B.: Novel conflict resolution model for multi- UAV based on CPN and 4D trajectories. Asian J. Control 18(2), 721\u2013732 (2016)","journal-title":"Asian J. Control"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Yang, J., Yin, D., Cheng, Q., Xie, X.: Two-layer optimization to cooperative conflict detection and resolution for UAVs. In Proceedings IEEE Conference on Intelligent Transportation Systems, pp. 2072\u20132077 (2015)","DOI":"10.1109\/ITSC.2015.335"},{"issue":"1","key":"3_CR22","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/TITS.2010.2057246","volume":"12","author":"D \u0160i\u0161l\u00e1k","year":"2011","unstructured":"\u0160i\u0161l\u00e1k., D., Volf., P., Hou\u010dk., M.: Agent-based cooperative decentralized airplane- collision avoidance. IEEE Trans. Intell. Transp. Syst. 12(1), 36\u201345 (2011)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"3","key":"3_CR23","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1016\/j.adhoc.2012.12.004","volume":"11","author":"I Bekmezci","year":"2013","unstructured":"Bekmezci., I., Sahingoz., O.K., Temel., S.: Flying Ad-Hoc networks (FANETs) a survey. Ad-Hoc Netw. 11(3), 1254\u20131270 (2013)","journal-title":"Ad-Hoc Netw."},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Park, J.W., Oh, H.D., Tahk, M.J.: UAV collision avoidance based on geometric approach. In: Proceedings of the SICE Annual Conference, pp. 2122\u20132126 (2008)","DOI":"10.1109\/SICE.2008.4655013"},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.cor.2014.12.012","volume":"58","author":"J Omer","year":"2015","unstructured":"Omer., J.: A space-discretized mixed-integer linear model for air-conflict resolution with speed and heading maneuvers. Comput. Oper. Res. 58, 75\u201386 (2015)","journal-title":"Comput. Oper. Res."}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-7530-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T15:51:37Z","timestamp":1597333897000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-7530-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811575297","9789811575303"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-7530-3_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OJS\/PKP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"251","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}