{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T17:05:26Z","timestamp":1778864726862,"version":"3.51.4"},"reference-count":132,"publisher":"Springer Science and Business Media LLC","issue":"29","license":[{"start":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T00:00:00Z","timestamp":1724371200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T00:00:00Z","timestamp":1724371200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s00521-024-10306-y","type":"journal-article","created":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T11:05:52Z","timestamp":1724411152000},"page":"18009-18041","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Machine learning approaches to intrusion detection in unmanned aerial vehicles\u00a0(UAVs)"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6382-1736","authenticated-orcid":false,"given":"Raghad A.","family":"AL-Syouf","sequence":"first","affiliation":[]},{"given":"Raed M.","family":"Bani-Hani","sequence":"additional","affiliation":[]},{"given":"Omar Y.","family":"AL-Jarrah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,23]]},"reference":[{"key":"10306_CR1","doi-asserted-by":"crossref","unstructured":"Maurya S, Rauthan M, Verma R (2022) Security aspects of the internet of drones (IoD). In: 2022 second international conference on advances in electrical, computing, communication and sustainable technologies (ICAECT), pp 1\u2013 6 . IEEE","DOI":"10.1109\/ICAECT54875.2022.9807912"},{"key":"10306_CR2","unstructured":"Drones Market Size 2022\u20132030. Accessed December (2023). https:\/\/www.precedenceresearch.com\/unmanned-aerial-vehicle-drones-market."},{"key":"10306_CR3","doi-asserted-by":"crossref","unstructured":"Watkins L, Ramos J, Snow G, Vallejo J, Robinson WH, Rubin AD, Ciocco J, Jedrzejewski F, Liu J, Li C( 2018) Exploiting multi-vendor vulnerabilities as back-doors to counter the threat of rogue small unmanned aerial systems. In: Proceedings of the 1st ACM MobiHoc workshop on mobile IoT sensing, security, and privacy, pp 1\u2013 6","DOI":"10.1145\/3215466.3215467"},{"key":"10306_CR4","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/s11036-018-1193-x","volume":"25","author":"Y Zhi","year":"2020","unstructured":"Zhi Y, Fu Z, Sun X, Yu J (2020) Security and privacy issues of UAV: a survey. Mobile Netw Appl 25:95\u2013101","journal-title":"Mobile Netw Appl"},{"key":"10306_CR5","doi-asserted-by":"crossref","first-page":"102894","DOI":"10.1016\/j.adhoc.2022.102894","volume":"133","author":"K-Y Tsao","year":"2022","unstructured":"Tsao K-Y, Girdler T, Vassilakis VG (2022) A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks. Ad Hoc Netw 133:102894","journal-title":"Ad Hoc Netw"},{"key":"10306_CR6","doi-asserted-by":"crossref","first-page":"109626","DOI":"10.1016\/j.comnet.2023.109626","volume":"224","author":"Y Mekdad","year":"2023","unstructured":"Mekdad Y, Aris A, Babun L, El Fergougui A, Conti M, Lazzeretti R, Uluagac AS (2023) A survey on security and privacy issues of UAVs. Comput Netw 224:109626","journal-title":"Comput Netw"},{"key":"10306_CR7","doi-asserted-by":"crossref","unstructured":"Iqbal, S ( 2021) A study on UAV operating system security and future research challenges. In: 2021 IEEE 11th annual computing and communication workshop and conference (CCWC), pp 0759\u2013 0765 . IEEE","DOI":"10.1109\/CCWC51732.2021.9376151"},{"issue":"02","key":"10306_CR8","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1142\/S2301385014300017","volume":"2","author":"G Cai","year":"2014","unstructured":"Cai G, Dias J, Seneviratne L (2014) A survey of small-scale unmanned aerial vehicles: recent advances and future development trends. Unmanned Syst 2(02):175\u2013199","journal-title":"Unmanned Syst"},{"key":"10306_CR9","doi-asserted-by":"crossref","unstructured":"Rong-Xiao G, Ji-wei T, Bu-hong W, Fu-te S ( 2020) Cyber-physical attack threats analysis for UAVs from cps perspective. In: 2020 international conference on computer engineering and application (ICCEA), pp 259\u2013 263 . IEEE","DOI":"10.1109\/ICCEA50009.2020.00063"},{"key":"10306_CR10","doi-asserted-by":"crossref","first-page":"57243","DOI":"10.1109\/ACCESS.2021.3072030","volume":"9","author":"M Yahuza","year":"2021","unstructured":"Yahuza M, Idris MYI, Ahmedy IB, Wahab AWA, Nandy T, Noor NM, Bala A (2021) Internet of drones security and privacy issues: taxonomy and open challenges. IEEE Access 9:57243\u201357270","journal-title":"IEEE Access"},{"key":"10306_CR11","unstructured":"Mohan, M (2016) Cybersecurity in drones. PhD thesis, Utica College"},{"key":"10306_CR12","unstructured":"Drone crash due to GPS Interference in U.K. Raises safety questions. Accessed December (2023)"},{"key":"10306_CR13","unstructured":"HK 1-million in damage caused by GPS jamming that caused 46 drones to plummet during Hong Kong Show. Accessed December (2023)"},{"key":"10306_CR14","doi-asserted-by":"crossref","unstructured":"Ayati SA, Naji HR( 2022) A secure mechanism to protect UAV communications. In: 2022 9th Iranian joint congress on fuzzy and intelligent systems (CFIS), pp 1\u2013 6 . IEEE","DOI":"10.1109\/CFIS54774.2022.9756480"},{"key":"10306_CR15","doi-asserted-by":"crossref","unstructured":"Pu C, Li Y (2020) Lightweight authentication protocol for unmanned aerial vehicles using physical unclonable function and chaotic system. In: 2020 IEEE international symposium on local and metropolitan area networks (LANMAN, pp 1\u2013 6 . IEEE","DOI":"10.1109\/LANMAN49260.2020.9153239"},{"key":"10306_CR16","doi-asserted-by":"crossref","unstructured":"Kim K, Kang Y ( 2020) Drone security module for uav data encryption. In: 2020 international conference on information and communication technology convergence (ICTC), pp 1672\u2013 1674 . IEEE","DOI":"10.1109\/ICTC49870.2020.9289387"},{"key":"10306_CR17","unstructured":"Systems, M.E(2024) Lockheed Martin to leverage Silent CROW open architecture system to develop cyber\/EW system. https:\/\/militaryembedded.com\/radar-ew\/sensors\/lockheed-martin-to-leverage-silent-crow-open-architecture-system-to-develop-cyberew-system. Accessed: -07-09 (Publication date not specified)"},{"key":"10306_CR18","unstructured":"Technology, A (2019) US Army Contracts Lockheed Martin for EW Podded System. Accessed: 07 Nov 2024. https:\/\/www.army-technology.com\/news\/lockheed-martin-ew-podded-system\/"},{"key":"10306_CR19","doi-asserted-by":"crossref","unstructured":"Choudhary G, Sharma V, You I, Yim K, Chen R, Cho J-H ( 2018) Intrusion detection systems for networked unmanned aerial vehicles: a survey. In: 2018 14th international wireless communications and mobile computing conference (IWCMC), pp 560\u2013 565 . IEEE","DOI":"10.1109\/IWCMC.2018.8450305"},{"issue":"4","key":"10306_CR20","doi-asserted-by":"crossref","first-page":"248","DOI":"10.3390\/drones7040248","volume":"7","author":"V Subbarayalu","year":"2023","unstructured":"Subbarayalu V, Vensuslaus MA (2023) An intrusion detection system for drone swarming utilizing timed probabilistic automata. Drones 7(4):248","journal-title":"Drones"},{"key":"10306_CR21","doi-asserted-by":"crossref","unstructured":"Abu\u00a0Al-Haija, Q., Al\u00a0Badawi, A(2022) High-performance intrusion detection system for networked uavs via deep learning. Neural Comput Appl, 1\u201316","DOI":"10.1007\/s00521-022-07015-9"},{"key":"10306_CR22","unstructured":"Kurunathan H, Huang H, Li K, Ni W, Hossain E (2022) Machine learning-aided operations and communications of unmanned aerial vehicles: a contemporary survey. arXiv preprint arXiv:2211.04324"},{"key":"10306_CR23","doi-asserted-by":"crossref","first-page":"148244","DOI":"10.1109\/ACCESS.2021.3124996","volume":"9","author":"P-Y Kong","year":"2021","unstructured":"Kong P-Y (2021) A survey of cyberattack countermeasures for unmanned aerial vehicles. IEEE Access 9:148244\u2013148263","journal-title":"IEEE Access"},{"issue":"7","key":"10306_CR24","doi-asserted-by":"crossref","first-page":"1072","DOI":"10.3390\/electronics11071072","volume":"11","author":"G Karopoulos","year":"2022","unstructured":"Karopoulos G, Kambourakis G, Chatzoglou E, Hern\u00e1ndez-Ramos JL, Kouliaridis V (2022) Demystifying in-vehicle intrusion detection systems: a survey of surveys and a meta-taxonomy. Electronics 11(7):1072","journal-title":"Electronics"},{"key":"10306_CR25","doi-asserted-by":"crossref","unstructured":"Rahman K, Aziz MA, Kashif AU, Cheema TA ( 2022) Detection of security attacks using intrusion detection system for uav networks: a survey. In: Big Data analytics and computational intelligence for cybersecurity, pp 109\u2013123. Springer","DOI":"10.1007\/978-3-031-05752-6_7"},{"key":"10306_CR26","doi-asserted-by":"crossref","unstructured":"Alrefaei F, Alzahrani A, Song H, Alrefaei S ( 2022) A survey on the jamming and spoofing attacks on the unmanned aerial vehicle networks. In: 2022 IEEE international IOT, electronics and mechatronics conference (IEMTRONICS), pp 1\u2013 7 . IEEE","DOI":"10.1109\/IEMTRONICS55184.2022.9795809"},{"key":"10306_CR27","doi-asserted-by":"crossref","unstructured":"Durfey N, Sajal S (2022) A comprehensive survey: cybersecurity challenges and futures of autonomous drones. In: 2022 intermountain engineering, technology and computing (IETC), pp 1\u20137","DOI":"10.1109\/IETC54973.2022.9796881"},{"key":"10306_CR28","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1016\/j.neucom.2022.11.020","volume":"518","author":"J Su","year":"2023","unstructured":"Su J, Zhu X, Li S, Chen W-H (2023) Ai meets uavs: a survey on ai empowered uav perception systems for precision agriculture. Neurocomputing 518:242\u2013270","journal-title":"Neurocomputing"},{"issue":"19","key":"10306_CR29","doi-asserted-by":"crossref","first-page":"8077","DOI":"10.3390\/s23198077","volume":"23","author":"E Ntizikira","year":"2023","unstructured":"Ntizikira E, Lei W, Alblehai F, Saleem K, Lodhi MA (2023) Secure and privacy-preserving intrusion detection and prevention in the internet of unmanned aerial vehicles. Sensors 23(19):8077","journal-title":"Sensors"},{"key":"10306_CR30","doi-asserted-by":"crossref","unstructured":"Shafik W, Matinkhah SM, Shokoor F (2023) Cybersecurity in unmanned aerial vehicles: a review. international Journal on Smart Sensing and Intelligent Systems 16(1)","DOI":"10.2478\/ijssis-2023-0012"},{"key":"10306_CR31","unstructured":"PX4 Autopilot: PX4 Documentation: PX4 Basic Concepts. https:\/\/docs.px4.io\/main\/en\/getting_started\/px4_basic_concepts.html. 2023"},{"issue":"1","key":"10306_CR32","doi-asserted-by":"crossref","first-page":"47","DOI":"10.3390\/drones7010047","volume":"7","author":"S Partheepan","year":"2023","unstructured":"Partheepan S, Sanati F, Hassan J (2023) Autonomous unmanned aerial vehicles in bushfire management: challenges and opportunities. Drones 7(1):47","journal-title":"Drones"},{"key":"10306_CR33","doi-asserted-by":"crossref","DOI":"10.1016\/j.apenergy.2019.113823","volume":"255","author":"MN Boukoberine","year":"2019","unstructured":"Boukoberine MN, Zhou Z, Benbouzid M (2019) A critical review on unmanned aerial vehicles power supply and energy management: solutions, strategies, and prospects. Appl Energy 255:113823","journal-title":"Appl Energy"},{"key":"10306_CR34","unstructured":"A-Techsyn GCS\/MCS. Accessed:2023. https:\/\/www.a-techsyn.com\/gcs\/pcs\/"},{"key":"10306_CR35","unstructured":"A-Techsyn GCS\/MCS. Accessed:2023. https:\/\/www.a-techsyn.com\/gcs\/mcs\/"},{"key":"10306_CR36","doi-asserted-by":"crossref","unstructured":"Chaari L, Chahbani S, Rezgui J ( 2020) Vulnerabilities assessment for unmanned aerial vehicles communication systems. In: 2020 international symposium on networks, computers and communications (ISNCC), pp 1\u2013 6 . IEEE","DOI":"10.1109\/ISNCC49221.2020.9297293"},{"key":"10306_CR37","unstructured":"MAVLink. Accessed:2023. https:\/\/mavlink.io\/en\/"},{"issue":"1","key":"10306_CR38","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MCOMSTD.0001.2100057","volume":"6","author":"D Saraswat","year":"2022","unstructured":"Saraswat D, Bhattacharya P, Singh A, Verma A, Tanwar S, Kumar N (2022) Secure 5g-assisted uav access scheme in iobt for region demarcation and surveillance operations. IEEE Commun Stand Mag 6(1):58\u201366","journal-title":"IEEE Commun Stand Mag"},{"key":"10306_CR39","unstructured":"Stewart M, Martin S, Barrera N (2021) Unmanned aerial vehicles: fundamentals, components, mechanics, and regulations. Unmanned Aerial Veh, 1\u201370"},{"key":"10306_CR40","unstructured":"Aerotas: Drone Types. 2023. https:\/\/www.auav.com.au\/articles\/drone-types\/#1"},{"key":"10306_CR41","doi-asserted-by":"crossref","first-page":"107035","DOI":"10.1016\/j.ast.2021.107035","volume":"118","author":"GJ Ducard","year":"2021","unstructured":"Ducard GJ, Allenspach M (2021) Review of designs and flight control techniques of hybrid and convertible vtol uavs. Aerosp Sci Technol 118:107035","journal-title":"Aerosp Sci Technol"},{"issue":"3","key":"10306_CR42","doi-asserted-by":"crossref","first-page":"172988142110158","DOI":"10.1177\/17298814211015863","volume":"18","author":"H Ucgun","year":"2021","unstructured":"Ucgun H, Yuzgec U, Bayilmis C (2021) A review on applications of rotary-wing unmanned aerial vehicle charging stations. Int J Adv Rob Syst 18(3):17298814211015864","journal-title":"Int J Adv Rob Syst"},{"issue":"2","key":"10306_CR43","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s10846-022-01743-9","volume":"106","author":"FF Lizzio","year":"2022","unstructured":"Lizzio FF, Capello E, Guglieri G (2022) A review of consensus-based multi-agent uav implementations. J Intell Robot Syst 106(2):43","journal-title":"J Intell Robot Syst"},{"issue":"1","key":"10306_CR44","doi-asserted-by":"crossref","first-page":"217","DOI":"10.3390\/en15010217","volume":"15","author":"P Velusamy","year":"2021","unstructured":"Velusamy P, Rajendran S, Mahendran RK, Naseer S, Shafiq M, Choi J-G (2021) Unmanned aerial vehicles (uav) in precision agriculture: applications and challenges. Energies 15(1):217","journal-title":"Energies"},{"key":"10306_CR45","doi-asserted-by":"crossref","unstructured":"Rumba R, Nikitenko A( 2020) The wild west of drones: a review on autonomous-uav traffic-management. In: 2020 international conference on unmanned aircraft systems (ICUAS), pp 1317\u2013 1322 . IEEE","DOI":"10.1109\/ICUAS48674.2020.9214031"},{"key":"10306_CR46","doi-asserted-by":"crossref","first-page":"101728","DOI":"10.1016\/j.sysarc.2020.101728","volume":"107","author":"C Ge","year":"2020","unstructured":"Ge C, Ma X, Liu Z (2020) A semi-autonomous distributed blockchain-based framework for uavs system. J Syst Archit 107:101728","journal-title":"J Syst Archit"},{"key":"10306_CR47","doi-asserted-by":"crossref","unstructured":"Teng L, Jianfeng M, Pengbin F, Yue M, Xindi M, Jiawei Z, Gao C, Di L ( 2019) Lightweight security authentication mechanism towards uav networks. In: 2019 international conference on networking and network applications (NaNA), pp 379\u2013 384 . IEEE","DOI":"10.1109\/NaNA.2019.00072"},{"key":"10306_CR48","doi-asserted-by":"crossref","unstructured":"Atoev, S., Kwon, O.-J., Kim, C.-Y., Lee, S.-H., Choi, Y.-R., Kwon, K.-R ( 2019) The secure uav communication link based on otp encryption technique. In: 2019 eleventh international conference on ubiquitous and future networks (ICUFN), pp 1\u2013 3 . IEEE","DOI":"10.1109\/ICUFN.2019.8806165"},{"key":"10306_CR49","doi-asserted-by":"crossref","unstructured":"Demeri A, Diehl W, Salman A (2020) Saddle: secure aerial data delivery with lightweight encryption. In: Intelligent computing: proceedings of the 2020 computing conference 3:204\u2013223. Springer","DOI":"10.1007\/978-3-030-52243-8_17"},{"key":"10306_CR50","doi-asserted-by":"publisher","unstructured":"Chaari L, Chahbani S, Rezgui J ( 2020) Vulnerabilities assessment for unmanned aerial vehicles communication systems. In: 2020 international symposium on networks, computers and communications (ISNCC), pp 1\u2013 6. https:\/\/doi.org\/10.1109\/ISNCC49221.2020.9297293","DOI":"10.1109\/ISNCC49221.2020.9297293"},{"key":"10306_CR51","unstructured":"Shepard DP, Bhatti JA, Humphreys TE, Fansler AA (2012) Evaluation of smart grid and civilian uav vulnerability to gps spoofing attacks. In: Proceedings of the 25th international technical meeting of the satellite division of the institute of navigation (ION GNSS 2012), pp 3591\u2013 3605"},{"key":"10306_CR52","unstructured":"Humphreys TE, Ledvina BM, Psiaki ML, O\u2019Hanlon BW, Kintner PM, et al ( 2008) Assessing the spoofing threat: development of a portable gps civilian spoofer. In: Proceedings of the 21st international technical meeting of the satellite division of the institute of navigation (ION GNSS 2008), pp 2314\u2013 2325"},{"key":"10306_CR53","unstructured":"Nayfeh M (2023) Artificial intelligence-based gps spoofing detection and implementation with applications to unmanned aerial vehicles"},{"key":"10306_CR54","doi-asserted-by":"crossref","unstructured":"Nyangaresi VO, Morsy M ( 2021) Towards privacy preservation in internet of drones. In: 2021 IEEE 6th international forum on research and technology for society and industry (RTSI), pp 306\u2013 311 . IEEE","DOI":"10.1109\/RTSI50628.2021.9597324"},{"key":"10306_CR55","doi-asserted-by":"crossref","unstructured":"Li Y, Pu C ( 2020) Lightweight digital signature solution to defend micro aerial vehicles against man-in-the-middle attack. In: 2020 IEEE 23rd international conference on computational science and engineering (CSE), pp 92\u2013 97 . IEEE","DOI":"10.1109\/CSE50738.2020.00020"},{"issue":"1","key":"10306_CR56","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s10916-019-1489-9","volume":"44","author":"SC Sethuraman","year":"2020","unstructured":"Sethuraman SC, Vijayakumar V, Walczak S (2020) Cyber attacks on healthcare devices using unmanned aerial vehicles. J Med Syst 44(1):29","journal-title":"J Med Syst"},{"key":"10306_CR57","doi-asserted-by":"crossref","first-page":"16859","DOI":"10.1109\/ACCESS.2022.3150020","volume":"10","author":"Y Li","year":"2022","unstructured":"Li Y, Pawlak J, Price J, Al Shamaileh K, Niyaz Q, Paheding S, Devabhaktuni V (2022) Jamming detection and classification in ofdm-based uavs via feature-and spectrogram-tailored machine learning. IEEE Access 10:16859\u201316870","journal-title":"IEEE Access"},{"key":"10306_CR58","doi-asserted-by":"crossref","first-page":"93803","DOI":"10.1109\/ACCESS.2021.3089847","volume":"9","author":"A Shafique","year":"2021","unstructured":"Shafique A, Mehmood A, Elhadef M (2021) Detecting signal spoofing attack in uavs using machine learning models. IEEE Access 9:93803\u201393815","journal-title":"IEEE Access"},{"issue":"4","key":"10306_CR59","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MWC.01.1900545","volume":"27","author":"AS Abdalla","year":"2020","unstructured":"Abdalla AS, Powell K, Marojevic V, Geraci G (2020) UAV-assisted attack prevention, detection, and recovery of 5G networks. IEEE Wirel Commun 27(4):40\u201347","journal-title":"IEEE Wirel Commun"},{"key":"10306_CR60","doi-asserted-by":"crossref","first-page":"53769","DOI":"10.1109\/ACCESS.2021.3070683","volume":"9","author":"Y Lei","year":"2021","unstructured":"Lei Y, Zeng L, Li Y-X, Wang M-X, Qin H (2021) A lightweight authentication protocol for uav networks based on security and computational resource optimization. IEEE Access 9:53769\u201353785","journal-title":"IEEE Access"},{"key":"10306_CR61","doi-asserted-by":"crossref","unstructured":"Khoei TT, Gasimova A, Ahajjam M, Al\u00a0Shamaileh K, Devabhaktuni V, Kaabouch N ( 2022) A comparative analysis of supervised and unsupervised models for detecting gps spoofing attack on uavs. In: 2022 IEEE international conference on electro information technology (eIT), pp 279\u2013 284 . IEEE","DOI":"10.1109\/eIT53891.2022.9813826"},{"key":"10306_CR62","doi-asserted-by":"crossref","unstructured":"Slimane HO, Benouadah S, Khoei TT, Kaabouch N ( 2022) A light boosting-based ml model for detecting deceptive jamming attacks on uavs. In: 2022 IEEE 12th annual computing and communication workshop and conference (CCWC), pp 0328\u2013 0333 . IEEE","DOI":"10.1109\/CCWC54503.2022.9720830"},{"issue":"2","key":"10306_CR63","first-page":"13","volume":"9","author":"\u0130 Bekmezci","year":"2016","unstructured":"Bekmezci \u0130, \u015eent\u00fcrk E, T\u00fcrker T (2016) Security issues in flying ad-hoc networks (fanets). J Aeronaut Space Technol 9(2):13\u201321","journal-title":"J Aeronaut Space Technol"},{"key":"10306_CR64","doi-asserted-by":"crossref","unstructured":"Renu Sharma S, Saxena S (2020) Blockchain and UAV: security, challenges and research issues. Proceedings of UASG 2019: unmanned aerial system in geomatics 1, 99\u2013107","DOI":"10.1007\/978-3-030-37393-1_11"},{"key":"10306_CR65","doi-asserted-by":"crossref","unstructured":"Chulerttiyawong D, Jamalipour A (2023) Sybil attack detection in internet of flying things-ioft: a machine learning approach. IEEE Internet  Things J","DOI":"10.1109\/JIOT.2023.3257848"},{"key":"10306_CR66","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.comcom.2020.08.016","volume":"162","author":"BD Deebak","year":"2020","unstructured":"Deebak BD, Al-Turjman F (2020) A smart lightweight privacy preservation scheme for iot-based uav communication systems. Comput Commun 162:102\u2013117","journal-title":"Comput Commun"},{"key":"10306_CR67","doi-asserted-by":"crossref","unstructured":"Alhamad M, Dillon T, Chang E ( 2010) Conceptual sla framework for cloud computing. In: 4th IEEE international conference on digital ecosystems and technologies, pp 606\u2013 610 . IEEE","DOI":"10.1109\/DEST.2010.5610586"},{"key":"10306_CR68","unstructured":"Vaidya V (2001) Dynamic signature inspection-based network intrusion detection. Google Patents. US Patent 6,279,113"},{"issue":"1","key":"10306_CR69","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1109\/TNSM.2020.3036138","volume":"18","author":"P Satam","year":"2020","unstructured":"Satam P, Hariri S (2020) Wids:An anomaly based intrusion detection system for wi-fi (ieee 802.11) protocol. IEEE Trans Netw Serv Manag 18(1):1077\u20131091","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"10306_CR70","doi-asserted-by":"crossref","unstructured":"Einy S, Oz C, Navaei YD (2021) The anomaly-and signature-based ids for network security using hybrid inference systems. Math Probl Eng 2021","DOI":"10.1155\/2021\/6639714"},{"key":"10306_CR71","doi-asserted-by":"crossref","unstructured":"Alkahtani H, Aldhyani TH, Al-Yaari M (2020) Adaptive anomaly detection framework model objects in cyberspace. Applied Bionics and Biomech 2020:6660489","DOI":"10.1155\/2020\/6660489"},{"key":"10306_CR72","doi-asserted-by":"crossref","unstructured":"Kurunathan H, Huang H, Li K, Ni W, Hossain E (2023) Machine learning-aided operations and communications of unmanned aerial vehicles: a contemporary survey. IEEE Communications surveys and tutorials","DOI":"10.1109\/COMST.2023.3312221"},{"key":"10306_CR73","doi-asserted-by":"crossref","first-page":"106476","DOI":"10.1016\/j.compag.2021.106476","volume":"190","author":"DB Marin","year":"2021","unstructured":"Marin DB, Santana LS, Barbosa BDS, Barata RAP, Osco LP, Ramos APM, Guimar\u00e3es PHS et al (2021) Detecting coffee leaf rust with uav-based vegetation indices and decision tree machine learning models. Comput Electron Agric 190:106476","journal-title":"Comput Electron Agric"},{"key":"10306_CR74","doi-asserted-by":"crossref","unstructured":"Sheikh MU, Ghavimi F, Ruttik K, Jantti R ( 2019) Drone detection and classification using cellular network: A machine learning approach. In: 2019 IEEE 90th Vehicular technology conference (VTC2019-Fall), pp 1\u2013 6 . IEEE","DOI":"10.1109\/VTCFall.2019.8891229"},{"issue":"01","key":"10306_CR75","doi-asserted-by":"crossref","first-page":"20","DOI":"10.38094\/jastt20165","volume":"2","author":"B Charbuty","year":"2021","unstructured":"Charbuty B, Abdulazeez A (2021) Classification based on decision tree algorithm for machine learning. J Appl Sci Technol Trends 2(01):20\u201328","journal-title":"J Appl Sci Technol Trends"},{"key":"10306_CR76","doi-asserted-by":"crossref","first-page":"107806","DOI":"10.1016\/j.asoc.2021.107806","volume":"111","author":"C Greco","year":"2021","unstructured":"Greco C, Pace P, Basagni S, Fortino G (2021) Jamming detection at the edge of drone networks using multi-layer perceptrons and decision trees. Appl Soft Comput 111:107806","journal-title":"Appl Soft Comput"},{"key":"10306_CR77","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/s11749-016-0481-7","volume":"25","author":"G Biau","year":"2016","unstructured":"Biau G, Scornet E (2016) A random forest guided tour. TEST 25:197\u2013227","journal-title":"TEST"},{"issue":"16","key":"10306_CR78","doi-asserted-by":"crossref","first-page":"3885","DOI":"10.3390\/rs14163885","volume":"14","author":"Q Guo","year":"2022","unstructured":"Guo Q, Zhang J, Guo S, Ye Z, Deng H, Hou X, Zhang H (2022) Urban tree classification based on object-oriented approach and random forest algorithm using unmanned aerial vehicle (UAV) multispectral imagery. Remote Sens 14(16):3885","journal-title":"Remote Sens"},{"key":"10306_CR79","unstructured":"Lu H, Karimireddy SP, Ponomareva N, Mirrokni V (2020) Accelerating gradient boosting machines. In: International conference on artificial intelligence and statistics, pp 516\u2013 526 . PMLR"},{"key":"10306_CR80","doi-asserted-by":"crossref","unstructured":"Zhang S, Li J(2021) Knn classification with one-step computation. IEEE transactions on knowledge and data engineering","DOI":"10.1109\/TKDE.2021.3119140"},{"issue":"2","key":"10306_CR81","first-page":"32","volume":"20","author":"F Tarakci","year":"2021","unstructured":"Tarakci F, Ozkan IA (2021) Comparison of classification performance of knn and wknn algorithms. Selcuk Univ J Eng Sci 20(2):32\u201337","journal-title":"Selcuk Univ J Eng Sci"},{"key":"10306_CR82","first-page":"581","volume":"1","author":"T Chauhan","year":"2021","unstructured":"Chauhan T, Rawat S, Malik S, Singh P (2021) Supervised and unsupervised machine learning based review on diabetes care. In: 2021 7th international conference on advanced computing and communication systems (ICACCS), 1:581\u2013585 (IEEE)","journal-title":"In: 2021 7th international conference on advanced computing and communication systems (ICACCS),"},{"issue":"3","key":"10306_CR83","doi-asserted-by":"crossref","first-page":"214","DOI":"10.3390\/drones7030214","volume":"7","author":"AI Abubakar","year":"2023","unstructured":"Abubakar AI, Ahmad I, Omeke KG, Ozturk M, Ozturk C, Abdel-Salam AM, Mollel MS, Abbasi QH, Hussain S, Imran MA (2023) A survey on energy optimization techniques in uav-based cellular networks: from conventional to machine learning approaches. Drones 7(3):214","journal-title":"Drones"},{"key":"10306_CR84","unstructured":"The ultimate guide to artificial neural networks (ANN). Accessed:2023. https:\/\/www.superdatascience.com\/blogs\/the-ultimate-guide-to-artificial-neural-networks-ann"},{"key":"10306_CR85","doi-asserted-by":"crossref","first-page":"105444","DOI":"10.1016\/j.jobe.2022.105444","volume":"63","author":"MM Moein","year":"2023","unstructured":"Moein MM, Saradar A, Rahmati K, Mousavinejad SHG, Bristow J, Aramali V, Karakouzian M (2023) Predictive models for concrete properties using machine learning and deep learning approaches: a review. J Build Eng 63:105444","journal-title":"Journal of Building Engineering"},{"key":"10306_CR86","first-page":"5","volume":"1524","author":"Y LeCun","year":"1998","unstructured":"LeCun Y, Bottou L, Orr GB, M\u00fcller K-R (1998) Efficient backprop. Lect Notes Comput Sci 1524:5\u201350","journal-title":"Lect Notes Comput Sci"},{"key":"10306_CR87","doi-asserted-by":"crossref","unstructured":"Wang S, Wang J, Su C, Ma X ( 2020) Intelligent detection algorithm against uavs\u2019 gps spoofing attack. In: 2020 IEEE 26th international conference on parallel and distributed systems (iCPADS), pp 382\u2013 389 . IEEE","DOI":"10.1109\/ICPADS51040.2020.00058"},{"key":"10306_CR88","doi-asserted-by":"crossref","unstructured":"Slimane HO, Benouadah S, Al\u00a0Shamaileh K, Devabhaktuni V, Kaabouch N (2022) Ads-b message injection attack on uavs: assessment of svm-based detection techniques. In: 2022 IEEE international conference on electro information technology (eIT), pp 405\u2013 410 . IEEE","DOI":"10.1109\/eIT53891.2022.9813819"},{"issue":"2","key":"10306_CR89","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1109\/LWC.2019.2945022","volume":"9","author":"TM Hoang","year":"2019","unstructured":"Hoang TM, Nguyen NM, Duong TQ (2019) Detection of eavesdropping attack in uav-aided wireless systems: unsupervised learning with one-class svm and k-means clustering. IEEE Wirel Commun Lett 9(2):139\u2013142","journal-title":"IEEE Wirel Commun Lett"},{"key":"10306_CR90","doi-asserted-by":"crossref","unstructured":"Arthur MP ( 2019) Detecting signal spoofing and jamming attacks in uav networks using a lightweight ids. In: 2019 international conference on computer, information and telecommunication systems (CITS), pp 1\u2013 5 . IEEE","DOI":"10.1109\/CITS.2019.8862148"},{"key":"10306_CR91","doi-asserted-by":"crossref","unstructured":"Whelan J, Sangarapillai T, Minawi O, Almehmadi A, El-Khatib K ( 2020) Novelty-based intrusion detection of sensor attacks on unmanned aerial vehicles. In: Proceedings of the 16th ACM symposium on QoS and security for wireless and mobile networks, pp 23\u2013 28","DOI":"10.1145\/3416013.3426446"},{"issue":"2","key":"10306_CR92","doi-asserted-by":"crossref","first-page":"755","DOI":"10.3390\/app13020755","volume":"13","author":"MS Munir","year":"2023","unstructured":"Munir MS, Dipro SH, Hasan K, Islam T, Shetty S (2023) Artificial intelligence-enabled exploratory cyber-physical safety analyzer framework for civilian urban air mobility. Appl Sci 13(2):755","journal-title":"Appl Sci"},{"key":"10306_CR93","doi-asserted-by":"crossref","unstructured":"Agyapong RA, Nabil M, Nuhu A-R, Rasul MI, Homaifar A ( 2021) Efficient detection of gps spoofing attacks on unmanned aerial vehicles using deep learning. In: 2021 IEEE symposium series on computational intelligence (SSCI), pp 01\u2013 08 . IEEE","DOI":"10.1109\/SSCI50451.2021.9659972"},{"issue":"3","key":"10306_CR94","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1109\/JCN.2020.000015","volume":"22","author":"NI Mowla","year":"2020","unstructured":"Mowla NI, Tran NH, Doh I, Chae K (2020) Afrl: Adaptive federated reinforcement learning for intelligent jamming defense in fanet. J Commun Netw 22(3):244\u2013258","journal-title":"J Commun Netw"},{"issue":"13","key":"10306_CR95","doi-asserted-by":"crossref","first-page":"1549","DOI":"10.3390\/electronics10131549","volume":"10","author":"R Shrestha","year":"2021","unstructured":"Shrestha R, Omidkar A, Roudi SA, Abbas R, Kim S (2021) Machine-learning-enabled intrusion detection system for cellular connected uav networks. Electronics 10(13):1549","journal-title":"Electronics"},{"key":"10306_CR96","doi-asserted-by":"crossref","unstructured":"Viana J, Farkhari H, Campos LM, Sebasti\u00e3o P, Cercas F, Bernardo L, Dinis R (2022) Two methods for jamming identification in uav networks using new synthetic dataset. In: 2022 IEEE 95th vehicular technology conference:(VTC2022-Spring), pp 1\u2013 6 . IEEE","DOI":"10.1109\/VTC2022-Spring54318.2022.9860816"},{"key":"10306_CR97","doi-asserted-by":"crossref","unstructured":"Aissou G, Slimane HO, Benouadah S, Kaabouch N (2021) Tree-based supervised machine learning models for detecting gps spoofing attacks on uas. In: 2021 IEEE 12th annual ubiquitous computing, electronics & mobile communication conference (UEMCON), pp 0649\u2013 0653 . IEEE","DOI":"10.1109\/UEMCON53757.2021.9666744"},{"key":"10306_CR98","doi-asserted-by":"crossref","unstructured":"Aissou G, Benouadah S, El\u00a0Alami H, Kaabouch N (2022) Instance-based supervised machine learning models for detecting gps spoofing attacks on uas. In: 2022 IEEE 12th annual computing and communication workshop and conference (CCWC), pp 0208\u2013 0214 . IEEE","DOI":"10.1109\/CCWC54503.2022.9720888"},{"key":"10306_CR99","doi-asserted-by":"crossref","unstructured":"Nayfeh M, Price J, Alkhatib M, Al\u00a0Shamaileh K, Kaabouch N, Devabhaktuni V (2023) A real-time machine learning-based gps spoofing solution for location-dependent uav applications. In: 2023 IEEE international conference on electro information technology (eIT), pp 289\u2013 293 . IEEE","DOI":"10.1109\/eIT57321.2023.10187344"},{"issue":"8","key":"10306_CR100","doi-asserted-by":"crossref","first-page":"10947","DOI":"10.1007\/s12652-022-04362-2","volume":"14","author":"JK Samriya","year":"2023","unstructured":"Samriya JK, Kumar M, Tiwari R (2023) Energy-aware aco-dnn optimization model for intrusion detection of unmanned aerial vehicle (uavs). J Ambient Intell Humaniz Comput 14(8):10947\u201310962","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"10306_CR101","first-page":"2639","volume":"70","author":"V Praveena","year":"2022","unstructured":"Praveena V, Vijayaraj A, Chinnasamy P, Ali I, Alroobaea R, Alyahyan SY, Raza MA (2022) Optimal deep reinforcement learning for intrusion detection in UAVs. Comput MaterContinua 70(2):2639\u20132653","journal-title":"Comput MaterContinua"},{"key":"10306_CR102","doi-asserted-by":"crossref","unstructured":"Dang Y, Benzaid C, Yang B, Taleb T(2022) Deep learning for gps spoofing detection in cellular enabled unmanned aerial vehicle systems. arXiv preprint arXiv:2201.00568","DOI":"10.1109\/NaNA53684.2021.00093"},{"issue":"6","key":"10306_CR103","doi-asserted-by":"crossref","first-page":"147","DOI":"10.3390\/drones6060147","volume":"6","author":"SAH Mohsan","year":"2022","unstructured":"Mohsan SAH, Khan MA, Noor F, Ullah I, Alsharif MH (2022) Towards the unmanned aerial vehicles (UAVs): a comprehensive review. Drones 6(6):147","journal-title":"Drones"},{"key":"10306_CR104","unstructured":"Carr EB (2013) Unmanned aerial vehicles: Examining the safety, security, privacy and regulatory issues of integration into us airspace. National Centre for Policy Analysis (NCPA). Retrieved on September 23( 2013), 2014"},{"key":"10306_CR105","doi-asserted-by":"crossref","first-page":"104313","DOI":"10.1016\/j.dib.2019.104313","volume":"26","author":"MS Allahham","year":"2019","unstructured":"Allahham MS, Al-Sa\u2019d MF, Al-Ali A, Mohamed A, Khattab T, Erbad A (2019) Dronerf dataset: a dataset of drones for rf-based detection, classification and identification. Data Brief 26:104313","journal-title":"Data Brief"},{"key":"10306_CR106","doi-asserted-by":"publisher","unstructured":"Aissou G, Benouadah S, EL\u00a0ALAMI H, Kaabouch N. A DATASET for GPS spoofing detection on autonomous vehicles. https:\/\/doi.org\/10.21227\/8x3h-2817","DOI":"10.21227\/8x3h-2817"},{"key":"10306_CR107","doi-asserted-by":"crossref","first-page":"4338","DOI":"10.1109\/ACCESS.2019.2962873","volume":"8","author":"NI Mowla","year":"2019","unstructured":"Mowla NI, Tran NH, Doh I, Chae K (2019) Federated learning-based cognitive detection of jamming attack in flying ad-hoc network. IEEE Access 8:4338\u20134350","journal-title":"IEEE Access"},{"key":"10306_CR108","doi-asserted-by":"crossref","unstructured":"Lahsen-Cherif I, Liu H, Lamy-Bergot C (2022) Real-time drone anti-collision avoidance systems: an edge artificial intelligence application. In: 2022 IEEE radar conference (RadarConf22), pp 1\u2013 6 . IEEE","DOI":"10.1109\/RadarConf2248738.2022.9764175"},{"key":"10306_CR109","doi-asserted-by":"crossref","unstructured":"Imad M, Abul\u00a0Hassan M, Hussain\u00a0Bangash S, et al (2022) A comparative analysis of intrusion detection in iot network using machine learning. In: Big data analytics and computational intelligence for cybersecurity, pp 149\u2013 163. Springer","DOI":"10.1007\/978-3-031-05752-6_10"},{"issue":"3","key":"10306_CR110","doi-asserted-by":"crossref","first-page":"3803","DOI":"10.1002\/ett.3803","volume":"33","author":"Y Otoum","year":"2022","unstructured":"Otoum Y, Liu D, Nayak A (2022) Dl-ids: a deep learning-based intrusion detection framework for securing iot. Trans Emerg Telecommun Technol 33(3):3803","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"10306_CR111","doi-asserted-by":"crossref","unstructured":"Khalid S, Khalil T, Nasreen S (2014) A survey of feature selection and feature extraction techniques in machine learning. In: 2014 science and information conference, pp 372\u2013 378 . IEEE","DOI":"10.1109\/SAI.2014.6918213"},{"issue":"2","key":"10306_CR112","doi-asserted-by":"crossref","first-page":"56","DOI":"10.38094\/jastt1224","volume":"1","author":"R Zebari","year":"2020","unstructured":"Zebari R, Abdulazeez A, Zeebaree D, Zebari D, Saeed J (2020) A comprehensive review of dimensionality reduction techniques for feature selection and feature extraction. J Appl Sci Technol Trends 1(2):56\u201370","journal-title":"J Appl Sci Technol Trends"},{"issue":"12","key":"10306_CR113","first-page":"1371","volume":"5","author":"H-H Hsu","year":"2010","unstructured":"Hsu H-H, Hsieh C-W et al (2010) Feature selection via correlation coefficient clustering. J Softw 5(12):1371\u20131377","journal-title":"J Softw"},{"issue":"4","key":"10306_CR114","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1049\/iet-ifs.2018.5512","volume":"14","author":"C Hongsong","year":"2020","unstructured":"Hongsong C, Caixia M, Zhongchuan F, Lee C-H (2020) Novel ldos attack detection by spark-assisted correlation analysis approach in wireless sensor network. IET Inf Secur 14(4):452\u2013458","journal-title":"IET Inf Secur"},{"issue":"2","key":"10306_CR115","doi-asserted-by":"crossref","first-page":"907","DOI":"10.1007\/s10462-019-09682-y","volume":"53","author":"S Solorio-Fern\u00e1ndez","year":"2020","unstructured":"Solorio-Fern\u00e1ndez S, Carrasco-Ochoa JA, Mart\u00ednez-Trinidad JF (2020) A review of unsupervised feature selection methods. Artif Intell Rev 53(2):907\u2013948","journal-title":"Artif Intell Rev"},{"issue":"5","key":"10306_CR116","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1109\/JCN.2018.000070","volume":"20","author":"S Rahman","year":"2018","unstructured":"Rahman S, Kim G-H, Cho Y-Z, Khan A (2018) Positioning of uavs for throughput maximization in software-defined disaster area uav communication networks. J Commun Netw 20(5):452\u2013463","journal-title":"J Commun Netw"},{"key":"10306_CR117","doi-asserted-by":"crossref","unstructured":"Baccari S, Hadded M, Ghazzai H, Touati H, Elhadef M (2024) Anomaly detection in connected and autonomous vehicles: a survey, analysis, and research challenges. IEEE Access","DOI":"10.1109\/ACCESS.2024.3361829"},{"key":"10306_CR118","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA( 2019) Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: 2019 international Carnahan conference on security technology (ICCST), pp 1\u2013 8 . IEEE","DOI":"10.1109\/CCST.2019.8888419"},{"key":"10306_CR119","doi-asserted-by":"publisher","unstructured":"Whelan, J., Sangarapillai, T., Minawi, O., Almehmadi, A., El-Khatib, K.: UAV attack dataset. https:\/\/doi.org\/10.21227\/00dg-0d12","DOI":"10.21227\/00dg-0d12"},{"key":"10306_CR120","doi-asserted-by":"crossref","unstructured":"Zhao L, Alipour-Fanid A, Slawski M, Zeng K ( 2018) Prediction-time efficient classification using feature computational dependencies. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining, pp 2787\u2013 2796","DOI":"10.1145\/3219819.3220117"},{"key":"10306_CR121","doi-asserted-by":"crossref","unstructured":"Wang G, Hong H, Zhang Y, Wu J, Wang Y, Li S( 2020) Realization of detection algorithms for key parts of unmanned aerial vehicle based on deep learning. In: 2020 international conference on wireless communications and signal processing (WCSP), pp 137\u2013 142 . IEEE","DOI":"10.1109\/WCSP49889.2020.9299682"},{"issue":"12","key":"10306_CR122","doi-asserted-by":"crossref","first-page":"9905","DOI":"10.1109\/JIOT.2020.3029970","volume":"8","author":"W Niu","year":"2020","unstructured":"Niu W, Zhang X, Zhang X, Du X, Huang X, Guizani M et al (2020) Malware on internet of UAVs detection combining string matching and Fourier transformation. IEEE Internet Things J 8(12):9905\u20139919","journal-title":"IEEE Internet Things J"},{"key":"10306_CR123","doi-asserted-by":"crossref","unstructured":"Manesh MR, Velashani MS, Ghribi E, Kaabouch N ( 2019) Performance comparison of machine learning algorithms in detecting jamming attacks on ADS-B devices. In: 2019 IEEE international conference on electro information technology (EIT), pp 200\u2013 206 . IEEE","DOI":"10.1109\/EIT.2019.8833789"},{"issue":"9","key":"10306_CR124","doi-asserted-by":"crossref","first-page":"1594","DOI":"10.1109\/TSMC.2017.2681698","volume":"48","author":"H Sedjelmaci","year":"2017","unstructured":"Sedjelmaci H, Senouci SM, Ansari N (2017) A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks. IEEE Trans Syst Man Cybern Syst 48(9):1594\u20131606","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"10306_CR125","doi-asserted-by":"crossref","unstructured":"Sedjelmaci H, Senouci SM, Messous M-A (2016) How to detect cyber-attacks in unmanned aerial vehicles network? In: 2016 IEEE global communications conference (GLOBECOM), pp 1\u2013 6 . IEEE","DOI":"10.1109\/GLOCOM.2016.7841878"},{"key":"10306_CR126","doi-asserted-by":"crossref","unstructured":"Fraser B, Al-Rubaye S, Aslam S, Tsourdos A ( 2021) Enhancing the security of unmanned aerial systems using digital-twin technology and intrusion detection. In: 2021 IEEE\/AIAA 40th digital avionics systems conference (DASC), pp 1\u2013 10 . IEEE","DOI":"10.1109\/DASC52595.2021.9594321"},{"key":"10306_CR127","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1:108\u2013116","journal-title":"ICISSp"},{"key":"10306_CR128","unstructured":"M.Nayfeh (2023) artificial intelligence-based GPS spoofing detection dataset. https:\/\/github.com\/mnayfeh\/gps_spoofing_detection"},{"issue":"24","key":"10306_CR129","doi-asserted-by":"crossref","first-page":"5529","DOI":"10.3390\/s19245529","volume":"19","author":"X Tan","year":"2019","unstructured":"Tan X, Su S, Zuo Z, Guo X, Sun X (2019) Intrusion detection of UAVs based on the deep belief network optimized by PSO. Sensors 19(24):5529","journal-title":"Sensors"},{"key":"10306_CR130","doi-asserted-by":"crossref","first-page":"19825","DOI":"10.1109\/JIOT.2023.3282648","volume":"10","author":"X He","year":"2023","unstructured":"He X, Chen Q, Tang L, Wang W, Liu T, Li L, Liu Q et al (2023) Federated continuous learning based on stacked broad learning system assisted by digital twin networks: an incremental learning approach for intrusion detection in UAV networks. IEEE Internet Things J 10:19825\u201319838","journal-title":"IEEE Internet Things J"},{"key":"10306_CR131","doi-asserted-by":"crossref","unstructured":"Ihekoronye VU, Ajakwe SO, Kim D-S, Lee JM (2022) Cyber edge intelligent intrusion detection framework for UAV network based on random forest algorithm. In: 2022 13th international conference on information and communication technology convergence (ICTC), pp 1242\u2013 1247 . IEEE","DOI":"10.1109\/ICTC55196.2022.9952400"},{"key":"10306_CR132","doi-asserted-by":"crossref","first-page":"8445","DOI":"10.1109\/JIOT.2023.3237661","volume":"10","author":"A Heidari","year":"2023","unstructured":"Heidari A, Navimipour NJ, Unal M (2023) A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet Things J 10:8445\u20138454","journal-title":"IEEE Internet Things J"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10306-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-024-10306-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10306-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T06:05:00Z","timestamp":1726725900000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-024-10306-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,23]]},"references-count":132,"journal-issue":{"issue":"29","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["10306"],"URL":"https:\/\/doi.org\/10.1007\/s00521-024-10306-y","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,23]]},"assertion":[{"value":"10 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}