{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T09:15:24Z","timestamp":1778663724507,"version":"3.51.4"},"reference-count":27,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003600","name":"Korean National Police Agency","doi-asserted-by":"publisher","award":["2024M3C1C4018372"],"award-info":[{"award-number":["2024M3C1C4018372"]}],"id":[{"id":"10.13039\/501100003600","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.compeleceng.2026.111144","type":"journal-article","created":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T09:42:57Z","timestamp":1775986977000},"page":"111144","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Flight log analysis and recovery for open-source drones: Focusing on ArduPilot, PX4, and Betaflight"],"prefix":"10.1016","volume":"135","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-5746-7447","authenticated-orcid":false,"given":"Mingyu","family":"Seong","sequence":"first","affiliation":[]},{"given":"Woosung","family":"Yun","sequence":"additional","affiliation":[]},{"given":"Chulhan","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Seokhee","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7796-7699","authenticated-orcid":false,"given":"Jungheum","family":"Park","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2026.111144_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2025.110759","article-title":"Visual geo-localization and attitude estimation using satellite imagery and topographical elevation for unmanned aerial vehicles","volume":"153","author":"Qiu","year":"2025","journal-title":"Eng Appl Artif Intell"},{"key":"10.1016\/j.compeleceng.2026.111144_b2","doi-asserted-by":"crossref","first-page":"23063","DOI":"10.1007\/s00521-023-08857-7","article-title":"Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey","volume":"35","author":"Omolara","year":"2023","journal-title":"Neural Comput Appl"},{"key":"10.1016\/j.compeleceng.2026.111144_b3","series-title":"Commercial drone market size, share, and trends 2024 to 2034","author":"Precedence Research","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111144_b4","series-title":"Drone software market size & share analysis - growth trends & forecasts (2025 - 2030)","author":"Mordor Intelligence","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111144_b5","series-title":"Police hunt drone pilots in unprecedented Gatwick Airport disruption","author":"CNN","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.111144_b6","series-title":"Counter-Unmanned Aircraft Systems (C-UAS) technology guide","author":"Department of Homeland Security","year":"2019"},{"key":"10.1016\/j.compeleceng.2026.111144_b7","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103340","article-title":"Unmanned Aerial Vehicle (UAV) forensics: The good, the bad, and the unaddressed","volume":"132","author":"Studiawan","year":"2023","journal-title":"Comput Secur"},{"key":"10.1016\/j.compeleceng.2026.111144_b8","series-title":"Framework for responding to a drone incident","author":"INTERPOL","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.111144_b9","series-title":"INTERPOL drone countermeasure exercise report","author":"INTERPOL","year":"2022"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111144_b10","doi-asserted-by":"crossref","first-page":"11","DOI":"10.3390\/technologies12010011","article-title":"Drone forensics: An innovative approach to the forensic investigation of drone accidents based on digital twin technology","volume":"12","author":"Almusayli","year":"2024","journal-title":"Technologies"},{"key":"10.1016\/j.compeleceng.2026.111144_b11","series-title":"Ardupilot source code","author":"ArduPilot","year":"2026"},{"key":"10.1016\/j.compeleceng.2026.111144_b12","series-title":"PX4 source code","author":"PX4","year":"2026"},{"key":"10.1016\/j.compeleceng.2026.111144_b13","series-title":"Betaflight source code","author":"Betaflight","year":"2026"},{"key":"10.1016\/j.compeleceng.2026.111144_b14","series-title":"QGroundControl source code","author":"MAVLink","year":"2026"},{"key":"10.1016\/j.compeleceng.2026.111144_b15","series-title":"Betaflight configurator source code","author":"Betaflight","year":"2026"},{"key":"10.1016\/j.compeleceng.2026.111144_b16","series-title":"MAVLink source code","author":"MAVLink","year":"2026"},{"key":"10.1016\/j.compeleceng.2026.111144_b17","doi-asserted-by":"crossref","first-page":"87658","DOI":"10.1109\/ACCESS.2019.2924410","article-title":"Micro Air Vehicle Link (MAVlink) in a nutshell: A survey","volume":"7","author":"Koub\u00e2a","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111144_b18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.diin.2015.11.002","article-title":"Unmanned aerial vehicles: A preliminary analysis of forensic challenges","volume":"16","author":"Horsman","year":"2016","journal-title":"Digit Investig"},{"key":"10.1016\/j.compeleceng.2026.111144_b19","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2022.107870","article-title":"Implementation analysis of reliable unmanned aerial vehicles models for security against cyber-crimes: Attacks, tracebacks, forensics and solutions","volume":"100","author":"Alsulami","year":"2022","journal-title":"Comput Electr Eng"},{"issue":"17","key":"10.1016\/j.compeleceng.2026.111144_b20","doi-asserted-by":"crossref","first-page":"6486","DOI":"10.3390\/s22176486","article-title":"A comprehensive collection and analysis model for the drone forensics field","volume":"22","author":"Alotaibi","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.compeleceng.2026.111144_b21","series-title":"2017 international conference on computational science and computational intelligence","first-page":"91","article-title":"Drone forensics: Digital flight log examination framework for micro drones","author":"Renduchintala","year":"2017"},{"key":"10.1016\/j.compeleceng.2026.111144_b22","series-title":"Advances in information and computer security: 14th international workshop on security","first-page":"377","article-title":"GRYPHON: Drone forensics in dataflash and telemetry logs","author":"Mantas","year":"2019"},{"key":"10.1016\/j.compeleceng.2026.111144_b23","series-title":"2023 IEEE 14th annual ubiquitous computing, electronics & mobile communication conference","first-page":"0254","article-title":"Investigating drone data recovery beyond the obvious using digital forensics","author":"Nayak","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111144_b24","article-title":"Discovering spoliation of evidence through identifying traces on deleted files in macOS","volume":"44","author":"Joun","year":"2023","journal-title":"Forensic Sci Int: Digit Investig"},{"key":"10.1016\/j.compeleceng.2026.111144_b25","series-title":"Innovative systems for intelligent health informatics","first-page":"815","article-title":"Survey of file carving techniques","author":"Ramli","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.111144_b26","series-title":"FLARE","author":"Seong","year":"2026"},{"key":"10.1016\/j.compeleceng.2026.111144_b27","series-title":"Computer forensics tool testing program (CFTT)","author":"National Institute of Standards and Technology","year":"2025"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002168?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002168?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T08:43:43Z","timestamp":1778661823000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626002168"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":27,"alternative-id":["S0045790626002168"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111144","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Flight log analysis and recovery for open-source drones: Focusing on ArduPilot, PX4, and Betaflight","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111144","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111144"}}