{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:12:37Z","timestamp":1725729157751},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,8]]},"DOI":"10.1109\/ccwc60891.2024.10427776","type":"proceedings-article","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T18:35:29Z","timestamp":1707849329000},"page":"0198-0206","source":"Crossref","is-referenced-by-count":0,"title":["Hierarchical Software Framework for Safe Unmanned Aerial Systems Integration into National Airspace (NAS)"],"prefix":"10.1109","author":[{"given":"Jaya Preethi","family":"Mohan","sequence":"first","affiliation":[{"name":"University of North,School of Electrical Engineering and Computer Science (SEECS),Dakota"}]},{"given":"Prakash","family":"Ranganathan","sequence":"additional","affiliation":[{"name":"University of North,School of Electrical Engineering and Computer Science (SEECS),Dakota"}]},{"given":"Hassan","family":"Reza","sequence":"additional","affiliation":[{"name":"University of North,School of Electrical Engineering and Computer Science (SEECS),Dakota"}]}],"member":"263","reference":[{"author":"Lavaud","key":"ref1","article-title":"Interception of Frequency-Hopping Signals for TEMPEST Attacks"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2023.3307341"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13319-8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/icuas57906.2023.10156203"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s121013417"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21757"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21774"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.2514\/6.2021-3011","article-title":"Gazebo-Based Simulation Environment Integration for UAS","volume-title":"AIAA Aviation and Aeronautics Forum and Exposition, AIAA AVIATION Forum 2021","author":"Guou"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ast.2022.107521"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3510455.3512788"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2020.2999852"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6522"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113251"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2019.8737391"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/les.2019.2953253"},{"author":"Martel","key":"ref16","article-title":"Software Architecture Best Practices for Enterprise Artificial Intelligence"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/icsa-c.2019.00055"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5220\/0011107000003200"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/wain52551.2021.00026"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.137"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3316615.3318222"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/4234.892193"},{"article-title":"Using Neural Networks to predict aircraft trajectories Charibde: hybridization of interval methods and evolutionary algorithms for solving difficult optimization problems View project Air Traffic Control View project","year":"1999","author":"Alliot","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2020.0104"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2022.102441"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/rs10111712"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.001.2100394"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1061\/(asce)su.1943-5428.0000298"},{"journal-title":"Software architecture patterns : understanding common architecture patterns and when to use them","author":"Richards","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/confluence.2014.6949224"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2022.109104"},{"article-title":"NordiCHI 2008 Building Bridges","volume-title":"proceedings of the 5th Nordic Conference on Human-Computer Interaction : Lund","author":"Gulz","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/edge55608.2022.00027"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109358"},{"volume-title":"2014 International Conference on Unmanned Aircraft Systems (ICUAS) : conference proceedings","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1115\/1.4062597"},{"article-title":"Scalable, Distributed AI Frameworks: Leveraging Cloud Computing for Enhanced Deep Learning Performance and Efficiency","year":"2023","author":"Mungoli","key":"ref37"},{"article-title":"Integrative Cybersecurity: Merging Zero Trust, Layered Defense, and Global Standards for a Resilient Digital Future","year":"2017","author":"Muhammad","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14592-x"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/iccubea.2015.165"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/mits.2016.2611038"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030566"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2023.104019"},{"article-title":"A Zero-Trust Model for Intrusion Detection in Drone Networks","author":"Ouiazzane","key":"ref44","doi-asserted-by":"crossref","DOI":"10.14569\/IJACSA.2023.0141154"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.11.087"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1063\/1.5133587"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/p2p.2001.990434"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/p2p.2001.990433"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2022.101290"},{"author":"Chung","key":"ref50","article-title":"Client-Server Architecture Clients and Servers Client\/Server with File Servers Client\/Server with Database Servers Web Client\/Server Client\/Server Groupware Client\/Server with Transaction Processing"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/2.375173"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1260\/2\/022007"}],"event":{"name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","start":{"date-parts":[[2024,1,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2024,1,10]]}},"container-title":["2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10426790\/10427556\/10427776.pdf?arnumber=10427776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T09:38:25Z","timestamp":1709458705000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10427776\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,8]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/ccwc60891.2024.10427776","relation":{},"subject":[],"published":{"date-parts":[[2024,1,8]]}}}