{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:10:37Z","timestamp":1772727037844,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,3,24]]},"DOI":"10.1109\/ciss50987.2021.9400286","type":"proceedings-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T03:11:36Z","timestamp":1619061096000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Triaging Autonomous Drone Faults By Simultaneously Assuring Autonomy and Security"],"prefix":"10.1109","author":[{"given":"Lanier","family":"Watkins","sequence":"first","affiliation":[]},{"given":"Denzel","family":"Hamilton","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Kornegay","sequence":"additional","affiliation":[]},{"given":"Aviel","family":"Rubin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Heat Leakage Detection and Surveillance Using Aerial Thermography Drone","author":"kayan","year":"2018","journal-title":"Signal Processing and Communications Applications"},{"key":"ref11","article-title":"Post-Production Analysis Approach for Drone Delivery Fleet","author":"asma","year":"0","journal-title":"IEEE International Conference on Service Operations and Logistics and Informatics"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2018.8607829"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIBMS.2017.8279692"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICoIAS.2019.00040"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/URSI-AT-RASC.2015.7303086"},{"key":"ref16","author":"hariri","year":"2019","journal-title":"Autonomic Cyber Security A Paradigm Shift in Cyber Security"},{"key":"ref17","article-title":"Commercial Drones Are Here: The Future of Unmanned Aerial Systems","author":"cohn","year":"2017","journal-title":"McKinsey & Company Article"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3620965"},{"key":"ref19","article-title":"A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy","author":"watkins","year":"0","journal-title":"To Appear in IEEE Information Technology Electronics and Mobile Communication Conference (IEMCON)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AUV.2018.8729743"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3267338"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2795643"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2016.7778033"},{"key":"ref8","year":"0","journal-title":"UPS Website"},{"key":"ref7","article-title":"These Stickers Make Computer Vision Software Hallucinate Things that Aren't There","author":"vincent","year":"2018","journal-title":"The Verge Online"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2018.8593375"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3215466.3215467"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CSPA.2017.8064935"},{"key":"ref20","article-title":"Autonomous Navigation Assurance with Explainable AI and Security Monitoring","author":"hamilton","year":"0","journal-title":"To Appear in IEEE Applied Imagery Pattern Recognition (AIPR) Workshop"},{"key":"ref21","article-title":"Defending Against Consumer Drone Privacy Attacks: A Blueprint For A Counter Autonomous Drone Tool","author":"watkins","year":"0","journal-title":"the Proceedings of Network and Distributed System Security Symposium (NDSS) Workshop on Decentralized IoT Systems and Security (DISS 2020)"}],"event":{"name":"2021 55th Annual Conference on Information Sciences and Systems (CISS)","location":"Baltimore, MD, USA","start":{"date-parts":[[2021,3,24]]},"end":{"date-parts":[[2021,3,26]]}},"container-title":["2021 55th Annual Conference on Information Sciences and Systems (CISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9400188\/9400208\/09400286.pdf?arnumber=9400286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T20:37:15Z","timestamp":1643402235000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9400286\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,24]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ciss50987.2021.9400286","relation":{},"subject":[],"published":{"date-parts":[[2021,3,24]]}}}