{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:20Z","timestamp":1756273220211,"version":"3.44.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130011","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"699-706","source":"Crossref","is-referenced-by-count":0,"title":["The Invisible Threat: Simulating and Analyzing the Coordinated Sensor Manipulation Attack (CSMA) on UAVs"],"prefix":"10.1109","author":[{"given":"Shadi","family":"Sadeghpour","sequence":"first","affiliation":[{"name":"Cyber and Computer Sciences The Citadel,Charleston,SC,USA"}]},{"given":"Pooria","family":"Madani","sequence":"additional","affiliation":[{"name":"Ontario Tech University,Business and Information Technology,Oshawa,Canada"}]}],"member":"263","reference":[{"article-title":"Unmanned Aerial Vehicle Market, UAV Size, Share, System and Industry Analysis and Market Forecast to 2024","volume-title":"Marketsandmarkets.com","year":"2019","key":"ref1"},{"volume-title":"An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs","author":"Sathaye","key":"ref2"},{"key":"ref3","article-title":"Sensor Deprivation Attacks for Stealthy UAV Manipulation","author":"Erba","year":"2024","journal-title":"arXiv.org"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/drones7050289"},{"journal-title":"Review.px4.io","article-title":"Flight Review","year":"2025","key":"ref5"},{"key":"ref6","article-title":"Drone Sensor Fusion Dataset","author":"Sadeghpour","year":"2025","journal-title":"IEEE Dataport"},{"key":"ref7","first-page":"1","article-title":"The vulnerability of UAVs to cyber attacks-An approach to the risk assessment","volume-title":"International Conference on Cyber Conflict","author":"Hartmann"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s24175529"},{"journal-title":"Submitted to the Subcommittee on Oversight, Investigations, and Management of the House Committee on Homeland","article-title":"Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing","author":"Humphreys","key":"ref9"},{"key":"ref10","article-title":"The Russians Are Jamming US Drones in Syria Because They Have Every Reason To Be","author":"Trevithick","year":"2018","journal-title":"The War Zone"},{"article-title":"GPS Spoofing Final Report","volume-title":"OPSGROUP","year":"2024","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2012.09.003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2016.2526658"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s21206769"},{"key":"ref16","article-title":"Unveiling the stealthy threat: Analyzing slow drift GPS spoofing attacks for autonomous vehicles in urban environments and enabling the resilience","author":"Dasgupta","year":"2024","journal-title":"arXiv preprint, arXiv:2401.01394"},{"key":"ref17","article-title":"Sensor Deprivation Attacks for Stealthy UAV Manipulation","author":"Erba","year":"2024","journal-title":"arXiv.org"},{"volume-title":"Analysis of the Impact of a GPS Spoofing Attack on a UAV","year":"2025","author":"Basan","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.5040747"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10291-025-01819-7"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130011.pdf?arnumber=11130011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:05:07Z","timestamp":1756271107000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130011\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130011","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}