{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:09:44Z","timestamp":1775322584333,"version":"3.50.1"},"reference-count":74,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/cycon.2016.7529436","type":"proceedings-article","created":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T20:28:26Z","timestamp":1470342506000},"page":"205-221","source":"Crossref","is-referenced-by-count":74,"title":["UAV exploitation: A new domain for cyber power"],"prefix":"10.1109","author":[{"given":"Kim","family":"Hartmann","sequence":"first","affiliation":[]},{"given":"Keir","family":"Giles","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","article-title":"Cyber Diplomacy: Agenda, Challenges and Mission","author":"tiirmaa-klaar","year":"2013","journal-title":"Peacetime Regime for State Activities in Cyberspace"},{"key":"ref72","article-title":"From Cyberspace to Cyberpower: Defining the Problem","author":"kuehl","year":"2009","journal-title":"Cyberpower and National Security"},{"key":"ref71","article-title":"N3P: A Natural Privacy Preserving Protocol for Electronic Mail","author":"hartmann","year":"2012","journal-title":"4th International Conference on Cyber Conflict"},{"key":"ref70","article-title":"State Actors and their Proxies in Cyberspace","author":"czosseck","year":"2013","journal-title":"Peacetime Regime for State Activities in Cyberspace"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1177\/1548512915575803"},{"key":"ref39","article-title":"Ukraine's DIY drone war: Self-taught soldiers facing up to Russian-backed war machine","author":"lazaredes","year":"2015","journal-title":"ABCnet"},{"key":"ref38","article-title":"Crowdfunding a war: Ukraine's DIY drone-makers","author":"borys","year":"2015","journal-title":"The Guardian"},{"key":"ref33","article-title":"Framework for Future Alliance Operations","year":"2015","journal-title":"NATO int"},{"key":"ref32","article-title":"Assisting The Human Central to Pentagon's Third Offset","author":"warwick","year":"2016","journal-title":"Aviation Week"},{"key":"ref31","article-title":"In Ukraine, Tomorrow's Drone War Is Alive Today","author":"tucker","year":"2015","journal-title":"Defence One"},{"key":"ref30","article-title":"Terrorist and Insurgent Unmanned Aerial Vehicles: Use, Potentials, and Military Implications","author":"bunker","year":"2015","journal-title":"Strategic Studies Insitute U S Army War College"},{"key":"ref37","article-title":"Ukraine's Grassroots Drone Program Takes Flight","author":"peterson","year":"2015","journal-title":"The Daily Signal"},{"key":"ref36","article-title":"The Rise of Drones in Eurasia (Part One: Ukraine)","author":"bugriy","year":"2014","journal-title":"JamesTown org"},{"key":"ref35","article-title":"War is Boring","author":"rawnsley","year":"2015","journal-title":"medium com"},{"key":"ref34","article-title":"Army Fights Culture Gap Between Cyber & Ops: &#x201C;Dolphin Speak","author":"freedberg","year":"2015","journal-title":"BreakingDefense com"},{"key":"ref60","article-title":"Press Release _ FAA Announces Small UAS Registration Rule","year":"2015","journal-title":"FAA gov"},{"key":"ref62","article-title":"Military UAVs Mark Time As Civil Market Advances","author":"warwick","year":"2015","journal-title":"Aviation Week"},{"key":"ref61","article-title":"Robust and Scalable UAS Registration: Key Technology Issues and Recommendations","author":"ablon","year":"2016","journal-title":"SUASNews com"},{"key":"ref63","article-title":"Swarm Theory","author":"warwick","year":"2015","journal-title":"Defense & Space Technologies To Watch In 2016&#x2019; Aviation Week"},{"key":"ref28","article-title":"High-Assurance Cyber Military Systems (HACMS)","author":"richards","year":"0","journal-title":"DARPA mil"},{"key":"ref64","article-title":"Here's the First Shot of the F-15C Pod That Will Change How the Air Force Fights","author":"rogoway","year":"2015","journal-title":"Foxtrotalpha"},{"key":"ref27","article-title":"Exclusive: Iran hijacked US drone, says Iranian engineer","author":"peterson","year":"2011","journal-title":"Christian Science Monitor"},{"key":"ref65","article-title":"&#x2018;Team Players&#x2019;, Defense & Space Technologies To Watch In 2016","author":"warwick","year":"2015","journal-title":"Aviation Week"},{"key":"ref66","article-title":"Tiny ADS-, B Provides UAV Sense-and-avoid","author":"warwick","year":"2016","journal-title":"Aviation Week"},{"key":"ref29","article-title":"Electronic Warfare: What US Army Can Learn from Ukraine","author":"gould","year":"2015","journal-title":"Defense News"},{"key":"ref67","article-title":"UK at risk from &#x2018;simple and effective&#x2019; terrorist drone attacks","author":"burges","year":"2016","journal-title":"Wired"},{"key":"ref68","first-page":"28","article-title":"Terror by Drone","author":"osborne","year":"2015","journal-title":"Aviation Week & Space Technology (print edition)"},{"key":"ref69","article-title":"FAA introduces unworkable drone registration rules in time for Christmas","author":"levin","year":"2015","journal-title":"Bloomberg com"},{"key":"ref2","article-title":"Drone Aids TransAsia Flight 222 Accident Investigation","author":"croft","year":"2016","journal-title":"Aviation Week"},{"key":"ref1","article-title":"Lethal and Legal? The Ethics of Drone Strikes","author":"keene","year":"2015","journal-title":"Strategic Studies Insitute U S Army War College"},{"key":"ref20","article-title":"SkyJack: autonomous drone hacking","author":"kamkar","year":"2013"},{"key":"ref22","article-title":"Iraq insurgents &#x2018;hack into video feeds from US drones","year":"2009","journal-title":"BBC co uk"},{"key":"ref21","article-title":"SkyJack","author":"kamkar","year":"2013","journal-title":"GitHub com"},{"key":"ref24","article-title":"U.S. and Britain hacked into feeds from Israeli drones and fighter jets, according to report","author":"lamothe","year":"2016","journal-title":"Washington Post"},{"key":"ref23","article-title":"A Study On Unmanned Vehicles and Cyber Security","author":"rivera","year":"2014"},{"key":"ref26","article-title":"Iraqi insurgents hacked Predator drone feeds U.S. official indicates","author":"mount","year":"2009","journal-title":"CNN com"},{"key":"ref25","article-title":"Cryptanalysis of intercepted Israeli drone feeds","author":"blog","year":"2016","journal-title":"Github io"},{"key":"ref50","article-title":"FAA introduces unworkable drone registration rules in time for Christmas","author":"mccarthy","year":"2015","journal-title":"The Register"},{"key":"ref51","article-title":"Dealing with Drones: A Look at the Regulatory Challenges of Remotely Piloted Aircraft Systems","year":"2015","journal-title":"Chatham House Seminar"},{"key":"ref59","article-title":"Report on the safe use of remotely piloted aircraft systems (RPAS), commonly known as unmanned aerial vehicles (UAVs), in the field of civil aviation","author":"foster","year":"2015","journal-title":"europa eu"},{"key":"ref58","article-title":"Beware the terrorist drones! For they are coming! Pass new laws!","author":"mccarthy","year":"2016","journal-title":"The Register"},{"key":"ref57","article-title":"Battelle DroneDefender","year":"2016","journal-title":"Battelle org"},{"key":"ref56","article-title":"First Ever Anti-Drone Weapon that Shoots Down UAVs with Radio Waves","author":"khandelwal","year":"2015","journal-title":"The Hacker News"},{"key":"ref55","article-title":"Countering Unmanned Defense & Space Technologies To Watch In 2016","author":"warwick","year":"2015","journal-title":"Aviation Week"},{"key":"ref54","article-title":"Counter-UAS Special Report: The Countermeasures Options","author":"warwick","year":"2016","journal-title":"Aviation Week"},{"key":"ref53","article-title":"Boeing's latest drone destroyer is the stuff of nightmares","author":"culpan","year":"2015","journal-title":"Wired"},{"key":"ref52","article-title":"UAV Killers Gain Role Against Growing Threat","author":"eshel","year":"2015","journal-title":"Aviation Week"},{"key":"ref10","article-title":"Toddler loses eyeball after errant drone slices it in half","author":"farivar","year":"2015","journal-title":"ARS Technica"},{"key":"ref11","article-title":"FAA Nightmare: A Million Christmas Drones","author":"karp","year":"2015","journal-title":"Aviation Week"},{"key":"ref40","article-title":"How US Technology Could Help Ukraine Without &#x2018;Arming&#x2019; It","author":"tucker","year":"2015","journal-title":"Defense One"},{"key":"ref12","article-title":"Editorial: Get Data On Risk UAS Pose To Air Traffic","year":"2015","journal-title":"Aviation Week"},{"key":"ref13","article-title":"Police Drone Can Be Commandeered from Over A Mile Away, Hacker Claims","author":"fox-brewster","year":"2016","journal-title":"Forbes com"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref15","article-title":"Hacker starten Stratosph&#x00E4;renballon, um Drohnen-Funk mitzuschneiden&#x2019; (&#x2018;Hackers use stratosphere balloon to intercept UAV radio traffic&#x2019;","author":"k\u00f6nig","year":"2015","journal-title":"Heise"},{"key":"ref16","article-title":"PhoneDrone Ethos: Drohne nutzt Smartphone als Steuerungsrechner&#x2019; (&#x2018;PhoneDrone Ethos: Drone uses Smartphones as Controlunit","author":"online","year":"2015","journal-title":"Heise"},{"key":"ref17","article-title":"Pineapple Drone, Rooftop Packet Sniffing and Offline Archival Backup","year":"2014","journal-title":"hak5 org"},{"key":"ref18","article-title":"Phantom Network Surveillance UAV\/Drone - Defcon","author":"hill","year":"2013","journal-title":"Defcon org"},{"key":"ref19","article-title":"Drones Hacking Drones","year":"2013","journal-title":"hak5 org"},{"key":"ref4","article-title":"Introduction to Computer Security","author":"bishop","year":"2004"},{"key":"ref3","article-title":"The Vulnerability of UAVs to Cyberattacks","author":"hartmann","year":"2013","journal-title":"5th International Conference on Cyber Conflict"},{"key":"ref6","article-title":"Congress to hold UAV safety hearing Oct. 7","author":"karp","year":"2015","journal-title":"ATWonline com"},{"key":"ref5","article-title":"The Art of Deception: Controlling the Human Element of Security","author":"mitnick","year":"2003"},{"key":"ref8","article-title":"Drone collides with Seattle Ferris wheel, busts through plastic table","author":"farivar","year":"2015","journal-title":"ARS Technica"},{"key":"ref7","article-title":"DOT: Register Your Drones Or Face FAA Penalties","author":"croft","year":"2015","journal-title":"Aviation Week"},{"key":"ref49","article-title":"First Interim Standards For Unmanned Aircraft Unveiled","author":"warwick","year":"2015","journal-title":"Aviation Week"},{"key":"ref9","article-title":"Drone flying over forest fire diverts planes, costs US Forest Service $10K","author":"guess","year":"2015","journal-title":"ARS Technica"},{"key":"ref46","article-title":"Bloke sues dad who shot down his drone _ and why it may decide who owns the skies","author":"mccarthy","year":"2016","journal-title":"The Register"},{"key":"ref45","article-title":"DJI update enforces drone no-fly zones across Europe and USA","author":"reynolds","year":"2015","journal-title":"Wired"},{"key":"ref48","article-title":"Registration and Marking Requirements for Small Unmanned Aircraft","year":"2015","journal-title":"FAA gov"},{"key":"ref47","article-title":"Drone Slayer&#x201D; cleared of charges: &#x201C;I wish this had never happened","author":"farivar","year":"2015","journal-title":"ARS Technica"},{"key":"ref42","article-title":"Advanced Russian air power, jammers are focus of U. S. troops","author":"tilghman","year":"2015","journal-title":"Military Times"},{"key":"ref41","article-title":"Russian Drone Threat: Army Seeks Ukraine Lessons","author":"freedberg","year":"2015","journal-title":"BreakingDefense com"},{"key":"ref44","article-title":"What A Business Aviation Flight Department Needs To Know About UAVs","author":"esler","year":"2015","journal-title":"Aviation Week"},{"key":"ref43","article-title":"Russia overtaking US in cyber-warfare capabilities","year":"2015","journal-title":"SCMagazine com"}],"event":{"name":"2016 8th International Conference on Cyber Conflict (CyCon)","location":"Tallinn, Estonia","start":{"date-parts":[[2016,5,31]]},"end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 8th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7524181\/7529414\/07529436.pdf?arnumber=7529436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T17:14:57Z","timestamp":1474478097000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7529436\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":74,"URL":"https:\/\/doi.org\/10.1109\/cycon.2016.7529436","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}