{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:38:20Z","timestamp":1776922700072,"version":"3.51.2"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/glocomw.2013.6825196","type":"proceedings-article","created":{"date-parts":[[2014,6,17]],"date-time":"2014-06-17T01:53:24Z","timestamp":1402970004000},"page":"1432-1436","source":"Crossref","is-referenced-by-count":37,"title":["UAVSim: A simulation testbed for unmanned aerial vehicle network cyber security analysis"],"prefix":"10.1109","author":[{"given":"Ahmad Y.","family":"Javaid","sequence":"first","affiliation":[]},{"family":"Weiqing Sun","sequence":"additional","affiliation":[]},{"given":"Mansoor","family":"Alam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"487","article-title":"A scalable, ordered scenario-based network security simulator","author":"joobeom","year":"0","journal-title":"Book Chapter Systems Modeling and Simulation Theory and Applications-Lecture Notes in Computer Science"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2012.752.760"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2013.6580043"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2011.5937283"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2007.4419720"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1109\/WSC.2007.4419736","article-title":"drew\" Hamilton Jr. and colonel timothy schmoyer, \"validating a network simulation testbed for army UAVs","author":"stephen hamilton","year":"2007","journal-title":"Proceedings of the 2007 Winter Simulation Conference WSC 2007"},{"key":"16","article-title":"SCUAL, swarm of communicating UAVs at LaBRI: An open UAVNet testbed","author":"chaumette","year":"2011","journal-title":"2011 14th International Symposium on Wireless Personal Multimedia Communications (WPMC)"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.2514\/6.2004-6480"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2004.1371336"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/IHMSC.2012.20"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.2514\/6.2012-2438"},{"key":"21","year":"0"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SYSOSE.2011.5966600"},{"key":"20","year":"2013","journal-title":"OMNeT++ Discrete Event Simulation System"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1518\/001872006778606822"},{"key":"1","author":"bumiller","year":"0","journal-title":"War Evolves with Drones Some Timy As Bugs"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/EMEIT.2011.6024116"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CCIENG.2011.6008043"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459914"},{"key":"5","year":"2011","journal-title":"Computer Virus Infects Drone Plane Command Center in US"},{"key":"4","article-title":"SkyGrabber: The $26 software used by insurgents to hack into US drones","author":"arthur","year":"2009","journal-title":"Guardian"},{"key":"9","first-page":"454","article-title":"Visual simulation system for quadrotor unmanned aerial vehicles","author":"qiang","year":"2011","journal-title":"Control Conference (CCC) 2011 30th Chinese Vol No"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2012.1443"}],"event":{"name":"2013 IEEE Globecom Workshops (GC Wkshps)","location":"Atlanta, GA","start":{"date-parts":[[2013,12,9]]},"end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820092\/6824917\/06825196.pdf?arnumber=6825196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T14:59:24Z","timestamp":1498143564000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6825196\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2013.6825196","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}