{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:39:41Z","timestamp":1767339581419,"version":"3.37.3"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100004318","name":"Microsoft Corp.","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004318","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012365","name":"Howard University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012365","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"U.S. Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-20-2-0277"],"award-info":[{"award-number":["W911NF-20-2-0277"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,28]]},"DOI":"10.1109\/iccworkshops57953.2023.10283613","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T17:54:22Z","timestamp":1698083662000},"page":"512-517","source":"Crossref","is-referenced-by-count":5,"title":["Comparative Study of Machine Learning Techniques for Detecting GPS Spoofing Attacks on Mission Critical Military IoT Devices"],"prefix":"10.1109","author":[{"given":"Hassan","family":"El Alami","sequence":"first","affiliation":[{"name":"Howard University,Washington, DC,USA"}]},{"given":"Kendal","family":"Hall","sequence":"additional","affiliation":[{"name":"Howard University,Washington, DC,USA"}]},{"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[{"name":"Howard University,Washington, DC,USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2992119"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S1665-6423(15)30004-3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1017\/S0373463317000558"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICL-GNSS.2019.8752775"},{"key":"ref11","first-page":"1233","article-title":"A low-complexity gps anti-spoofing method using a multi-antenna array","author":"daneshmand","year":"0","journal-title":"Proceedings of the 25th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2012)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2016.7524168"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1117\/12.2592860"},{"key":"ref1","article-title":"Tactical edge iot in defense and national security","author":"fraga-lamas","year":"2023","journal-title":"IoT for Defense and National Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1117\/12.2587105"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2018.2888578"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2018.2874151"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2934188"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-12282-8_8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom55741.2022.9928766"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.compgeo.2022.104868"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/ima.22841"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970203"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6699094"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2021.3122512"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-26213-y"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3110804"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109246"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2013.6621814"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/app11104580"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21920-7_3"},{"key":"ref6","article-title":"Anomili: Spoofing prevention and explainable anomaly detection for the 1553 military avionic bus","author":"levy","year":"2022","journal-title":"ArXiv Preprint"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.01.007"}],"event":{"name":"2023 IEEE International Conference on Communications Workshops (ICC Workshops)","start":{"date-parts":[[2023,5,28]]},"location":"Rome, Italy","end":{"date-parts":[[2023,6,1]]}},"container-title":["2023 IEEE International Conference on Communications Workshops (ICC Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10283478\/10283479\/10283613.pdf?arnumber=10283613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T19:00:00Z","timestamp":1699902000000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10283613\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,28]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iccworkshops57953.2023.10283613","relation":{},"subject":[],"published":{"date-parts":[[2023,5,28]]}}}