{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T05:10:18Z","timestamp":1770354618493,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/infocomwkshps50562.2020.9162761","type":"proceedings-article","created":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T21:55:09Z","timestamp":1597096509000},"page":"677-682","source":"Crossref","is-referenced-by-count":19,"title":["A Real-time Framework for Trust Monitoring in a Network of Unmanned Aerial Vehicles"],"prefix":"10.1109","author":[{"given":"Mahsa","family":"Keshavarz","sequence":"first","affiliation":[]},{"given":"Alireza","family":"Shamsoshoara","sequence":"additional","affiliation":[]},{"given":"Fatemeh","family":"Afghah","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Ashdown","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"eldosouky","year":"2019","journal-title":"Drones in distress A game-theoretic countermeasure for protecting uavs against gps spoofing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3001836"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2018.8431278"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2016.7815713"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2013.6564801"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-013-9954-z"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-015-0284-1"},{"key":"ref17","first-page":"19","article-title":"Gps spoofing countermeasures","volume":"25","author":"warner","year":"2003","journal-title":"Journal of Homeland Security"},{"key":"ref18","article-title":"Real-time spoofing detection using correlation between two civil gps receiver","author":"o'hanlon","year":"2012","journal-title":"Proceedings of the ION GNSS Meeting"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50115-4_2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2019.8824917"},{"key":"ref3","author":"eldosouky","year":"2017","journal-title":"Resilient critical infrastructure Bayesian network analysis and contract-based optimization"},{"key":"ref6","author":"shamsoshoara","year":"2019","journal-title":"An autonomous spectrum management scheme for unmanned aerial vehicle networks in disaster relief operations"},{"key":"ref5","first-page":"1","article-title":"Distributed cooperative spectrum sharing in uav networks using multiagent reinforcement learning","author":"shamsoshoara","year":"0","journal-title":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845309"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2879940"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/srep22574"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737472"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1800155"},{"key":"ref20","article-title":"An algebra for assessing trust in certification chains","author":"josang","year":"0","journal-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS'99)"}],"event":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","location":"Toronto, ON, Canada","start":{"date-parts":[[2020,7,6]]},"end":{"date-parts":[[2020,7,9]]}},"container-title":["IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9146478\/9162584\/09162761.pdf?arnumber=9162761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:55:44Z","timestamp":1656453344000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9162761\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/infocomwkshps50562.2020.9162761","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}