{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T13:06:25Z","timestamp":1777381585538,"version":"3.51.4"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/iotsms62296.2024.10710230","type":"proceedings-article","created":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T17:22:50Z","timestamp":1728926570000},"page":"240-247","source":"Crossref","is-referenced-by-count":4,"title":["DUDE-IDS: A Framework for Efficiently Detecting Network-Related Drone Cyberattacks"],"prefix":"10.1109","author":[{"given":"Burak","family":"Tufekci","sequence":"first","affiliation":[{"name":"The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"}]},{"given":"Vinh","family":"Quach","sequence":"additional","affiliation":[{"name":"The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"}]},{"given":"Cihan","family":"Tunc","sequence":"additional","affiliation":[{"name":"The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"}]},{"given":"Ram","family":"Dantu","sequence":"additional","affiliation":[{"name":"The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"How Drones Are Changing the Business World","author":"Nath","year":"2023"},{"key":"ref2","volume-title":"Drone Industry Insights","author":"Alvarado","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/drones7050289"},{"key":"ref5","article-title":"Hacked Drones and Busted Logistics are the Cyber Future of Warfare","author":"Wheeler","year":"2021"},{"key":"ref6","article-title":"Drone Goggles Maker Claims Firmware Sabotaged to Brick Devices","author":"Gatlan","year":"2023"},{"key":"ref7","article-title":"Cybersecurity Best Practices for Operating Commercial Unmanned Aircraft Systems","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SAM.2018.8448409"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MASSW.2019.00020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IPAS55744.2022.10052868"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HONET.2018.8551326"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT46314.2019.8987873"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2018.8611876"},{"key":"ref14","article-title":"MAVLink Developer Guide","year":"2023"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/ICITST51030.2020.9351317"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973730"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC48513.2020.9064976"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BlackSeaCom.2019.8812808"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102177"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT47987.2019.8991097"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3084796"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00062"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref26","article-title":"Gstreamer Open Source Multimedia Framework","year":"2023"},{"key":"ref27","article-title":"Hping3 Manual","year":"2023"},{"key":"ref28","article-title":"Aircrack-ng Manual","year":"2023"},{"key":"ref29","article-title":"Arpspoof Manual","year":"2023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/sym15061251"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-023-00509-4"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/app13042276"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23502-4_12"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2970501"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0080"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-4825-3_7"}],"event":{"name":"2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","location":"Malm\u00f6, Sweden","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,5]]}},"container-title":["2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10710136\/10710182\/10710230.pdf?arnumber=10710230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T04:57:01Z","timestamp":1728968221000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10710230\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/iotsms62296.2024.10710230","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}