{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:58:15Z","timestamp":1776113895185,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/iwcmc.2016.7577060","type":"proceedings-article","created":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T22:01:42Z","timestamp":1475186502000},"page":"216-221","source":"Crossref","is-referenced-by-count":248,"title":["Drones for smart cities: Issues in cybersecurity, privacy, and public safety"],"prefix":"10.1109","author":[{"given":"Edwin","family":"Vattapparamban","sequence":"first","affiliation":[]},{"given":"Ismail","family":"Guvenc","sequence":"additional","affiliation":[]},{"given":"Ali I.","family":"Yurekli","sequence":"additional","affiliation":[]},{"given":"Kemal","family":"Akkaya","sequence":"additional","affiliation":[]},{"given":"Selcuk","family":"Uluagac","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2015.7122576"},{"key":"ref32","first-page":"457","article-title":"Observations from above: unmanned aircraft systems and privacy","volume":"36","author":"villasenor","year":"2013","journal-title":"Harv JL & Pub Pol'y"},{"key":"ref31","article-title":"Privacy and drones: Unmanned aerial vehicles","author":"cavoukian","year":"2012","journal-title":"Technical Report"},{"key":"ref30","article-title":"Drones hacking drones","author":"kitchen","year":"2013","journal-title":"HAK"},{"key":"ref36","article-title":"Autonomous search-and rescue drones outperform humans at navigating forest trails","author":"brokaw","year":"2016"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2799650.2799657"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2015.7132971"},{"key":"ref10","article-title":"Amazon Prime Air","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2013.192"},{"key":"ref12","article-title":"Drones offer risks, underwriting challenges","author":"wright","year":"2015"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459914"},{"key":"ref14","first-page":"1","article-title":"The vulnerability of UAVs to cyber attacks-An approach to the risk assessment","author":"hartmann","year":"2013","journal-title":"Proc IEEE Conf Cyber Conflict (CyCon)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RAST.2013.6581320"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICACSIS.2013.6761569"},{"key":"ref17","year":"0","journal-title":"Parrot AR Drone 2 0"},{"key":"ref18","year":"0","journal-title":"Bebop Drone"},{"key":"ref19","year":"0","journal-title":"Phantom 2 vision"},{"key":"ref28","article-title":"Police set to use eagles to foil terrorist drone attacks","author":"witherow","year":"2016"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1109\/JPROC.2014.2302875","article-title":"Drones and the future of domestic aviation","volume":"102","author":"villasenor","year":"2014","journal-title":"Proceedings of the IEEE"},{"key":"ref27","article-title":"How do you catch a drone? with an even bigger drone and a giant net","author":"liberatore","year":"2015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS.2005.1452718"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2010.54"},{"key":"ref29","author":"burns","year":"2016","journal-title":"The skywall 100 bazooka captures drones with a giant net"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.09.008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2009.132"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-010-9497-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.12.004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystemseng.2010.11.010"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6852096"},{"key":"ref20","year":"0","journal-title":"3D robotics solo"},{"key":"ref22","article-title":"Hacking drones: Overview of the main threats","year":"2013"},{"key":"ref21","article-title":"Obama says U.S. has asked Iran to return drone aircaft","year":"2011","journal-title":"CNN Wire Staff"},{"key":"ref24","article-title":"Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks","volume":"3","author":"shepard","year":"2012","journal-title":"Proceedings of the ION GNSS Meeting"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref26","year":"2016","journal-title":"The MITRE challenge Countering unauthorized unmanned aircraft systems"},{"key":"ref25","article-title":"GPS spoofing","author":"lin","year":"2013"}],"event":{"name":"2016 International Wireless Communications and Mobile Computing Conference (IWCMC)","location":"Paphos, Cyprus","start":{"date-parts":[[2016,9,5]]},"end":{"date-parts":[[2016,9,9]]}},"container-title":["2016 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7571053\/7577016\/07577060.pdf?arnumber=7577060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T00:00:09Z","timestamp":1498348809000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7577060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2016.7577060","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}