{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T09:37:20Z","timestamp":1771061840088,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T00:00:00Z","timestamp":1569456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/Crown.html"},{"start":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T00:00:00Z","timestamp":1569456000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T00:00:00Z","timestamp":1569456000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000770","name":"University of Manchester","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000770","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9,26]]},"DOI":"10.1109\/siot48044.2019.9637109","type":"proceedings-article","created":{"date-parts":[[2021,12,20]],"date-time":"2021-12-20T22:55:54Z","timestamp":1640040954000},"page":"1-9","source":"Crossref","is-referenced-by-count":15,"title":["Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification"],"prefix":"10.1109","author":[{"given":"Omar M.","family":"Alhawi","sequence":"first","affiliation":[]},{"given":"Mustafa A.","family":"Mustafa","sequence":"additional","affiliation":[]},{"given":"Lucas C.","family":"Cordiro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17502-3_9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2012.11.003"},{"key":"ref31","year":"2013","journal-title":"PIPS Automatic Parallelizer and Code Transformation Framework"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54580-5_23"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96142-2_28"},{"key":"ref11","article-title":"Automated Whitebox Fuzz Testing","author":"godefroid","year":"2012","journal-title":"Queuing Networks"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390662"},{"key":"ref13","article-title":"Using Symbolic (Java) PathFinder at NASA","author":"pasareanu","year":"2010","journal-title":"NASA"},{"key":"ref14","volume":"54","author":"austin","year":"2011","journal-title":"Unmanned Aircraft Systems UAVS Design Development and Deployment"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2018.97"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1162666.1162671"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459914"},{"key":"ref18","article-title":"An overview ofnew armed drone operators The Next Generation","author":"frew","year":"2018","journal-title":"Tech Rep"},{"key":"ref19","author":"tarabay","year":"2018","journal-title":"Israel Iranian drone we shot down was based on captured USdrone - CNN"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_44"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5120\/19547-1280","article-title":"Article: A critical analysis on the security concerns of internet of things (iot)","volume":"111","author":"farooq","year":"2015","journal-title":"IJCA"},{"key":"ref27","author":"van rossum","year":"1995","journal-title":"Python Tutorial"},{"key":"ref3","author":"house","year":"2018","journal-title":"Drone Safety Risk An assessment"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240481"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_4"},{"key":"ref5","volume":"185","author":"biere","year":"2009","journal-title":"Handbook of Satisfiability"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2873260"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1145735.1145743"},{"key":"ref2","year":"2018","journal-title":"Gatwick airport drones disruption wasn't all for nothing UK police insist"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10543-3_13"},{"key":"ref1","year":"2018","journal-title":"Drones could add &#x00A3;42bn to UK GDP by2030-PwC research"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502939"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2013.6621814"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2015.7152319"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00051"},{"key":"ref26","author":"domin","year":"2016","journal-title":"Security analysis of the drone communication protocol Fuzzing the MAVLink protocol"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.20.3"}],"event":{"name":"2019 International Workshop on Secure Internet of Things (SIOT)","location":"Luxembourg, Luxembourg","start":{"date-parts":[[2019,9,26]]},"end":{"date-parts":[[2019,9,26]]}},"container-title":["2019 International Workshop on Secure Internet of Things (SIOT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9637047\/9637066\/09637109.pdf?arnumber=9637109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:20:16Z","timestamp":1658262016000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9637109\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,26]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/siot48044.2019.9637109","relation":{},"subject":[],"published":{"date-parts":[[2019,9,26]]}}}