{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T13:31:27Z","timestamp":1769607087731,"version":"3.49.0"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1652544"],"award-info":[{"award-number":["CNS-1652544"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ONR","award":["N00014-17-1-2012"],"award-info":[{"award-number":["N00014-17-1-2012"]}]},{"name":"ONR","award":["N00014-17-1-2504"],"award-info":[{"award-number":["N00014-17-1-2504"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Human-Mach. Syst."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/thms.2018.2888578","type":"journal-article","created":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T20:51:22Z","timestamp":1551214282000},"page":"540-549","source":"Crossref","is-referenced-by-count":31,"title":["Operator Strategy Model Development in UAV Hacking Detection"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1565-267X","authenticated-orcid":false,"given":"Haibei","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Mary L.","family":"Cummings","sequence":"additional","affiliation":[]},{"given":"Mahmoud","family":"Elfar","sequence":"additional","affiliation":[]},{"given":"Ziyao","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5357-0117","authenticated-orcid":false,"given":"Miroslav","family":"Pajic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177699147"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MASSP.1986.1165342"},{"key":"ref31","article-title":"Modeling human supervisory control in heterogeneous unmanned vehicle systems","author":"nehme","year":"2009"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2514\/1.46767"},{"key":"ref35","first-page":"1","article-title":"Finding behavioral patterns of UAV operators using multichannel hidden Markov models","author":"rodr\u00edguez-fern\u00e1ndez","year":"0","journal-title":"Proc IEEE Symp Ser Comput Intell"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176344136"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PLANS.2012.6236917"},{"key":"ref12","first-page":"2646","article-title":"An evaluation of the vestigial signal defense for civil GPS anti-spoofing","author":"wesson","year":"0","journal-title":"Proc Int Tech Meeting Satell Division Inst Navigat"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/navi.14"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2016.2643239"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736854"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2013.6494400"},{"key":"ref17","first-page":"2619","article-title":"Civilian GPS spoofing detection based on dual-receiver correlation of military signals","author":"psiaki","year":"0","journal-title":"Proceedings of the 24th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2011)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2607420"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2847418"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ROBIO.2006.340166"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(80)90005-5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"ref3","article-title":"Drone crash in Iran reveals secret US surveillance effort","volume":"7","author":"shane","year":"2011","journal-title":"The New York Times"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0042-6989(88)90064-8"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2514\/6.2009-1842"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/34.730558"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2046731"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3055004.3064846"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2012.09.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91467-1_13"},{"key":"ref1","first-page":"2314","article-title":"Assessing the spoofing threat: Development of a portable GPS civilian spoofer","author":"humphreys","year":"0","journal-title":"Proc Int Tech Meeting Satell Division Inst Navigat"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.838698"},{"key":"ref22","first-page":"1","article-title":"Automation architecture for single operator, multiple UAV command and control","volume":"1","author":"cummings","year":"2007","journal-title":"Int Command Control J"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1049\/PBRA033E","author":"blacknell","year":"2013","journal-title":"Radar automatic target recognition (ATR) and non-cooperative target recognition (NCTR)"},{"key":"ref24","volume":"51","author":"asmussen","year":"2008","journal-title":"Applied Probability and Queues"},{"key":"ref23","author":"sheridan","year":"1992","journal-title":"Telerobotics Automation and Human Supervisory Control"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.2000.0894"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1162\/089976699300016890"}],"container-title":["IEEE Transactions on Human-Machine Systems"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6221037\/8910331\/8653416-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221037\/8910331\/08653416.pdf?arnumber=8653416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T23:32:18Z","timestamp":1694647938000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8653416\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":35,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/thms.2018.2888578","relation":{},"ISSN":["2168-2291","2168-2305"],"issn-type":[{"value":"2168-2291","type":"print"},{"value":"2168-2305","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]}}}