{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T13:53:56Z","timestamp":1772632436324,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1109\/tps-isa67132.2025.00055","type":"proceedings-article","created":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T20:50:15Z","timestamp":1772571015000},"page":"455-463","source":"Crossref","is-referenced-by-count":0,"title":["Quantitative Analysis of UAV Intrusion Mitigation for Border Security in 5G with Leo Backhaul Impairments"],"prefix":"10.1109","author":[{"given":"Rajendra","family":"Upadhyay","sequence":"first","affiliation":[{"name":"George Mason University,Mason Innovation Labs,Fairfax,VA,USA,22030"}]},{"given":"Al Nahian Bin","family":"Emran","sequence":"additional","affiliation":[{"name":"George Mason University,Mason Innovation Labs,Fairfax,VA,USA,22030"}]},{"given":"Rajendra","family":"Paudyal","sequence":"additional","affiliation":[{"name":"George Mason University,Mason Innovation Labs,Fairfax,VA,USA,22030"}]},{"given":"Lisa","family":"Donnan","sequence":"additional","affiliation":[{"name":"George Mason University,Mason Innovation Labs,Fairfax,VA,USA,22030"}]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[{"name":"George Mason University,Mason Innovation Labs,Fairfax,VA,USA,22030"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Tpm-based continuous remote attestation and integrity verification for 5 g vnfs on kubernetes","author":"Emran","year":"2025","journal-title":"arXiv preprint"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279086"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1093\/isp\/eky002","article-title":"Drones along borders: Border security uavs in the united states and the european union","volume-title":"International Studies Perspectives","author":"Koslowski","year":"2018"},{"key":"ref4","article-title":"Border security: The role of drones in smuggling and surveillance","year":"2025","journal-title":"AirSight"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3325421.3329770"},{"key":"ref6","article-title":"Nr support for uavs (uncrewed aerial vehicles)","year":"2023","journal-title":"3 GPP, Jedrzej Stanczak (WI Rapporteur)"},{"key":"ref7","article-title":"Beyond terrestrial limits: Cisco\u2019s validated architecture for secure, high-performance satellite connectivity","year":"2025","journal-title":"White Paper, Cisco"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD67323.2025.11229912"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3396864.3400304"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2023.3296138"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051097"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.01.1900545"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.2000032"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3733965.3733971"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/rs14236146"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2019.8741970"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1117\/12.2194309"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/drones8060218"},{"key":"ref19","article-title":"Ts 38.331 v 15.02. 01\u20135g; nr; radio resource control (rrc); protocol specification","journal-title":"ETSI, Technical Specification TS 38.331 V15.02.01, July 2019, release 15 - Retrieved from ETSI website"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/icp.2023.1364"},{"key":"ref21","article-title":"Robust live streaming over leo satellite constellations: Measurement, analysis, and handover-aware adaptation","volume-title":"arXiv preprint","author":"Fang","year":"2025"},{"key":"ref22","article-title":"Network characteristics of leo satellite constellations: A starlink-based measurement from end users","volume-title":"arXiv preprint","author":"Ma","year":"2022"}],"event":{"name":"2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","location":"Pittsburgh, PA, USA","start":{"date-parts":[[2025,11,12]]},"end":{"date-parts":[[2025,11,14]]}},"container-title":["2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11410113\/11410157\/11410160.pdf?arnumber=11410160","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T07:01:48Z","timestamp":1772607708000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11410160\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/tps-isa67132.2025.00055","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]}}}