{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T11:00:51Z","timestamp":1774782051820,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T00:00:00Z","timestamp":1600992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Spitfire Memorial Defence Fellowship","award":["PS39150"],"award-info":[{"award-number":["PS39150"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,25]]},"DOI":"10.1145\/3414045.3415951","type":"proceedings-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T01:54:28Z","timestamp":1602122068000},"page":"61-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Autonomous detection of malicious events using machine learning models in drone networks"],"prefix":"10.1145","author":[{"given":"Nour","family":"Moustafa","sequence":"first","affiliation":[{"name":"The University of New South Wales at ADFA, Canberra, ACT, Australia"}]},{"given":"Alireza","family":"Jolfaei","sequence":"additional","affiliation":[{"name":"Macquarie University, Sydney, NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2020,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2018.8450305"},{"key":"e_1_3_2_1_2_1","volume-title":"An Agent-Based Self-Protective Method to Secure Communication between UAVs in Unmanned Aerial Vehicle Networks. Vehicular Communications","author":"Fotohi Reza","year":"2020","unstructured":"Reza Fotohi , Eslam Nazemi , and Fereidoon Shams Aliee . 2020. An Agent-Based Self-Protective Method to Secure Communication between UAVs in Unmanned Aerial Vehicle Networks. Vehicular Communications ( 2020 ), 100267. Reza Fotohi, Eslam Nazemi, and Fereidoon Shams Aliee. 2020. An Agent-Based Self-Protective Method to Secure Communication between UAVs in Unmanned Aerial Vehicle Networks. Vehicular Communications (2020), 100267."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1600073WC"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2507818"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459914"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.12.001"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248326.2248334"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2265083"},{"key":"e_1_3_2_1_9_1","volume-title":"Towards trusted and efficient UAV-Based communication. In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity)","author":"Mohammed Farhan","unstructured":"Farhan Mohammed , Imad Jawhar , Nader Mohamed , and Ahmed Idries . 2016. Towards trusted and efficient UAV-Based communication. In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity) , IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS). IEEE , 388--393. Farhan Mohammed, Imad Jawhar, Nader Mohamed, and Ahmed Idries. 2016. Towards trusted and efficient UAV-Based communication. In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS). IEEE, 388--393."},{"key":"e_1_3_2_1_10_1","volume-title":"Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks","author":"Moustafa Nour","year":"2017","unstructured":"Nour Moustafa , Jill Slay , and Gideon Creech . 2017. Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks . IEEE Transactions on Big Data ( 2017 ). Nour Moustafa, Jill Slay, and Gideon Creech. 2017. Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Transactions on Big Data (2017)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/1548512915617252"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2600370"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2600370"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2681698"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2681698"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.005"},{"key":"e_1_3_2_1_17_1","first-page":"051","article-title":"Unmanned aerial vehicle intrusion detection and countermeasures","volume":"10","author":"Shattil Steve","year":"2018","unstructured":"Steve Shattil , Robi Sen , 2018 . Unmanned aerial vehicle intrusion detection and countermeasures . US Patent 10 , 051 ,475. Steve Shattil, Robi Sen, et al. 2018. Unmanned aerial vehicle intrusion detection and countermeasures. US Patent 10,051,475.","journal-title":"US Patent"}],"event":{"name":"MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking","location":"London United Kingdom","acronym":"MobiCom '20","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3414045.3415951","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3414045.3415951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:38Z","timestamp":1750199918000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3414045.3415951"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,25]]},"references-count":17,"alternative-id":["10.1145\/3414045.3415951","10.1145\/3414045"],"URL":"https:\/\/doi.org\/10.1145\/3414045.3415951","relation":{},"subject":[],"published":{"date-parts":[[2020,9,25]]},"assertion":[{"value":"2020-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}