{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:00:26Z","timestamp":1775066426511,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T00:00:00Z","timestamp":1609804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,5]]},"DOI":"10.1145\/3427796.3428480","type":"proceedings-article","created":{"date-parts":[[2020,12,25]],"date-time":"2020-12-25T22:25:45Z","timestamp":1608935145000},"page":"166-175","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["COTS Drone Detection using Video Streaming Characteristics"],"prefix":"10.1145","author":[{"given":"Anas","family":"Alsoliman","sequence":"first","affiliation":[{"name":"University of California Irvine, US"}]},{"given":"Giulio","family":"Rigoni","sequence":"additional","affiliation":[{"name":"University of Florence, IT"}]},{"given":"Marco","family":"Levorato","sequence":"additional","affiliation":[{"name":"University of California Irvine, US"}]},{"given":"Cristina","family":"Pinotti","sequence":"additional","affiliation":[{"name":"University of Perugia, IT"}]},{"given":"Nils Ole","family":"Tippenhauer","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, DE"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua, IT"}]}],"member":"320","published-online":{"date-parts":[[2021,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"2020-03-13. Scapy. https:\/\/scapy.net\/  2020-03-13. Scapy. https:\/\/scapy.net\/","DOI":"10.1016\/S1464-2859(20)30167-X"},{"key":"e_1_3_2_1_2_1","unstructured":"2020-03-13. Wifi Analyzer. https:\/\/play.google.com\/store\/apps\/details?id=com.farproc.wifi.analyzer  2020-03-13. Wifi Analyzer. https:\/\/play.google.com\/store\/apps\/details?id=com.farproc.wifi.analyzer"},{"key":"e_1_3_2_1_3_1","unstructured":"2020-03-13. Wireshark. https:\/\/www.wireshark.org\/  2020-03-13. Wireshark. https:\/\/www.wireshark.org\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2959899"},{"key":"e_1_3_2_1_5_1","volume-title":"Improving WiFi Statistical Fingerprint-Based Detection Techniques Against UAV Stealth Attacks. In 2018 IEEE Global Communications Conference (GLOBECOM). IEEE, 1\u20136.","author":"Bisio","year":"2018","unstructured":"Bisio 2018 . Improving WiFi Statistical Fingerprint-Based Detection Techniques Against UAV Stealth Attacks. In 2018 IEEE Global Communications Conference (GLOBECOM). IEEE, 1\u20136. Bisio 2018. Improving WiFi Statistical Fingerprint-Based Detection Techniques Against UAV Stealth Attacks. In 2018 IEEE Global Communications Conference (GLOBECOM). IEEE, 1\u20136."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700340"},{"key":"e_1_3_2_1_7_1","volume-title":"Unmanned\/Unattended Sensors and Sensor Networks XI","author":"Busset","unstructured":"Busset 2015. Detection and Tracking of Drones using Advanced Acoustic Cameras . In Unmanned\/Unattended Sensors and Sensor Networks XI ; and Advanced Free-Space Optical Communication Techniques and Applications, Vol .\u00a09647. International Society for Optics and Photonics , 96470F. Busset 2015. Detection and Tracking of Drones using Advanced Acoustic Cameras. In Unmanned\/Unattended Sensors and Sensor Networks XI; and Advanced Free-Space Optical Communication Techniques and Applications, Vol.\u00a09647. International Society for Optics and Photonics, 96470F."},{"key":"e_1_3_2_1_8_1","volume-title":"Low-cost Acoustic Array for Small UAV Detection and Tracking. In 2008 IEEE National Aerospace and Electronics Conference. IEEE, 110\u2013113","author":"Case E","year":"2008","unstructured":"Ellen\u00a0 E Case , Anne\u00a0 M Zelnio , and Brian\u00a0 D Rigling . 2008 . Low-cost Acoustic Array for Small UAV Detection and Tracking. In 2008 IEEE National Aerospace and Electronics Conference. IEEE, 110\u2013113 . Ellen\u00a0E Case, Anne\u00a0M Zelnio, and Brian\u00a0D Rigling. 2008. Low-cost Acoustic Array for Small UAV Detection and Tracking. In 2008 IEEE National Aerospace and Electronics Conference. IEEE, 110\u2013113."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196509"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2019.8741970"},{"key":"e_1_3_2_1_11_1","volume-title":"Implementation of Detection and Tracking Mechanism for Small UAS. In 2016 International Conference on Unmanned Aircraft Systems (ICUAS). IEEE, 1254\u20131260","author":"Ganti Sai\u00a0Ram","year":"2016","unstructured":"Sai\u00a0Ram Ganti and Yoohwan Kim . 2016 . Implementation of Detection and Tracking Mechanism for Small UAS. In 2016 International Conference on Unmanned Aircraft Systems (ICUAS). IEEE, 1254\u20131260 . Sai\u00a0Ram Ganti and Yoohwan Kim. 2016. Implementation of Detection and Tracking Mechanism for Small UAS. In 2016 International Conference on Unmanned Aircraft Systems (ICUAS). IEEE, 1254\u20131260."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CYBER.2017.8446096"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210332"},{"key":"e_1_3_2_1_14_1","volume-title":"Flicker. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 1397\u20131414","author":"Nassi","year":"2019","unstructured":"Nassi 2019 . Drones\u2019 Cryptanalysis-Smashing Cryptography with a Flicker. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 1397\u20131414 . Nassi 2019. Drones\u2019 Cryptanalysis-Smashing Cryptography with a Flicker. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 1397\u20131414."},{"key":"e_1_3_2_1_15_1","volume-title":"RF Communication. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. 211\u2013224","author":"Matthan Phuc Nguyen\u00a0et","unstructured":"Phuc Nguyen\u00a0et al.2017. Matthan : Drone Presence Detection by Identifying Physical Signatures in the Drone\u2019s RF Communication. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. 211\u2013224 . Phuc Nguyen\u00a0et al.2017. Matthan: Drone Presence Detection by Identifying Physical Signatures in the Drone\u2019s RF Communication. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. 211\u2013224."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299040"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324921.3328791"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Sciancalepore 2019. Picking a Needle in a Haystack: Detecting Drones via Network Traffic Analysis. arXiv preprint arXiv:1901.03535(2019).  Sciancalepore 2019. Picking a Needle in a Haystack: Detecting Drones via Network Traffic Analysis. arXiv preprint arXiv:1901.03535(2019).","DOI":"10.1145\/3324921.3328791"},{"key":"e_1_3_2_1_19_1","unstructured":"SpotterRF. 2020-03-13. Drone Detection System. https:\/\/spotterrf.com\/applications\/drone-detection\/  SpotterRF. 2020-03-13. Drone Detection System. https:\/\/spotterrf.com\/applications\/drone-detection\/"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139943"}],"event":{"name":"ICDCN '21: International Conference on Distributed Computing and Networking 2021","location":"Nara Japan","acronym":"ICDCN '21"},"container-title":["Proceedings of the 22nd International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427796.3428480","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427796.3428480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:32Z","timestamp":1750197752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427796.3428480"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,5]]},"references-count":20,"alternative-id":["10.1145\/3427796.3428480","10.1145\/3427796"],"URL":"https:\/\/doi.org\/10.1145\/3427796.3428480","relation":{},"subject":[],"published":{"date-parts":[[2021,1,5]]},"assertion":[{"value":"2021-01-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}