{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T21:41:39Z","timestamp":1761514899013,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"QNRF-Qatar National Research Fund","award":["NPRP12S-0125-190013"],"award-info":[{"award-number":["NPRP12S-0125-190013"]}]},{"name":"Netherlands Organisation for Scientific Research (NWO)","award":["INTERSECT project, Grant No. NWA.1162.18.301"],"award-info":[{"award-number":["INTERSECT project, Grant No. NWA.1162.18.301"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3494107.3522777","type":"proceedings-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T16:36:10Z","timestamp":1652805370000},"page":"63-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Context-Aware Drone Detection"],"prefix":"10.1145","author":[{"given":"Gabriele","family":"Oligeri","sequence":"first","affiliation":[{"name":"Hamad Bin Khalifa University, Qatar Foundation, Doha, Qatar"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Savio","family":"Sciancalepore","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology (TU\/e), Eindhoven, Netherlands"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"15th International Wireless Communications Mobile Computing Conference (IWCMC) . 459--464","author":"Al-Emadi S.","year":"2019","unstructured":"S. Al-Emadi , A. Al-Ali , A. Mohammad , and A. Al-Ali . 2019. Audio Based Drone Detection and Identification using Deep Learning . In 15th International Wireless Communications Mobile Computing Conference (IWCMC) . 459--464 . https:\/\/doi.org\/10.1109\/IWCMC. 2019 .8766732 10.1109\/IWCMC.2019.8766732 S. Al-Emadi, A. Al-Ali, A. Mohammad, and A. Al-Ali. 2019. Audio Based Drone Detection and Identification using Deep Learning. In 15th International Wireless Communications Mobile Computing Conference (IWCMC) . 459--464. https:\/\/doi.org\/10.1109\/IWCMC.2019.8766732"},{"key":"e_1_3_2_1_2_1","unstructured":"Aladdin Consortium. 2021. Aladdin -- Advanced hoListic Adverse Drone Detection Identification & Neutralization . http:\/\/aladdin.eu . (Accessed: 2021--10--22.  Aladdin Consortium. 2021. Aladdin -- Advanced hoListic Adverse Drone Detection Identification & Neutralization . http:\/\/aladdin.eu . (Accessed: 2021--10--22."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3001836"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2893615"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"B. Alzahrani etal 2020. UAV assistance paradigm: State-of-the-art in applications and challenges . Journ. of Netw. and Comput. Applicat. (2020) 102706.  B. Alzahrani et al. 2020. UAV assistance paradigm: State-of-the-art in applications and challenges . Journ. of Netw. and Comput. Applicat. (2020) 102706.","DOI":"10.1016\/j.jnca.2020.102706"},{"key":"e_1_3_2_1_6_1","volume-title":"Gatwick Airport: Drone attack grounds flights","author":"BBC.","year":"2019","unstructured":"BBC. 2019 . Gatwick Airport: Drone attack grounds flights . http:\/\/www.bbc.co.uk\/news\/uk-england-sussex-4662375 . (Accessed: 2021--10--22. BBC. 2019. Gatwick Airport: Drone attack grounds flights . http:\/\/www.bbc.co.uk\/news\/uk-england-sussex-4662375 . (Accessed: 2021--10--22."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"S. Birnbach R. Baker and I. Martinovic. 2017. Wi-fly?: Detecting privacy invasion attacks by consumer drones . (2017).  S. Birnbach R. Baker and I. Martinovic. 2017. Wi-fly?: Detecting privacy invasion attacks by consumer drones . (2017).","DOI":"10.14722\/ndss.2017.23335"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2884767"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102600"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"L. Caceres Najarro I. Song and K. Kim. 2021. Fundamental Limitations and State-of-the-art Solutions for Target Node Localization in WSNs . (2021).  L. Caceres Najarro I. Song and K. Kim. 2021. Fundamental Limitations and State-of-the-art Solutions for Target Node Localization in WSNs . (2021).","DOI":"10.36227\/techrxiv.16698469.v1"},{"key":"e_1_3_2_1_11_1","unstructured":"DeDrone. 2021. Worldwide Drone Incidents . Available Online: hhttps:\/\/www.dedrone.com\/resources\/incidents\/all.  DeDrone. 2021. Worldwide Drone Incidents . Available Online: hhttps:\/\/www.dedrone.com\/resources\/incidents\/all."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802717"},{"key":"e_1_3_2_1_13_1","unstructured":"FAA. 2021. UAS Remote Identification Overview . Available Online: https:\/\/www.faa.gov\/uas\/getting_started\/remote_id\/.  FAA. 2021. UAS Remote Identification Overview . Available Online: https:\/\/www.faa.gov\/uas\/getting_started\/remote_id\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924410"},{"key":"e_1_3_2_1_15_1","volume-title":"IEEE Third International Conference on Multimedia Big Data (BigMM). 402--406","author":"Liu H.","year":"2017","unstructured":"H. Liu , Z. Wei , Y. Chen , J. Pan , L. Lin , and Y. Ren . 2017. Drone Detection Based on an Audio-Assisted Camera Array . In IEEE Third International Conference on Multimedia Big Data (BigMM). 402--406 . https:\/\/doi.org\/10.1109\/BigMM. 2017 .57 10.1109\/BigMM.2017.57 H. Liu, Z. Wei , Y. Chen, J. Pan, L. Lin, and Y. Ren. 2017. Drone Detection Based on an Audio-Assisted Camera Array. In IEEE Third International Conference on Multimedia Big Data (BigMM). 402--406. https:\/\/doi.org\/10.1109\/BigMM.2017.57"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2902862"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2262376"},{"key":"e_1_3_2_1_18_1","unstructured":"B. Nassi R. Ben-Netanel A. Shamir and Y. Elovici. 2018. Game of drones-detecting streamed POI from encrypted FPV channel . arXiv preprint arXiv:1801.03074 (2018).  B. Nassi R. Ben-Netanel A. Shamir and Y. Elovici. 2018. Game of drones-detecting streamed POI from encrypted FPV channel . arXiv preprint arXiv:1801.03074 (2018)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00051"},{"volume-title":"Proc. of the Annual Int. Conf. on Mobile Systems, Applications, and Services (MobiSys '17)","author":"Nguyen P.","key":"e_1_3_2_1_20_1","unstructured":"P. Nguyen , H. Truong , M. Ravindranathan , A. Nguyen , R. Han , and T. Vu . 2017. Matthan: Drone Presence Detection by Identifying Physical Signatures in the Drone's RF Communication . In Proc. of the Annual Int. Conf. on Mobile Systems, Applications, and Services (MobiSys '17) . 211--224. P. Nguyen, H. Truong, M. Ravindranathan, A. Nguyen, R. Han, and T. Vu. 2017. Matthan: Drone Presence Detection by Identifying Physical Signatures in the Drone's RF Communication. In Proc. of the Annual Int. Conf. on Mobile Systems, Applications, and Services (MobiSys '17). 211--224."},{"volume-title":"GNSS Spoofing Detection via Opportunistic IRIDIUM Signals (WiSec '20)","author":"Oligeri G.","key":"e_1_3_2_1_21_1","unstructured":"G. Oligeri , S. Sciancalepore , and R. Di Pietro . 2020. GNSS Spoofing Detection via Opportunistic IRIDIUM Signals (WiSec '20) . Association for Computing Machinery , New York, NY, USA , 42--52. https:\/\/doi.org\/10.1145\/3395351.3399350 10.1145\/3395351.3399350 G. Oligeri, S. Sciancalepore, and R. Di Pietro. 2020. GNSS Spoofing Detection via Opportunistic IRIDIUM Signals (WiSec '20). Association for Computing Machinery, New York, NY, USA, 42--52. https:\/\/doi.org\/10.1145\/3395351.3399350"},{"key":"e_1_3_2_1_22_1","volume-title":"Drive Me Not: GPS Spoofing Detection via Cellular Network: (Architectures, Models, and Experiments) (WiSec '19)","author":"Oligeri G.","year":"1971","unstructured":"G. Oligeri , S. Sciancalepore , O. Ibrahim , and R. Di Pietro . 2019. Drive Me Not: GPS Spoofing Detection via Cellular Network: (Architectures, Models, and Experiments) (WiSec '19) . Association for Computing Machinery , New York, NY, USA , 12--22. https:\/\/doi.org\/10.1145\/3317549.33 1971 9 10.1145\/3317549.3319719 G. Oligeri, S. Sciancalepore, O. Ibrahim, and R. Di Pietro. 2019. Drive Me Not: GPS Spoofing Detection via Cellular Network: (Architectures, Models, and Experiments) (WiSec '19). Association for Computing Machinery, New York, NY, USA, 12--22. https:\/\/doi.org\/10.1145\/3317549.3319719"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/net.21818"},{"key":"e_1_3_2_1_24_1","volume-title":"Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures","author":"Raponi S.","year":"2021","unstructured":"S. Raponi , S. Sciancalepore , G. Oligeri , and R. Di Pietro . 2021. Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures . IEEE Security Privacy ( 2021 ), 2--11. https:\/\/doi.org\/10.1109\/MSEC.2021.3110307 10.1109\/MSEC.2021.3110307 S. Raponi, S. Sciancalepore, G. Oligeri, and R. Di Pietro. 2021. Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures. IEEE Security Privacy (2021), 2--11. https:\/\/doi.org\/10.1109\/MSEC.2021.3110307"},{"key":"e_1_3_2_1_25_1","volume-title":"Wireless Communications: Principles and Practice","author":"Rappaport T.","unstructured":"T. Rappaport . 2001. Wireless Communications: Principles and Practice 2 nd ed.). Prentice Hall PTR , USA. T. Rappaport. 2001. Wireless Communications: Principles and Practice 2nd ed.). Prentice Hall PTR, USA.","edition":"2"},{"key":"e_1_3_2_1_26_1","unstructured":"Reuters. 2021. Saudi-led coalition says it intercepts armed drone fired at Abha airport . https:\/\/www.reuters.com\/world\/middle-east\/saudi-led-coalition-says-intercepts-armed-drone-fired-abha-airport-2021-05--10\/. (Accessed: 2021--10--22.  Reuters. 2021. Saudi-led coalition says it intercepts armed drone fired at Abha airport . https:\/\/www.reuters.com\/world\/middle-east\/saudi-led-coalition-says-intercepts-armed-drone-fired-abha-airport-2021-05--10\/. (Accessed: 2021--10--22."},{"key":"e_1_3_2_1_27_1","unstructured":"SafeShore Consortium. 2021. SafeShore -- Increasing Border Security . http:\/\/safeshore.eu . (Accessed: 2021--10--22.  SafeShore Consortium. 2021. SafeShore -- Increasing Border Security . http:\/\/safeshore.eu . (Accessed: 2021--10--22."},{"volume-title":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning. 67--72","author":"Sciancalepore S.","key":"e_1_3_2_1_28_1","unstructured":"S. Sciancalepore , O. Ibrahim , G. Oligeri , and R. Di Pietro . 2019. Detecting drones status via encrypted traffic analysis . In Proceedings of the ACM Workshop on Wireless Security and Machine Learning. 67--72 . S. Sciancalepore, O. Ibrahim, G. Oligeri, and R. Di Pietro. 2019. Detecting drones status via encrypted traffic analysis. In Proceedings of the ACM Workshop on Wireless Security and Machine Learning. 67--72."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107044"},{"volume-title":"Introduction to RF propagation","author":"Seybold J.","key":"e_1_3_2_1_30_1","unstructured":"J. Seybold . 2005. Introduction to RF propagation . John Wiley & Sons . J. Seybold. 2005. Introduction to RF propagation. John Wiley & Sons."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2016.2626038"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2819126"},{"key":"e_1_3_2_1_33_1","unstructured":"Statista. 2021. Estimated size of the global commercial drone market in 2021 with a forecast for 2026 . https:\/\/www.statista.com\/statistics\/878018\/global-commercial-drone-market-size\/. Accessed: 2021--10--22.  Statista. 2021. Estimated size of the global commercial drone market in 2021 with a forecast for 2026 . https:\/\/www.statista.com\/statistics\/878018\/global-commercial-drone-market-size\/. Accessed: 2021--10--22."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2019.2895585"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963105"},{"volume-title":"ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles. In Annual Computer Security Applications Conference. 207--218","author":"Tedeschi P.","key":"e_1_3_2_1_36_1","unstructured":"P. Tedeschi , S. Sciancalepore , and R. Di Pietro . 2021 . ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles. In Annual Computer Security Applications Conference. 207--218 . P. Tedeschi, S. Sciancalepore, and R. Di Pietro. 2021. ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles. In Annual Computer Security Applications Conference. 207--218."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1111\/anti.12228"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Nagasaki Japan","acronym":"ASIA CCS '22"},"container-title":["Proceedings of the 8th ACM on Cyber-Physical System Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494107.3522777","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494107.3522777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:45Z","timestamp":1750188645000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494107.3522777"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":37,"alternative-id":["10.1145\/3494107.3522777","10.1145\/3494107"],"URL":"https:\/\/doi.org\/10.1145\/3494107.3522777","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}