{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:56Z","timestamp":1750219856246,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T00:00:00Z","timestamp":1693958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union?s Horizon 2020 research and innovation program","award":["861696"],"award-info":[{"award-number":["861696"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,6]]},"DOI":"10.1145\/3582515.3609566","type":"proceedings-article","created":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T15:02:36Z","timestamp":1692111756000},"page":"446-454","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Cybersecurity Analysis in the UAV Domain: the Practical Approach of the Labyrinth Project"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8849-2799","authenticated-orcid":false,"given":"Miguel-\u00c1ngel","family":"Fas-Mill\u00e1n","sequence":"first","affiliation":[{"name":"Deutsche Zentrum f\u00fcr Luft- und Raumfahrt (DLR), Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6738-8634","authenticated-orcid":false,"given":"Francesca","family":"Soro","sequence":"additional","affiliation":[{"name":"Center for Digital Safety and Security, Austrian Institute of Technology (AIT), Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0483-1605","authenticated-orcid":false,"given":"Oliver","family":"Jung","sequence":"additional","affiliation":[{"name":"Austrian Institute of Technology (AIT), Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9159-8436","authenticated-orcid":false,"given":"Abdelkader","family":"Shaaban","sequence":"additional","affiliation":[{"name":"Austrian Institute of Technology (AIT), Austria"}]}],"member":"320","published-online":{"date-parts":[[2023,9,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"9th international workshop on remote sensing for disaster response, Vol.\u00a08. 1\u20138.","author":"Adams M","year":"2011","unstructured":"Stuart\u00a0M Adams and Carol\u00a0J Friedland. 2011. A survey of unmanned aerial vehicle (UAV) usage for imagery collection in disaster research and management. In 9th international workshop on remote sensing for disaster response, Vol.\u00a08. 1\u20138."},{"key":"e_1_3_2_1_2_1","volume-title":"2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM). IEEE, 1032\u20131037","author":"Bouhamed Omar","year":"2021","unstructured":"Omar Bouhamed, Ouns Bouachir, Moayad Aloqaily, and Ismaeel Al\u00a0Ridhawi. 2021. Lightweight ids for uav networks: A periodic deep reinforcement learning-based approach. In 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM). IEEE, 1032\u20131037."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn.2016.0427"},{"key":"e_1_3_2_1_4_1","unstructured":"Martin Ester Hans-Peter Kriegel J\u00f6rg Sander Xiaowei Xu 1996. A density-based algorithm for discovering clusters in large spatial databases with noise.. In kdd Vol.\u00a096. 226\u2013231."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2017.2754698"},{"key":"e_1_3_2_1_6_1","unstructured":"International Electrotechnical\u00a0Commission (IEC). 2013-2018. Industrial communication networks - Network and system security - ISO\/IEC 62443. (2013-2018)."},{"key":"e_1_3_2_1_7_1","volume-title":"MUVIDS: False MAVLink Injection Attack Detection in Communication for Unmanned Vehicles. In Workshop on Automotive and Autonomous Vehicle Security (AutoSec), Vol.\u00a02021","author":"Jeong Seonghoon","year":"2021","unstructured":"Seonghoon Jeong, Eunji Park, Kang\u00a0Uk Seo, Jeong Do\u00a0Yoo, and Huy\u00a0Kang Kim. 2021. MUVIDS: False MAVLink Injection Attack Detection in Communication for Unmanned Vehicles. In Workshop on Automotive and Autonomous Vehicle Security (AutoSec), Vol.\u00a02021. 25."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"key":"e_1_3_2_1_9_1","volume-title":"2013 IEEE Globecom Workshops (GC Wkshps). IEEE, 1415\u20131420","author":"Li Jun","year":"2013","unstructured":"Jun Li, Yifeng Zhou, and Louise Lamont. 2013. Communication architectures and protocols for networking unmanned aerial vehicles. In 2013 IEEE Globecom Workshops (GC Wkshps). IEEE, 1415\u20131420."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. 5th Berkeley Symposium on Math., Stat., and Prob. 281","author":"MacQueen J","year":"1965","unstructured":"J MacQueen. 1965. Some methods for classification and analysis of multivariate observations. In Proc. 5th Berkeley Symposium on Math., Stat., and Prob. 281."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973440.96"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.23919\/IConAC.2017.8081999"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2018.05.002"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proenv.2015.03.032"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109225"},{"volume-title":"AmE 2020-Automotive meets Electronics","author":"Schmittner Christoph","key":"e_1_3_2_1_16_1","unstructured":"Christoph Schmittner, Sebastian Chlup, Andreas Fellner, Georg Macher, and Eugen Brenner. 2020. ThreatGet: Threat modeling based approach for automated and connected vehicle systems. In AmE 2020-Automotive meets Electronics; 11th GMM-Symposium. VDE, 1\u20133."},{"key":"e_1_3_2_1_17_1","first-page":"16","article-title":"The NIST cybersecurity framework: Overview and potential impacts","volume":"10","author":"Shen Lei","year":"2014","unstructured":"Lei Shen. 2014. The NIST cybersecurity framework: Overview and potential impacts. Scitech Lawyer 10, 4 (2014), 16.","journal-title":"Scitech Lawyer"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 25th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS 2012). 3591\u20133605","author":"Shepard P","year":"2012","unstructured":"Daniel\u00a0P Shepard, Jahshan\u00a0A Bhatti, Todd\u00a0E Humphreys, and Aaron\u00a0A Fansler. 2012. Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In Proceedings of the 25th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS 2012). 3591\u20133605."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17102243"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/PHM-Paris.2019.00055"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11119-012-9274-5"}],"event":{"name":"GoodIT '23: ACM International Conference on Information Technology for Social Good","sponsor":["SIGCAS ACM Special Interest Group on Computers and Society"],"location":"Lisbon Portugal","acronym":"GoodIT '23"},"container-title":["Proceedings of the 2023 ACM Conference on Information Technology for Social Good"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582515.3609566","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3582515.3609566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:15Z","timestamp":1750178835000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582515.3609566"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,6]]},"references-count":22,"alternative-id":["10.1145\/3582515.3609566","10.1145\/3582515"],"URL":"https:\/\/doi.org\/10.1145\/3582515.3609566","relation":{},"subject":[],"published":{"date-parts":[[2023,9,6]]},"assertion":[{"value":"2023-09-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}