{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T07:24:43Z","timestamp":1770708283933,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.23919\/iconac.2017.8081999","type":"proceedings-article","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T17:36:33Z","timestamp":1509644193000},"page":"1-11","source":"Crossref","is-referenced-by-count":86,"title":["A SVM-based detection approach for GPS spoofing attacks to UAV"],"prefix":"10.23919","author":[{"given":"G.","family":"Panice","sequence":"first","affiliation":[]},{"given":"S.","family":"Luongo","sequence":"additional","affiliation":[]},{"given":"G.","family":"Gigante","sequence":"additional","affiliation":[]},{"given":"D.","family":"Pascarella","sequence":"additional","affiliation":[]},{"given":"C.","family":"Di Benedetto","sequence":"additional","affiliation":[]},{"given":"A.","family":"Vozella","sequence":"additional","affiliation":[]},{"given":"A.","family":"Pescape","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICL-GNSS.2013.6577265"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IAIN.2015.7352260"},{"key":"ref12","article-title":"Secure localisation with location assurance provider","author":"harpes","year":"2007","journal-title":"European Navigation Conference (ENC-GNSS) 2007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/9781118027974"},{"key":"ref14","author":"marnach","year":"0","journal-title":"Detecting Meaconing Attacks by analysing the Clock Bias of GNSS Receivers"},{"key":"ref15","author":"pullen","year":"0","journal-title":"GNSS jamming in the name of privacy Potential threat to GPS aviation"},{"key":"ref16","author":"shepard","year":"0","journal-title":"Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/navi.183"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2526658"},{"key":"ref19","author":"jovanovic","year":"0","journal-title":"Multi-test detection and protection algorithm against spoofingattacks on GNSS receivers"},{"key":"ref4","year":"2008","journal-title":"What is C Band?"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2514\/6.2007-3001"},{"key":"ref6","year":"2011","journal-title":"Obama Says U S Has Asked Iran to Return Drone Aircraft"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2514\/6.2007-3007"},{"key":"ref8","author":"cenciotti","year":"2011","journal-title":"The Aviationist"},{"key":"ref7","article-title":"Statement on the vulnerability of civil unmanned aerial vehicles and other systemes to civil gps spoofing","author":"humphreys","year":"2012","journal-title":"Austin"},{"key":"ref2","year":"0","journal-title":"Cybersecurity national action plan"},{"key":"ref1","article-title":"The Vulnerability of UAVs to Cyber Attacks-An Approach to the Risk Assessment","author":"hartmann","year":"2013","journal-title":"Conference on Cyber Conflict"},{"key":"ref9","article-title":"European GNSS Agency","year":"2015","journal-title":"GNSS Market Report"},{"key":"ref20","year":"0"}],"event":{"name":"2017 23rd International Conference on Automation and Computing (ICAC)","location":"Huddersfield, United Kingdom","start":{"date-parts":[[2017,9,7]]},"end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 23rd International Conference on Automation and Computing (ICAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8067274\/8081956\/08081999.pdf?arnumber=8081999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T15:29:08Z","timestamp":1512055748000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8081999\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.23919\/iconac.2017.8081999","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}