{"id":"https://openalex.org/W4284892819","doi":"https://doi.org/10.1109/eit53891.2022.9813819","title":"ADS-B Message Injection Attack on UAVs: Assessment of SVM-based Detection Techniques","display_name":"ADS-B Message Injection Attack on UAVs: Assessment of SVM-based Detection Techniques","publication_year":2022,"publication_date":"2022-05-19","ids":{"openalex":"https://openalex.org/W4284892819","doi":"https://doi.org/10.1109/eit53891.2022.9813819"},"language":"en","primary_location":{"id":"doi:10.1109/eit53891.2022.9813819","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit53891.2022.9813819","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065714487","display_name":"Hadjar Ould Slimane","orcid":null},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hadjar Ould Slimane","raw_affiliation_strings":["University of North Dakota,School of Electrical Engineering and Computer Science,Grand Forks,ND,USA,58202"],"affiliations":[{"raw_affiliation_string":"University of North Dakota,School of Electrical Engineering and Computer Science,Grand Forks,ND,USA,58202","institution_ids":["https://openalex.org/I24571045"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076043195","display_name":"Selma Benouadah","orcid":null},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Selma Benouadah","raw_affiliation_strings":["University of North Dakota,School of Electrical Engineering and Computer Science,Grand Forks,ND,USA,58202"],"affiliations":[{"raw_affiliation_string":"University of North Dakota,School of Electrical Engineering and Computer Science,Grand Forks,ND,USA,58202","institution_ids":["https://openalex.org/I24571045"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037545173","display_name":"Khair Al Shamaileh","orcid":"https://orcid.org/0000-0003-4112-2605"},"institutions":[{"id":"https://openalex.org/I117015748","display_name":"Purdue University Northwest","ror":"https://ror.org/04keq6987","country_code":"US","type":"education","lineage":["https://openalex.org/I117015748"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"K. Al Shamaileh","raw_affiliation_strings":["Purdue University Northwest,Electrical and Computer Engineering Department,Hammond,IN,USA,46323"],"affiliations":[{"raw_affiliation_string":"Purdue University Northwest,Electrical and Computer Engineering Department,Hammond,IN,USA,46323","institution_ids":["https://openalex.org/I117015748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025730663","display_name":"V. Devabhaktuni","orcid":"https://orcid.org/0000-0001-9526-0347"},"institutions":[{"id":"https://openalex.org/I7947594","display_name":"University of Maine","ror":"https://ror.org/01adr0w49","country_code":"US","type":"education","lineage":["https://openalex.org/I2802397601","https://openalex.org/I7947594"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"V. Devabhaktuni","raw_affiliation_strings":["The University of Maine,Electrical and Computer Engineering Department,Orono,ME,USA,04469"],"affiliations":[{"raw_affiliation_string":"The University of Maine,Electrical and Computer Engineering Department,Orono,ME,USA,04469","institution_ids":["https://openalex.org/I7947594"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071211423","display_name":"Naima Kaabouch","orcid":null},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"N. Kaabouch","raw_affiliation_strings":["University of North Dakota,School of Electrical Engineering and Computer Science,Grand Forks,ND,USA,58202"],"affiliations":[{"raw_affiliation_string":"University of North Dakota,School of Electrical Engineering and Computer Science,Grand Forks,ND,USA,58202","institution_ids":["https://openalex.org/I24571045"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5065714487"],"corresponding_institution_ids":["https://openalex.org/I24571045"],"apc_list":null,"apc_paid":null,"fwci":9.1794,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.97128821,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"405","last_page":"410"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.838902473449707},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7562770843505859},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.523134171962738},{"id":"https://openalex.org/keywords/automatic-dependent-surveillance-broadcast","display_name":"Automatic dependent surveillance-broadcast","score":0.42241156101226807},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4214564859867096},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3973052203655243},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38992738723754883},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2676013708114624},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16470804810523987},{"id":"https://openalex.org/keywords/air-traffic-control","display_name":"Air traffic control","score":0.11802873015403748}],"concepts":[{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.838902473449707},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7562770843505859},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.523134171962738},{"id":"https://openalex.org/C183384803","wikidata":"https://www.wikidata.org/wiki/Q787172","display_name":"Automatic dependent surveillance-broadcast","level":3,"score":0.42241156101226807},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4214564859867096},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3973052203655243},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38992738723754883},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2676013708114624},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16470804810523987},{"id":"https://openalex.org/C166961238","wikidata":"https://www.wikidata.org/wiki/Q221395","display_name":"Air traffic control","level":2,"score":0.11802873015403748},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eit53891.2022.9813819","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit53891.2022.9813819","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1629102637","https://openalex.org/W1871925091","https://openalex.org/W1924366267","https://openalex.org/W2038810443","https://openalex.org/W2115076892","https://openalex.org/W2118756516","https://openalex.org/W2133631887","https://openalex.org/W2134300758","https://openalex.org/W2332075188","https://openalex.org/W2569901261","https://openalex.org/W2767200452","https://openalex.org/W2944772476","https://openalex.org/W4239181501","https://openalex.org/W4239510810"],"related_works":["https://openalex.org/W2090763504","https://openalex.org/W148178222","https://openalex.org/W2104657898","https://openalex.org/W1948992892","https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W1886884218","https://openalex.org/W1910826599","https://openalex.org/W1980100242","https://openalex.org/W2530420969"],"abstract_inverted_index":{"As":[0],"more":[1],"aircraft":[2],"are":[3,20,27],"using":[4],"the":[5,15,42,45,105,109],"Automatic":[6],"Dependent":[7],"Surveillance-Broadcast":[8],"(ADS-B)":[9],"devices":[10],"for":[11,63,112],"navigation":[12],"and":[13,98],"surveillance,":[14],"risks":[16],"of":[17,44,90,93,118],"injection":[18,59,72],"attacks":[19,73],"highly":[21],"increasing.":[22],"The":[23,101],"exchanged":[24],"ADS-B":[25,57,77],"messages":[26],"neither":[28],"encrypted":[29],"nor":[30],"authenticated":[31],"while":[32],"containing":[33],"valuable":[34],"operational":[35],"information,":[36],"which":[37],"imposes":[38],"high":[39],"risk":[40],"on":[41,74],"safety":[43],"airspace.":[46],"For":[47],"this":[48,53],"reason,":[49],"we":[50,68],"propose":[51],"in":[52,88],"paper":[54],"an":[55,116],"SVM-based":[56],"message":[58,71],"attack":[60],"detection":[61,96],"technique":[62],"UAV":[64],"onboard":[65],"implementation.":[66],"First,":[67],"simulated":[69],"several":[70],"real":[75],"raw":[76],"data.":[78],"Then,":[79],"three":[80],"Support":[81],"Vector":[82],"Machine":[83],"(SVM)":[84],"models":[85],"were":[86],"examined":[87],"terms":[89],"two":[91],"types":[92],"assessment":[94],"criteria,":[95],"efficiency":[97],"model":[99,107],"performance.":[100],"results":[102],"show":[103],"that":[104],"C-SVM":[106],"is":[108],"best":[110],"fit":[111],"our":[113],"application,":[114],"with":[115],"accuracy":[117],"95.32%.":[119]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":7}],"updated_date":"2026-03-30T08:08:38.191290","created_date":"2025-10-10T00:00:00"}
