{"id":"https://openalex.org/W6964071089","doi":"https://doi.org/10.21227/6f22-py65","title":"Cyber-Physical Dataset for UAVs Under Normal Operations and Cyber-Attacks","display_name":"Cyber-Physical Dataset for UAVs Under Normal Operations and Cyber-Attacks","publication_year":2023,"publication_date":"2023-05-25","ids":{"openalex":"https://openalex.org/W6964071089","doi":"https://doi.org/10.21227/6f22-py65"},"language":"en","primary_location":{"id":"doi:10.21227/6f22-py65","is_oa":true,"landing_page_url":"https://doi.org/10.21227/6f22-py65","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"type":"dataset","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.21227/6f22-py65","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Hassler, Samuel","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hassler, Samuel","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Mughal, Umair","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mughal, Umair","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Ismail, Muhammad","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ismail, Muhammad","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":null,"topics":[],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7495999932289124},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6195999979972839},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5604000091552734},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.43380001187324524},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.35839998722076416}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7495999932289124},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6873000264167786},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6195999979972839},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5604000091552734},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.43380001187324524},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.39399999380111694},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.35839998722076416},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3416000008583069},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.33869999647140503},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28459998965263367},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.2797999978065491},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.26010000705718994}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.21227/6f22-py65","is_oa":true,"landing_page_url":"https://doi.org/10.21227/6f22-py65","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"dataset"}],"best_oa_location":{"id":"doi:10.21227/6f22-py65","is_oa":true,"landing_page_url":"https://doi.org/10.21227/6f22-py65","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"sustainable_development_goals":[{"score":0.40910062193870544,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Unmanned":[0],"aerial":[1],"vehicles":[2],"(UAVs)":[3],"are":[4,15],"being":[5],"used":[6,46],"for":[7],"various":[8],"applications,":[9],"but":[10],"the":[11,34,38,49,82],"associated":[12],"cyber":[13,39,86],"risks":[14],"also":[16],"increasing.":[17],"Machine":[18],"learning":[19],"techniques":[20],"have":[21,44],"been":[22,45],"successfully":[23],"adopted":[24],"to":[25,47,72],"develop":[26,48],"intrusion":[27],"detection":[28],"systems":[29],"(IDSs).":[30],"However,":[31],"none":[32],"of":[33],"existing":[35],"works":[36],"published":[37],"or":[40],"physical":[41,88],"datasets":[42],"that":[43,63],"IDS,":[50],"which":[51],"hinders":[52],"further":[53],"research":[54],"in":[55],"this":[56,98],"field.":[57],"Hence,":[58],"we":[59,96],"developed":[60],"a":[61,65],"testbed":[62],"includes":[64],"UAV,":[66],"controller,":[67],"and":[68,78,84,87,92,95],"data":[69,89],"collection":[70],"tools,":[71],"launch":[73],"cyber-attacks":[74],"(de-authentication":[75],"denial-of-service":[76],"(DoS)":[77],"replay":[79],"attacks)":[80],"on":[81],"UAV":[83],"collect":[85],"under":[90],"normal":[91],"attack":[93],"conditions,":[94],"make":[97],"dataset":[99],"publicly":[100],"available.":[101]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
