iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3191789.3191800
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T18:39:10Z","timestamp":1722796750699},"reference-count":10,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2018,2,28]],"date-time":"2018-02-28T00:00:00Z","timestamp":1519776000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["GetMobile: Mobile Comp. and Comm."],"published-print":{"date-parts":[[2018,2,28]]},"abstract":"Excerpted from \"Matthan: Drone Presence Detection by Identifying Physical Signatures in the Drone's RF Communication,\" from MobiSys 2017, Proceedings of the 15th Annual ACM International Conference on Mobile Systems, Applications, and Services, with permission. https:\/\/dl.acm.org\/citation.cfm?id=3081354 \u00a9 ACM 2017.<\/jats:p>\n The rapidly increasing attention regarding drone privacy and security issues requires a robust solution in both detecting and characterizing unauthorized drones. We have designed a RF-based, cost-effective and passive drone detection system, named Matthan, based on two key physical signatures of the drones, i.e., body shifting and body vibration, in the drone's wireless communication channel. In realizing Matthan, there are many open challenges in wireless sensing and networking, software-defined radio deployment, network synchronization to passively and accurately detect, localize, and characterize drones.<\/jats:p>","DOI":"10.1145\/3191789.3191800","type":"journal-article","created":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T15:27:23Z","timestamp":1519918043000},"page":"30-34","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Cost-Effective and Passive RF-Based Drone Presence Detection and Characterization"],"prefix":"10.1145","volume":"21","author":[{"given":"Phuc","family":"Nguyen","sequence":"first","affiliation":[{"name":"University of Colorado Boulder"}]},{"given":"Hoang","family":"Truong","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder"}]},{"given":"Mahesh","family":"Ravindranathan","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder"}]},{"given":"Anh","family":"Nguyen","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder"}]},{"given":"Richard","family":"Han","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder"}]},{"given":"Tam","family":"Vu","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder"}]}],"member":"320","published-online":{"date-parts":[[2018,2,28]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081354"},{"key":"e_1_2_1_2_1","unstructured":"CNN. \"Dubai deploys a 'drone hunter' to keep its airport open.\" https:\/\/goo.gl\/iXJMu3 2017. CNN. \"Dubai deploys a 'drone hunter' to keep its airport open.\" https:\/\/goo.gl\/iXJMu3 2017."},{"key":"e_1_2_1_3_1","volume-title":"Jan. 26, 2015.","author":"Jansen B.","unstructured":"B. Jansen . \" Drone crash at White House reveals security risks.\" USA Today , Jan. 26, 2015. B. Jansen. \"Drone crash at White House reveals security risks.\" USA Today, Jan. 26, 2015."},{"key":"e_1_2_1_4_1","volume-title":"LA Times","author":"McGreevy P.","year":"2015","unstructured":"P. McGreevy , \"Private drones are putting firefighters in 'immediate danger',\" California fire official says . LA Times , Aug. 18, 2015 . P. McGreevy, \"Private drones are putting firefighters in 'immediate danger',\" California fire official says. LA Times, Aug. 18, 2015."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2564408"},{"key":"e_1_2_1_6_1","volume-title":"US Army","author":"Schaaf R. Vander","year":"2014","unstructured":"R. Vander Schaaf . \"What technologies or integrating concepts are needed for the US military to counter future missile threats looking out to 2040?\" PhD thesis , US Army , 2014 . R. Vander Schaaf. \"What technologies or integrating concepts are needed for the US military to counter future missile threats looking out to 2040?\" PhD thesis, US Army, 2014."},{"key":"e_1_2_1_7_1","unstructured":"T. Humphreys \"Statement on the security threat posed by unmanned aerial systems and possible countermeasures \" Submitted to the Subcommittee on Oversight and Management Efficiency of the House Committee on Homeland Security 2015. T. Humphreys \"Statement on the security threat posed by unmanned aerial systems and possible countermeasures \" Submitted to the Subcommittee on Oversight and Management Efficiency of the House Committee on Homeland Security 2015."},{"key":"e_1_2_1_8_1","volume-title":"SPIE Electronic Imaging","author":"Pleban J.-S.","year":"2014","unstructured":"J.-S. Pleban Hacking and securing the AR Drone 2.0 quadcopter: investigations for improving the security of a toy . SPIE Electronic Imaging , 2014 . J.-S. Pleban et al. Hacking and securing the AR Drone 2.0 quadcopter: investigations for improving the security of a toy. SPIE Electronic Imaging, 2014."},{"key":"e_1_2_1_9_1","volume-title":"Nov. 07, 2017.","author":"Dutch BBC.","unstructured":"BBC. \" Dutch police fight drones with eagles.\" https:\/\/goo.gl\/PnJCcd , Nov. 07, 2017. BBC. \"Dutch police fight drones with eagles.\" https:\/\/goo.gl\/PnJCcd, Nov. 07, 2017."},{"key":"e_1_2_1_10_1","volume-title":"LA Times","author":"Masunaga Samantha","year":"2017","unstructured":"Samantha Masunaga . \"To keep drones out of high-risk areas, companies try hijacking them and shooting them down.\" https:\/\/goo.gl\/MqDag5 , LA Times , Nov. 07, 2017 . Samantha Masunaga. \"To keep drones out of high-risk areas, companies try hijacking them and shooting them down.\" https:\/\/goo.gl\/MqDag5, LA Times, Nov. 07, 2017."}],"container-title":["GetMobile: Mobile Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3191789.3191800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T18:43:42Z","timestamp":1672512222000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3191789.3191800"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,28]]},"references-count":10,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,2,28]]}},"alternative-id":["10.1145\/3191789.3191800"],"URL":"http:\/\/dx.doi.org\/10.1145\/3191789.3191800","relation":{},"ISSN":["2375-0529","2375-0537"],"issn-type":[{"value":"2375-0529","type":"print"},{"value":"2375-0537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,28]]},"assertion":[{"value":"2018-02-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}