A Study of the Data Security Attack and Defense Pattern in a Centralized UAV–Cloud Architecture Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.3390/drones7050289
An unmanned aerial vehicle (UAV) is an autonomous flying robot that has attracted the interest of several communities because of its capacity to increase the safety and productivity of labor. In terms of software engineering, UAV system development is extremely difficult because the focus is not only on functional requirement fulfillment, but also on nonfunctional requirements such as security and safety, which play a crucial role in mission success. Consequently, architecture robustness is very important, and one of the most common architectures developed is based on a centralized pattern in which all UAVs are controlled from a central location. Even though this is a very important problem, many developers must expend a great deal of effort to adapt and improve security. This is because there are few practical perspectives of security development in the context of UAV system development; therefore, the study of attack and defense patterns in centralized architecture is required to fill this knowledge gap. This paper concentrates on enhancing the security aspect of UAV system development by examining attack and defense patterns in centralized architectures. We contribute to the field by identifying 26 attack variations, presenting corresponding countermeasures from a software analyst’s standpoint, and supplying a node.js code template for developers to strengthen their systems’ security. Our comprehensive analysis evaluates the proposed defense strategies in terms of time and space complexity, ensuring their effectiveness. By providing a focused and in-depth perspective on security patterns, our research offers crucial guidance for communities and developers working on UAV-based systems, facilitating the development of more secure and robust solutions.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.3390/drones7050289
- https://www.mdpi.com/2504-446X/7/5/289/pdf?version=1682471565
- OA Status
- gold
- Cited By
- 17
- References
- 42
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4367052462
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4367052462Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.3390/drones7050289Digital Object Identifier
- Title
-
A Study of the Data Security Attack and Defense Pattern in a Centralized UAV–Cloud ArchitectureWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-04-25Full publication date if available
- Authors
-
Gregorius Airlangga, Alan LiuList of authors in order
- Landing page
-
https://doi.org/10.3390/drones7050289Publisher landing page
- PDF URL
-
https://www.mdpi.com/2504-446X/7/5/289/pdf?version=1682471565Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://www.mdpi.com/2504-446X/7/5/289/pdf?version=1682471565Direct OA link when available
- Concepts
-
Computer security, Computer science, Architecture, Attack surface, Context (archaeology), Cloud computing, Enterprise information security architecture, Robustness (evolution), Biochemistry, Paleontology, Art, Biology, Operating system, Visual arts, Chemistry, GeneTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
17Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 8, 2024: 8, 2023: 1Per-year citation counts (last 5 years)
- References (count)
-
42Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4367052462 |
|---|---|
| doi | https://doi.org/10.3390/drones7050289 |
| ids.doi | https://doi.org/10.3390/drones7050289 |
| ids.openalex | https://openalex.org/W4367052462 |
| fwci | 8.83915456 |
| type | article |
| title | A Study of the Data Security Attack and Defense Pattern in a Centralized UAV–Cloud Architecture |
| biblio.issue | 5 |
| biblio.volume | 7 |
| biblio.last_page | 289 |
| biblio.first_page | 289 |
| topics[0].id | https://openalex.org/T11133 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.9998000264167786 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2202 |
| topics[0].subfield.display_name | Aerospace Engineering |
| topics[0].display_name | UAV Applications and Optimization |
| topics[1].id | https://openalex.org/T10761 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.9970999956130981 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2208 |
| topics[1].subfield.display_name | Electrical and Electronic Engineering |
| topics[1].display_name | Vehicular Ad Hoc Networks (VANETs) |
| topics[2].id | https://openalex.org/T11896 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9782999753952026 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Opportunistic and Delay-Tolerant Networks |
| is_xpac | False |
| apc_list.value | 2000 |
| apc_list.currency | CHF |
| apc_list.value_usd | 2165 |
| apc_paid.value | 2000 |
| apc_paid.currency | CHF |
| apc_paid.value_usd | 2165 |
| concepts[0].id | https://openalex.org/C38652104 |
| concepts[0].level | 1 |
| concepts[0].score | 0.6497416496276855 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[0].display_name | Computer security |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.5534690022468567 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C123657996 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5383011698722839 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q12271 |
| concepts[2].display_name | Architecture |
| concepts[3].id | https://openalex.org/C2776576444 |
| concepts[3].level | 2 |
| concepts[3].score | 0.4896836578845978 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q303569 |
| concepts[3].display_name | Attack surface |
| concepts[4].id | https://openalex.org/C2779343474 |
| concepts[4].level | 2 |
| concepts[4].score | 0.42482975125312805 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3109175 |
| concepts[4].display_name | Context (archaeology) |
| concepts[5].id | https://openalex.org/C79974875 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4239528775215149 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[5].display_name | Cloud computing |
| concepts[6].id | https://openalex.org/C31139447 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4184374213218689 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q5380386 |
| concepts[6].display_name | Enterprise information security architecture |
| concepts[7].id | https://openalex.org/C63479239 |
| concepts[7].level | 3 |
| concepts[7].score | 0.4110686182975769 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q7353546 |
| concepts[7].display_name | Robustness (evolution) |
| concepts[8].id | https://openalex.org/C55493867 |
| concepts[8].level | 1 |
| concepts[8].score | 0.0 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q7094 |
| concepts[8].display_name | Biochemistry |
| concepts[9].id | https://openalex.org/C151730666 |
| concepts[9].level | 1 |
| concepts[9].score | 0.0 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q7205 |
| concepts[9].display_name | Paleontology |
| concepts[10].id | https://openalex.org/C142362112 |
| concepts[10].level | 0 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q735 |
| concepts[10].display_name | Art |
| concepts[11].id | https://openalex.org/C86803240 |
| concepts[11].level | 0 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q420 |
| concepts[11].display_name | Biology |
| concepts[12].id | https://openalex.org/C111919701 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[12].display_name | Operating system |
| concepts[13].id | https://openalex.org/C153349607 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q36649 |
| concepts[13].display_name | Visual arts |
| concepts[14].id | https://openalex.org/C185592680 |
| concepts[14].level | 0 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q2329 |
| concepts[14].display_name | Chemistry |
| concepts[15].id | https://openalex.org/C104317684 |
| concepts[15].level | 2 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q7187 |
| concepts[15].display_name | Gene |
| keywords[0].id | https://openalex.org/keywords/computer-security |
| keywords[0].score | 0.6497416496276855 |
| keywords[0].display_name | Computer security |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.5534690022468567 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/architecture |
| keywords[2].score | 0.5383011698722839 |
| keywords[2].display_name | Architecture |
| keywords[3].id | https://openalex.org/keywords/attack-surface |
| keywords[3].score | 0.4896836578845978 |
| keywords[3].display_name | Attack surface |
| keywords[4].id | https://openalex.org/keywords/context |
| keywords[4].score | 0.42482975125312805 |
| keywords[4].display_name | Context (archaeology) |
| keywords[5].id | https://openalex.org/keywords/cloud-computing |
| keywords[5].score | 0.4239528775215149 |
| keywords[5].display_name | Cloud computing |
| keywords[6].id | https://openalex.org/keywords/enterprise-information-security-architecture |
| keywords[6].score | 0.4184374213218689 |
| keywords[6].display_name | Enterprise information security architecture |
| keywords[7].id | https://openalex.org/keywords/robustness |
| keywords[7].score | 0.4110686182975769 |
| keywords[7].display_name | Robustness (evolution) |
| language | en |
| locations[0].id | doi:10.3390/drones7050289 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210193350 |
| locations[0].source.issn | 2504-446X |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2504-446X |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Drones |
| locations[0].source.host_organization | https://openalex.org/P4310310987 |
| locations[0].source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310310987 |
| locations[0].source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://www.mdpi.com/2504-446X/7/5/289/pdf?version=1682471565 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Drones |
| locations[0].landing_page_url | https://doi.org/10.3390/drones7050289 |
| locations[1].id | pmh:oai:doaj.org/article:886ae8f85f864f298f556acce48dba24 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Drones, Vol 7, Iss 5, p 289 (2023) |
| locations[1].landing_page_url | https://doaj.org/article/886ae8f85f864f298f556acce48dba24 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5032437973 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-8162-6942 |
| authorships[0].author.display_name | Gregorius Airlangga |
| authorships[0].countries | ID, TW |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I148099254 |
| authorships[0].affiliations[0].raw_affiliation_string | Electrical Engineering Department, National Chung Cheng University, Chiayi 621301, Taiwan |
| authorships[0].affiliations[1].institution_ids | https://openalex.org/I161010349 |
| authorships[0].affiliations[1].raw_affiliation_string | Information System Department, Atma Jaya Catholic University of Indonesia, Jakarta 12930, Indonesia |
| authorships[0].institutions[0].id | https://openalex.org/I161010349 |
| authorships[0].institutions[0].ror | https://ror.org/02hd2zk59 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I161010349 |
| authorships[0].institutions[0].country_code | ID |
| authorships[0].institutions[0].display_name | Atma Jaya Catholic University of Indonesia |
| authorships[0].institutions[1].id | https://openalex.org/I148099254 |
| authorships[0].institutions[1].ror | https://ror.org/0028v3876 |
| authorships[0].institutions[1].type | education |
| authorships[0].institutions[1].lineage | https://openalex.org/I148099254 |
| authorships[0].institutions[1].country_code | TW |
| authorships[0].institutions[1].display_name | National Chung Cheng University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Gregorius Airlangga |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | Electrical Engineering Department, National Chung Cheng University, Chiayi 621301, Taiwan, Information System Department, Atma Jaya Catholic University of Indonesia, Jakarta 12930, Indonesia |
| authorships[1].author.id | https://openalex.org/A5101726185 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-8884-6662 |
| authorships[1].author.display_name | Alan Liu |
| authorships[1].countries | TW |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I148099254 |
| authorships[1].affiliations[0].raw_affiliation_string | Electrical Engineering Department, National Chung Cheng University, Chiayi 621301, Taiwan |
| authorships[1].institutions[0].id | https://openalex.org/I148099254 |
| authorships[1].institutions[0].ror | https://ror.org/0028v3876 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I148099254 |
| authorships[1].institutions[0].country_code | TW |
| authorships[1].institutions[0].display_name | National Chung Cheng University |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Alan Liu |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Electrical Engineering Department, National Chung Cheng University, Chiayi 621301, Taiwan |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.mdpi.com/2504-446X/7/5/289/pdf?version=1682471565 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2023-04-27T00:00:00 |
| display_name | A Study of the Data Security Attack and Defense Pattern in a Centralized UAV–Cloud Architecture |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11133 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.9998000264167786 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2202 |
| primary_topic.subfield.display_name | Aerospace Engineering |
| primary_topic.display_name | UAV Applications and Optimization |
| related_works | https://openalex.org/W2383532021, https://openalex.org/W1999930627, https://openalex.org/W4385451301, https://openalex.org/W4382046111, https://openalex.org/W2805919076, https://openalex.org/W1967490545, https://openalex.org/W2115798421, https://openalex.org/W2408371061, https://openalex.org/W4313017920, https://openalex.org/W3088214400 |
| cited_by_count | 17 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 8 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 8 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 1 |
| locations_count | 2 |
| best_oa_location.id | doi:10.3390/drones7050289 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210193350 |
| best_oa_location.source.issn | 2504-446X |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2504-446X |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Drones |
| best_oa_location.source.host_organization | https://openalex.org/P4310310987 |
| best_oa_location.source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310310987 |
| best_oa_location.source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://www.mdpi.com/2504-446X/7/5/289/pdf?version=1682471565 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Drones |
| best_oa_location.landing_page_url | https://doi.org/10.3390/drones7050289 |
| primary_location.id | doi:10.3390/drones7050289 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210193350 |
| primary_location.source.issn | 2504-446X |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2504-446X |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Drones |
| primary_location.source.host_organization | https://openalex.org/P4310310987 |
| primary_location.source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310310987 |
| primary_location.source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://www.mdpi.com/2504-446X/7/5/289/pdf?version=1682471565 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Drones |
| primary_location.landing_page_url | https://doi.org/10.3390/drones7050289 |
| publication_date | 2023-04-25 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W6848893552, https://openalex.org/W3202150210, https://openalex.org/W4321793432, https://openalex.org/W4292553941, https://openalex.org/W3216828524, https://openalex.org/W4312709822, https://openalex.org/W3194291390, https://openalex.org/W3046891400, https://openalex.org/W4213186951, https://openalex.org/W4312980360, https://openalex.org/W1982610171, https://openalex.org/W2070449754, https://openalex.org/W2566527471, https://openalex.org/W2782556342, https://openalex.org/W4285105424, https://openalex.org/W4285158048, https://openalex.org/W3016114765, https://openalex.org/W4309997747, https://openalex.org/W2809951568, https://openalex.org/W3127006156, https://openalex.org/W2967937886, https://openalex.org/W2931877192, https://openalex.org/W2936762562, https://openalex.org/W4207085178, https://openalex.org/W4318148621, https://openalex.org/W4313546833, https://openalex.org/W4283211571, https://openalex.org/W4285210647, https://openalex.org/W4206842350, https://openalex.org/W3157894430, https://openalex.org/W3131722576, https://openalex.org/W2999139319, https://openalex.org/W4286567167, https://openalex.org/W3045874251, https://openalex.org/W4320031213, https://openalex.org/W4281289204, https://openalex.org/W2995551693, https://openalex.org/W4285404531, https://openalex.org/W4296311621, https://openalex.org/W3119756647, https://openalex.org/W4316506832, https://openalex.org/W3195539663 |
| referenced_works_count | 42 |
| abstract_inverted_index.a | 63, 86, 96, 103, 111, 192, 198, 229 |
| abstract_inverted_index.26 | 185 |
| abstract_inverted_index.An | 0 |
| abstract_inverted_index.By | 227 |
| abstract_inverted_index.In | 30 |
| abstract_inverted_index.We | 178 |
| abstract_inverted_index.an | 6 |
| abstract_inverted_index.as | 57 |
| abstract_inverted_index.by | 169, 183 |
| abstract_inverted_index.in | 66, 89, 132, 147, 175, 217 |
| abstract_inverted_index.is | 5, 38, 44, 72, 83, 102, 122, 150 |
| abstract_inverted_index.of | 15, 19, 28, 32, 77, 114, 129, 135, 142, 165, 219, 253 |
| abstract_inverted_index.on | 47, 53, 85, 160, 234, 247 |
| abstract_inverted_index.to | 22, 116, 152, 180, 204 |
| abstract_inverted_index.Our | 209 |
| abstract_inverted_index.UAV | 35, 136, 166 |
| abstract_inverted_index.all | 91 |
| abstract_inverted_index.and | 26, 59, 75, 118, 144, 172, 196, 221, 231, 244, 256 |
| abstract_inverted_index.are | 93, 125 |
| abstract_inverted_index.but | 51 |
| abstract_inverted_index.few | 126 |
| abstract_inverted_index.for | 202, 242 |
| abstract_inverted_index.has | 11 |
| abstract_inverted_index.its | 20 |
| abstract_inverted_index.not | 45 |
| abstract_inverted_index.one | 76 |
| abstract_inverted_index.our | 237 |
| abstract_inverted_index.the | 13, 24, 42, 78, 133, 140, 162, 181, 213, 251 |
| abstract_inverted_index.Even | 99 |
| abstract_inverted_index.This | 121, 157 |
| abstract_inverted_index.UAVs | 92 |
| abstract_inverted_index.also | 52 |
| abstract_inverted_index.code | 200 |
| abstract_inverted_index.deal | 113 |
| abstract_inverted_index.fill | 153 |
| abstract_inverted_index.from | 95, 191 |
| abstract_inverted_index.gap. | 156 |
| abstract_inverted_index.many | 107 |
| abstract_inverted_index.more | 254 |
| abstract_inverted_index.most | 79 |
| abstract_inverted_index.must | 109 |
| abstract_inverted_index.only | 46 |
| abstract_inverted_index.play | 62 |
| abstract_inverted_index.role | 65 |
| abstract_inverted_index.such | 56 |
| abstract_inverted_index.that | 10 |
| abstract_inverted_index.this | 101, 154 |
| abstract_inverted_index.time | 220 |
| abstract_inverted_index.very | 73, 104 |
| abstract_inverted_index.(UAV) | 4 |
| abstract_inverted_index.adapt | 117 |
| abstract_inverted_index.based | 84 |
| abstract_inverted_index.field | 182 |
| abstract_inverted_index.focus | 43 |
| abstract_inverted_index.great | 112 |
| abstract_inverted_index.paper | 158 |
| abstract_inverted_index.robot | 9 |
| abstract_inverted_index.space | 222 |
| abstract_inverted_index.study | 141 |
| abstract_inverted_index.terms | 31, 218 |
| abstract_inverted_index.their | 206, 225 |
| abstract_inverted_index.there | 124 |
| abstract_inverted_index.which | 61, 90 |
| abstract_inverted_index.aerial | 2 |
| abstract_inverted_index.aspect | 164 |
| abstract_inverted_index.attack | 143, 171, 186 |
| abstract_inverted_index.common | 80 |
| abstract_inverted_index.effort | 115 |
| abstract_inverted_index.expend | 110 |
| abstract_inverted_index.flying | 8 |
| abstract_inverted_index.labor. | 29 |
| abstract_inverted_index.offers | 239 |
| abstract_inverted_index.robust | 257 |
| abstract_inverted_index.safety | 25 |
| abstract_inverted_index.secure | 255 |
| abstract_inverted_index.system | 36, 137, 167 |
| abstract_inverted_index.though | 100 |
| abstract_inverted_index.because | 18, 41, 123 |
| abstract_inverted_index.central | 97 |
| abstract_inverted_index.context | 134 |
| abstract_inverted_index.crucial | 64, 240 |
| abstract_inverted_index.defense | 145, 173, 215 |
| abstract_inverted_index.focused | 230 |
| abstract_inverted_index.improve | 119 |
| abstract_inverted_index.mission | 67 |
| abstract_inverted_index.node.js | 199 |
| abstract_inverted_index.pattern | 88 |
| abstract_inverted_index.safety, | 60 |
| abstract_inverted_index.several | 16 |
| abstract_inverted_index.vehicle | 3 |
| abstract_inverted_index.working | 246 |
| abstract_inverted_index.analysis | 211 |
| abstract_inverted_index.capacity | 21 |
| abstract_inverted_index.ensuring | 224 |
| abstract_inverted_index.guidance | 241 |
| abstract_inverted_index.in-depth | 232 |
| abstract_inverted_index.increase | 23 |
| abstract_inverted_index.interest | 14 |
| abstract_inverted_index.patterns | 146, 174 |
| abstract_inverted_index.problem, | 106 |
| abstract_inverted_index.proposed | 214 |
| abstract_inverted_index.required | 151 |
| abstract_inverted_index.research | 238 |
| abstract_inverted_index.security | 58, 130, 163, 235 |
| abstract_inverted_index.software | 33, 193 |
| abstract_inverted_index.success. | 68 |
| abstract_inverted_index.systems, | 249 |
| abstract_inverted_index.template | 201 |
| abstract_inverted_index.unmanned | 1 |
| abstract_inverted_index.UAV-based | 248 |
| abstract_inverted_index.attracted | 12 |
| abstract_inverted_index.developed | 82 |
| abstract_inverted_index.difficult | 40 |
| abstract_inverted_index.enhancing | 161 |
| abstract_inverted_index.evaluates | 212 |
| abstract_inverted_index.examining | 170 |
| abstract_inverted_index.extremely | 39 |
| abstract_inverted_index.important | 105 |
| abstract_inverted_index.knowledge | 155 |
| abstract_inverted_index.location. | 98 |
| abstract_inverted_index.patterns, | 236 |
| abstract_inverted_index.practical | 127 |
| abstract_inverted_index.providing | 228 |
| abstract_inverted_index.security. | 120, 208 |
| abstract_inverted_index.supplying | 197 |
| abstract_inverted_index.autonomous | 7 |
| abstract_inverted_index.contribute | 179 |
| abstract_inverted_index.controlled | 94 |
| abstract_inverted_index.developers | 108, 203, 245 |
| abstract_inverted_index.functional | 48 |
| abstract_inverted_index.important, | 74 |
| abstract_inverted_index.presenting | 188 |
| abstract_inverted_index.robustness | 71 |
| abstract_inverted_index.solutions. | 258 |
| abstract_inverted_index.strategies | 216 |
| abstract_inverted_index.strengthen | 205 |
| abstract_inverted_index.systems’ | 207 |
| abstract_inverted_index.therefore, | 139 |
| abstract_inverted_index.analyst’s | 194 |
| abstract_inverted_index.centralized | 87, 148, 176 |
| abstract_inverted_index.communities | 17, 243 |
| abstract_inverted_index.complexity, | 223 |
| abstract_inverted_index.development | 37, 131, 168, 252 |
| abstract_inverted_index.identifying | 184 |
| abstract_inverted_index.perspective | 233 |
| abstract_inverted_index.requirement | 49 |
| abstract_inverted_index.standpoint, | 195 |
| abstract_inverted_index.variations, | 187 |
| abstract_inverted_index.architecture | 70, 149 |
| abstract_inverted_index.concentrates | 159 |
| abstract_inverted_index.development; | 138 |
| abstract_inverted_index.engineering, | 34 |
| abstract_inverted_index.facilitating | 250 |
| abstract_inverted_index.fulfillment, | 50 |
| abstract_inverted_index.perspectives | 128 |
| abstract_inverted_index.productivity | 27 |
| abstract_inverted_index.requirements | 55 |
| abstract_inverted_index.Consequently, | 69 |
| abstract_inverted_index.architectures | 81 |
| abstract_inverted_index.comprehensive | 210 |
| abstract_inverted_index.corresponding | 189 |
| abstract_inverted_index.nonfunctional | 54 |
| abstract_inverted_index.architectures. | 177 |
| abstract_inverted_index.effectiveness. | 226 |
| abstract_inverted_index.countermeasures | 190 |
| cited_by_percentile_year.max | 99 |
| cited_by_percentile_year.min | 89 |
| corresponding_author_ids | https://openalex.org/A5032437973 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 2 |
| corresponding_institution_ids | https://openalex.org/I148099254, https://openalex.org/I161010349 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/8 |
| sustainable_development_goals[0].score | 0.6899999976158142 |
| sustainable_development_goals[0].display_name | Decent work and economic growth |
| citation_normalized_percentile.value | 0.97364906 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |