UAV-NIDD: A Dynamic Dataset for Cybersecurity and Intrusion Detection in UAV Networks Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1109/tnse.2025.3553442
Unmanned Aerial Vehicles (UAVs) are necessary for numerous tasks but are vulnerable to cyber threats due to their widespread use and connectivity. The lack of a comprehensive dataset necessitates the development of effective detection and mitigation solutions. Our work introduces UAV-NIDD, a new dataset that addresses the gaps in understanding and countering both cyber and physical threats in UAV networks. It includes three distinct attack scenarios: compromised UAV initiating a network-wide attack, access point compromised network-wide intrusion, and compromised Ground Control Station (GCS) establishing a network-wide attack. We develop a real-time testbed for creating UAV-NIDD (Unmanned Aerial Vehicles-Network Intrusion Detection Dataset), incorporating UAV devices, data collection tools, and controllers. Our testbed facilitates cyberattack execution and data gathering under normal and attack conditions. Our dataset covers various cyber-attacks like Scanning, Reconnaissance, DoS, DDoS, GPS Jamming & Spoofing, MITM, Replay, Evil Twin, Brute-Force, and Fake Landing packet attacks. Additionally, UAV-NIDD presents a valuable resource for AI and ML solutions, strengthening UAV networks against evolving cyber threats. Moreover, we offer open access and cooperative innovation in terms of long-term updating of dataset.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1109/tnse.2025.3553442
- OA Status
- green
- Cited By
- 3
- References
- 27
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4408790769
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4408790769Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/tnse.2025.3553442Digital Object Identifier
- Title
-
UAV-NIDD: A Dynamic Dataset for Cybersecurity and Intrusion Detection in UAV NetworksWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-03-24Full publication date if available
- Authors
-
Hassan Jalil Hadi, Yue Cao, Muhammad Khurram Khan, Naveed Ahmad, Yulin Hu, Chaowei FuList of authors in order
- Landing page
-
https://doi.org/10.1109/tnse.2025.3553442Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1109/TNSE.2025.3553442Direct OA link when available
- Concepts
-
Computer science, Intrusion detection system, Computer security, Intrusion, Malware, Intrusion prevention system, Real-time computing, Geology, GeochemistryTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
3Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 3Per-year citation counts (last 5 years)
- References (count)
-
27Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4408790769 |
|---|---|
| doi | https://doi.org/10.1109/tnse.2025.3553442 |
| ids.doi | https://doi.org/10.1109/tnse.2025.3553442 |
| ids.openalex | https://openalex.org/W4408790769 |
| fwci | 15.49507221 |
| type | article |
| title | UAV-NIDD: A Dynamic Dataset for Cybersecurity and Intrusion Detection in UAV Networks |
| awards[0].id | https://openalex.org/G3442647037 |
| awards[0].funder_id | https://openalex.org/F4320321145 |
| awards[0].display_name | |
| awards[0].funder_award_id | RSP2025R12 |
| awards[0].funder_display_name | King Saud University |
| biblio.issue | 4 |
| biblio.volume | 12 |
| biblio.last_page | 2757 |
| biblio.first_page | 2739 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9983000159263611 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11512 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9865999817848206 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Anomaly Detection Techniques and Applications |
| topics[2].id | https://openalex.org/T11133 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.9664000272750854 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2202 |
| topics[2].subfield.display_name | Aerospace Engineering |
| topics[2].display_name | UAV Applications and Optimization |
| funders[0].id | https://openalex.org/F4320321145 |
| funders[0].ror | https://ror.org/02f81g417 |
| funders[0].display_name | King Saud University |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.6537126302719116 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C35525427 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6536979079246521 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[1].display_name | Intrusion detection system |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.6276010870933533 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| concepts[3].id | https://openalex.org/C158251709 |
| concepts[3].level | 2 |
| concepts[3].score | 0.49410131573677063 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q354025 |
| concepts[3].display_name | Intrusion |
| concepts[4].id | https://openalex.org/C541664917 |
| concepts[4].level | 2 |
| concepts[4].score | 0.441795289516449 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q14001 |
| concepts[4].display_name | Malware |
| concepts[5].id | https://openalex.org/C27061796 |
| concepts[5].level | 3 |
| concepts[5].score | 0.4321771264076233 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[5].display_name | Intrusion prevention system |
| concepts[6].id | https://openalex.org/C79403827 |
| concepts[6].level | 1 |
| concepts[6].score | 0.32721132040023804 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3988 |
| concepts[6].display_name | Real-time computing |
| concepts[7].id | https://openalex.org/C127313418 |
| concepts[7].level | 0 |
| concepts[7].score | 0.06450149416923523 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q1069 |
| concepts[7].display_name | Geology |
| concepts[8].id | https://openalex.org/C17409809 |
| concepts[8].level | 1 |
| concepts[8].score | 0.0 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q161764 |
| concepts[8].display_name | Geochemistry |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.6537126302719116 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[1].score | 0.6536979079246521 |
| keywords[1].display_name | Intrusion detection system |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.6276010870933533 |
| keywords[2].display_name | Computer security |
| keywords[3].id | https://openalex.org/keywords/intrusion |
| keywords[3].score | 0.49410131573677063 |
| keywords[3].display_name | Intrusion |
| keywords[4].id | https://openalex.org/keywords/malware |
| keywords[4].score | 0.441795289516449 |
| keywords[4].display_name | Malware |
| keywords[5].id | https://openalex.org/keywords/intrusion-prevention-system |
| keywords[5].score | 0.4321771264076233 |
| keywords[5].display_name | Intrusion prevention system |
| keywords[6].id | https://openalex.org/keywords/real-time-computing |
| keywords[6].score | 0.32721132040023804 |
| keywords[6].display_name | Real-time computing |
| keywords[7].id | https://openalex.org/keywords/geology |
| keywords[7].score | 0.06450149416923523 |
| keywords[7].display_name | Geology |
| language | en |
| locations[0].id | doi:10.1109/tnse.2025.3553442 |
| locations[0].is_oa | False |
| locations[0].source.id | https://openalex.org/S2484352698 |
| locations[0].source.issn | 2327-4697, 2334-329X |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2327-4697 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | IEEE Transactions on Network Science and Engineering |
| locations[0].source.host_organization | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_name | Institute of Electrical and Electronics Engineers |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | IEEE Transactions on Network Science and Engineering |
| locations[0].landing_page_url | https://doi.org/10.1109/tnse.2025.3553442 |
| locations[1].id | pmh:oai:zenodo.org:15125851 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400562 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| locations[1].source.host_organization | https://openalex.org/I67311998 |
| locations[1].source.host_organization_name | European Organization for Nuclear Research |
| locations[1].source.host_organization_lineage | https://openalex.org/I67311998 |
| locations[1].license | cc-by |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | info:eu-repo/semantics/other |
| locations[1].license_id | https://openalex.org/licenses/cc-by |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | UAV-NIDD: A Dynamic Dataset for Cybersecurity and Intrusion Detection in UAV Networks, (2025-04-02) |
| locations[1].landing_page_url | https://doi.org/10.1109/TNSE.2025.3553442 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5047974993 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-7746-344X |
| authorships[0].author.display_name | Hassan Jalil Hadi |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I37461747 |
| authorships[0].affiliations[0].raw_affiliation_string | Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China |
| authorships[0].institutions[0].id | https://openalex.org/I37461747 |
| authorships[0].institutions[0].ror | https://ror.org/033vjfk17 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I37461747 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Wuhan University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Hassan Jalil Hadi |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China |
| authorships[1].author.id | https://openalex.org/A5006794082 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-2098-7637 |
| authorships[1].author.display_name | Yue Cao |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I37461747 |
| authorships[1].affiliations[0].raw_affiliation_string | Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China |
| authorships[1].institutions[0].id | https://openalex.org/I37461747 |
| authorships[1].institutions[0].ror | https://ror.org/033vjfk17 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I37461747 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Wuhan University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Yue Cao |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China |
| authorships[2].author.id | https://openalex.org/A5072011650 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-6636-0533 |
| authorships[2].author.display_name | Muhammad Khurram Khan |
| authorships[2].countries | SA |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I28022161 |
| authorships[2].affiliations[0].raw_affiliation_string | Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia |
| authorships[2].institutions[0].id | https://openalex.org/I28022161 |
| authorships[2].institutions[0].ror | https://ror.org/02f81g417 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I28022161 |
| authorships[2].institutions[0].country_code | SA |
| authorships[2].institutions[0].display_name | King Saud University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Muhammad Khurram Khan |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia |
| authorships[3].author.id | https://openalex.org/A5114334561 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-6920-8246 |
| authorships[3].author.display_name | Naveed Ahmad |
| authorships[3].countries | SA |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I142024983 |
| authorships[3].affiliations[0].raw_affiliation_string | College of Computer and Information Science, Prince Sultan University, Riyadh, Saudi Arabia |
| authorships[3].institutions[0].id | https://openalex.org/I142024983 |
| authorships[3].institutions[0].ror | https://ror.org/053mqrf26 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I142024983 |
| authorships[3].institutions[0].country_code | SA |
| authorships[3].institutions[0].display_name | Prince Sultan University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Naveed Ahmad |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | College of Computer and Information Science, Prince Sultan University, Riyadh, Saudi Arabia |
| authorships[4].author.id | https://openalex.org/A5068547451 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-1047-9436 |
| authorships[4].author.display_name | Yulin Hu |
| authorships[4].countries | CN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I37461747 |
| authorships[4].affiliations[0].raw_affiliation_string | School of Electronic Information, Wuhan University, China |
| authorships[4].institutions[0].id | https://openalex.org/I37461747 |
| authorships[4].institutions[0].ror | https://ror.org/033vjfk17 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I37461747 |
| authorships[4].institutions[0].country_code | CN |
| authorships[4].institutions[0].display_name | Wuhan University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Yulin Hu |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | School of Electronic Information, Wuhan University, China |
| authorships[5].author.id | https://openalex.org/A5020501836 |
| authorships[5].author.orcid | https://orcid.org/0000-0003-0966-8552 |
| authorships[5].author.display_name | Chaowei Fu |
| authorships[5].countries | CN |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I180662265 |
| authorships[5].affiliations[0].raw_affiliation_string | China Mobile (Shanghai) Information and Communication Technology Co., LtdChina, China |
| authorships[5].institutions[0].id | https://openalex.org/I180662265 |
| authorships[5].institutions[0].ror | https://ror.org/05gftfe97 |
| authorships[5].institutions[0].type | company |
| authorships[5].institutions[0].lineage | https://openalex.org/I180662265 |
| authorships[5].institutions[0].country_code | CN |
| authorships[5].institutions[0].display_name | China Mobile (China) |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Chao Fu |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | China Mobile (Shanghai) Information and Communication Technology Co., LtdChina, China |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1109/TNSE.2025.3553442 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | UAV-NIDD: A Dynamic Dataset for Cybersecurity and Intrusion Detection in UAV Networks |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9983000159263611 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2392603527, https://openalex.org/W2390009783, https://openalex.org/W2348767155, https://openalex.org/W2388497169, https://openalex.org/W3120393658, https://openalex.org/W4283700121, https://openalex.org/W1496376327, https://openalex.org/W2357468538, https://openalex.org/W1513478798, https://openalex.org/W2133389611 |
| cited_by_count | 3 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 3 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:zenodo.org:15125851 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400562 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| best_oa_location.source.host_organization | https://openalex.org/I67311998 |
| best_oa_location.source.host_organization_name | European Organization for Nuclear Research |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | info:eu-repo/semantics/other |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | UAV-NIDD: A Dynamic Dataset for Cybersecurity and Intrusion Detection in UAV Networks, (2025-04-02) |
| best_oa_location.landing_page_url | https://doi.org/10.1109/TNSE.2025.3553442 |
| primary_location.id | doi:10.1109/tnse.2025.3553442 |
| primary_location.is_oa | False |
| primary_location.source.id | https://openalex.org/S2484352698 |
| primary_location.source.issn | 2327-4697, 2334-329X |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2327-4697 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | IEEE Transactions on Network Science and Engineering |
| primary_location.source.host_organization | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | IEEE Transactions on Network Science and Engineering |
| primary_location.landing_page_url | https://doi.org/10.1109/tnse.2025.3553442 |
| publication_date | 2025-03-24 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4321793432, https://openalex.org/W4403599283, https://openalex.org/W4312576847, https://openalex.org/W4392719484, https://openalex.org/W4386320403, https://openalex.org/W4226217351, https://openalex.org/W4401878927, https://openalex.org/W4396920681, https://openalex.org/W4399851502, https://openalex.org/W3205985117, https://openalex.org/W1952056635, https://openalex.org/W2789828921, https://openalex.org/W6847209443, https://openalex.org/W2296509296, https://openalex.org/W4361010174, https://openalex.org/W3022604549, https://openalex.org/W3179240416, https://openalex.org/W3096448935, https://openalex.org/W6964071089, https://openalex.org/W4392254950, https://openalex.org/W3008603700, https://openalex.org/W3127172626, https://openalex.org/W3088058100, https://openalex.org/W3133786451, https://openalex.org/W7066667914, https://openalex.org/W2791315675, https://openalex.org/W4390044127 |
| referenced_works_count | 27 |
| abstract_inverted_index.a | 25, 41, 69, 84, 89, 149 |
| abstract_inverted_index.AI | 153 |
| abstract_inverted_index.It | 60 |
| abstract_inverted_index.ML | 155 |
| abstract_inverted_index.We | 87 |
| abstract_inverted_index.in | 48, 57, 172 |
| abstract_inverted_index.of | 24, 31, 174, 177 |
| abstract_inverted_index.to | 12, 16 |
| abstract_inverted_index.we | 165 |
| abstract_inverted_index.GPS | 132 |
| abstract_inverted_index.Our | 37, 109, 122 |
| abstract_inverted_index.The | 22 |
| abstract_inverted_index.UAV | 58, 67, 102, 158 |
| abstract_inverted_index.and | 20, 34, 50, 54, 77, 107, 114, 119, 141, 154, 169 |
| abstract_inverted_index.are | 4, 10 |
| abstract_inverted_index.but | 9 |
| abstract_inverted_index.due | 15 |
| abstract_inverted_index.for | 6, 92, 152 |
| abstract_inverted_index.new | 42 |
| abstract_inverted_index.the | 29, 46 |
| abstract_inverted_index.use | 19 |
| abstract_inverted_index.DoS, | 130 |
| abstract_inverted_index.Evil | 138 |
| abstract_inverted_index.Fake | 142 |
| abstract_inverted_index.both | 52 |
| abstract_inverted_index.data | 104, 115 |
| abstract_inverted_index.gaps | 47 |
| abstract_inverted_index.lack | 23 |
| abstract_inverted_index.like | 127 |
| abstract_inverted_index.open | 167 |
| abstract_inverted_index.that | 44 |
| abstract_inverted_index.work | 38 |
| abstract_inverted_index.& | 134 |
| abstract_inverted_index.(GCS) | 82 |
| abstract_inverted_index.DDoS, | 131 |
| abstract_inverted_index.MITM, | 136 |
| abstract_inverted_index.Twin, | 139 |
| abstract_inverted_index.cyber | 13, 53, 162 |
| abstract_inverted_index.offer | 166 |
| abstract_inverted_index.point | 73 |
| abstract_inverted_index.tasks | 8 |
| abstract_inverted_index.terms | 173 |
| abstract_inverted_index.their | 17 |
| abstract_inverted_index.three | 62 |
| abstract_inverted_index.under | 117 |
| abstract_inverted_index.(UAVs) | 3 |
| abstract_inverted_index.Aerial | 1, 96 |
| abstract_inverted_index.Ground | 79 |
| abstract_inverted_index.access | 72, 168 |
| abstract_inverted_index.attack | 64, 120 |
| abstract_inverted_index.covers | 124 |
| abstract_inverted_index.normal | 118 |
| abstract_inverted_index.packet | 144 |
| abstract_inverted_index.tools, | 106 |
| abstract_inverted_index.Control | 80 |
| abstract_inverted_index.Jamming | 133 |
| abstract_inverted_index.Landing | 143 |
| abstract_inverted_index.Replay, | 137 |
| abstract_inverted_index.Station | 81 |
| abstract_inverted_index.against | 160 |
| abstract_inverted_index.attack, | 71 |
| abstract_inverted_index.attack. | 86 |
| abstract_inverted_index.dataset | 27, 43, 123 |
| abstract_inverted_index.develop | 88 |
| abstract_inverted_index.testbed | 91, 110 |
| abstract_inverted_index.threats | 14, 56 |
| abstract_inverted_index.various | 125 |
| abstract_inverted_index.UAV-NIDD | 94, 147 |
| abstract_inverted_index.Vehicles | 2 |
| abstract_inverted_index.attacks. | 145 |
| abstract_inverted_index.creating | 93 |
| abstract_inverted_index.devices, | 103 |
| abstract_inverted_index.distinct | 63 |
| abstract_inverted_index.evolving | 161 |
| abstract_inverted_index.includes | 61 |
| abstract_inverted_index.networks | 159 |
| abstract_inverted_index.numerous | 7 |
| abstract_inverted_index.physical | 55 |
| abstract_inverted_index.presents | 148 |
| abstract_inverted_index.resource | 151 |
| abstract_inverted_index.threats. | 163 |
| abstract_inverted_index.updating | 176 |
| abstract_inverted_index.valuable | 150 |
| abstract_inverted_index.(Unmanned | 95 |
| abstract_inverted_index.Dataset), | 100 |
| abstract_inverted_index.Detection | 99 |
| abstract_inverted_index.Intrusion | 98 |
| abstract_inverted_index.Moreover, | 164 |
| abstract_inverted_index.Scanning, | 128 |
| abstract_inverted_index.Spoofing, | 135 |
| abstract_inverted_index.UAV-NIDD, | 40 |
| abstract_inverted_index.addresses | 45 |
| abstract_inverted_index.detection | 33 |
| abstract_inverted_index.effective | 32 |
| abstract_inverted_index.execution | 113 |
| abstract_inverted_index.gathering | 116 |
| abstract_inverted_index.long-term | 175 |
| abstract_inverted_index.necessary | 5 |
| abstract_inverted_index.networks. | 59 |
| abstract_inverted_index.real-time | 90 |
| abstract_inverted_index.collection | 105 |
| abstract_inverted_index.countering | 51 |
| abstract_inverted_index.initiating | 68 |
| abstract_inverted_index.innovation | 171 |
| abstract_inverted_index.introduces | 39 |
| abstract_inverted_index.intrusion, | 76 |
| abstract_inverted_index.mitigation | 35 |
| abstract_inverted_index.scenarios: | 65 |
| abstract_inverted_index.solutions, | 156 |
| abstract_inverted_index.solutions. | 36 |
| abstract_inverted_index.vulnerable | 11 |
| abstract_inverted_index.widespread | 18 |
| abstract_inverted_index.compromised | 66, 74, 78 |
| abstract_inverted_index.conditions. | 121 |
| abstract_inverted_index.cooperative | 170 |
| abstract_inverted_index.cyberattack | 112 |
| abstract_inverted_index.development | 30 |
| abstract_inverted_index.facilitates | 111 |
| abstract_inverted_index.Brute-Force, | 140 |
| abstract_inverted_index.controllers. | 108 |
| abstract_inverted_index.establishing | 83 |
| abstract_inverted_index.necessitates | 28 |
| abstract_inverted_index.network-wide | 70, 75, 85 |
| abstract_inverted_index.Additionally, | 146 |
| abstract_inverted_index.comprehensive | 26 |
| abstract_inverted_index.connectivity. | 21 |
| abstract_inverted_index.cyber-attacks | 126 |
| abstract_inverted_index.incorporating | 101 |
| abstract_inverted_index.strengthening | 157 |
| abstract_inverted_index.understanding | 49 |
| abstract_inverted_index.Reconnaissance, | 129 |
| abstract_inverted_index.Vehicles-Network | 97 |
| abstract_inverted_index.<p>Unmanned | 0 |
| abstract_inverted_index.dataset.</p> | 178 |
| cited_by_percentile_year.max | 97 |
| cited_by_percentile_year.min | 96 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 6 |
| citation_normalized_percentile.value | 0.9658241 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |