Journal articles on the topic 'Security of ADS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security of ADS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lubbe, Heinke, Rudi Serfontein, and Marijke Coetzee. "Assessing the Effectiveness of ADS-B Mitigations." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 535–44. http://dx.doi.org/10.34190/iccws.19.1.2032.
Full textHabibi Markani, Jamal, Abdessamad Amrhar, Jean-Marc Gagné, and René Jr Landry. "Security Establishment in ADS-B by Format-Preserving Encryption and Blockchain Schemes." Applied Sciences 13, no. 5 (2023): 3105. http://dx.doi.org/10.3390/app13053105.
Full textAhmed, Waqas, Ammar Masood, Jawad Manzoor, and Sedat Akleylek. "Automatic dependent surveillance-broadcast (ADS-B) anomalous messages and attack type detection: deep learning-based architecture." PeerJ Computer Science 11 (June 9, 2025): e2886. https://doi.org/10.7717/peerj-cs.2886.
Full textPatre, Ms Devyani. "Design of Security Framework for Ads-B Based Systems." International Journal for Research in Applied Science and Engineering Technology V, no. III (2017): 274–77. http://dx.doi.org/10.22214/ijraset.2017.3049.
Full textKožović, Dejan, and Dragan Đurđević. "Spoofing in aviation: Security threats on GPS and ADS-B systems." Vojnotehnicki glasnik 69, no. 2 (2021): 461–85. http://dx.doi.org/10.5937/vojtehg69-30119.
Full textHuang, Rong Shun, Hao Miao Yang, and Hong Gang Wu. "Enabling Confidentiality for ADS-B Broadcast Messages Based on Format-Preserving Encryption." Applied Mechanics and Materials 543-547 (March 2014): 2032–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2032.
Full textKožović, Dejan, Dragan Đurđević, Mirko Dinulović, Saša Milić, and Boško Rašuo. "Air traffic modernization and control: ADS-B system implementation update 2022: A review." FME Transactions 51, no. 1 (2023): 117–30. http://dx.doi.org/10.5937/fme2301117k.
Full textSeptiawan, Reza, I. Made Astawa, Arief Rufiyanto, and Tahar Agastani. "Metode Deteksi ‘Potential Security Threats’ Pada ADS-B Data dengan Memonitor EM Emisi Radiasi pada Jaringan Ethernet." Ultima Computing : Jurnal Sistem Komputer 11, no. 1 (2019): 39–44. http://dx.doi.org/10.31937/sk.v11i1.1181.
Full textAlghamdi, Fatimah, Amal Alshhrani, and Nermin Hamza. "Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B)." International Journal of Computer Applications 180, no. 26 (2018): 23–28. http://dx.doi.org/10.5120/ijca2018916598.
Full textKim, Yoohwan, Ju-Yeon Jo, and Sungchul Lee. "ADS-B vulnerabilities and a security solution with a timestamp." IEEE Aerospace and Electronic Systems Magazine 32, no. 11 (2017): 52–61. http://dx.doi.org/10.1109/maes.2018.160234.
Full textYang, Haomiao, Qixian Zhou, Mingxuan Yao, Rongxing Lu, Hongwei Li, and Xiaosong Zhang. "A Practical and Compatible Cryptographic Solution to ADS-B Security." IEEE Internet of Things Journal 6, no. 2 (2019): 3322–34. http://dx.doi.org/10.1109/jiot.2018.2882633.
Full textBouali, Soufyane, Selma Douha, and Pradeep Mishra. "Influence of targeted digital advertising in enhancing the resilience of the tourism and travel sector during food security crises using a CGE model approach." Marketing and Digital Technologies 9, no. 1 (2025): 20–45. https://doi.org/10.15276/mdt.9.1.2025.2.
Full textBryans, Jeremy, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, and Siraj Ahmed Shaikh. "Formal Template-Based Generation of Attack–Defence Trees for Automated Security Analysis." Information 14, no. 9 (2023): 481. http://dx.doi.org/10.3390/info14090481.
Full textAgre, Ms Pooja. "Survey on Design of Security Framework for Ads-B Based Systems." International Journal for Research in Applied Science and Engineering Technology V, no. III (2017): 270–73. http://dx.doi.org/10.22214/ijraset.2017.3048.
Full textLeonardi, Mauro, Luca Di Gregorio, and Davide Di Fausto. "Air Traffic Security: Aircraft Classification Using ADS-B Message’s Phase-Pattern." Aerospace 4, no. 4 (2017): 51. http://dx.doi.org/10.3390/aerospace4040051.
Full textWu, Zhijun, Tong Shang, and Anxin Guo. "Security Issues in Automatic Dependent Surveillance - Broadcast (ADS-B): A Survey." IEEE Access 8 (2020): 122147–67. http://dx.doi.org/10.1109/access.2020.3007182.
Full textIdemudia, Efosa C. "The Visual-Cognitive Model for Internet Advertising in Online Market Places." International Journal of Online Marketing 4, no. 3 (2014): 31–50. http://dx.doi.org/10.4018/ijom.2014070103.
Full textSemenov, Serhii, and Min Jian Zhang. "COMPARATIVE STUDIES OF METHODS FOR IMPROVING THE CYBER SECURITY OF UNMANNED AERIAL VEHICLES WITH THE BUILT-IN ADS-B SYSTEM." Advanced Information Systems 6, no. 4 (2022): 69–73. http://dx.doi.org/10.20998/2522-9052.2022.4.10.
Full textLesturgie, Marc, Hian Lim Chan, and Sylvain Azarian. "GICS, a new concept to enhance in-flight safety and security of commercial aviation." MATEC Web of Conferences 304 (2019): 05002. http://dx.doi.org/10.1051/matecconf/201930405002.
Full textSemenov, Serhii, Minjian Zhang, Serhii Yenhalychev, and Leonid Smidovych. "GENERALIZED MODEL OF THE ADS-B UNMANNED AERIAL VEHICLE DATA TRANSMISSION PROCESS IN A STEGANOGRAPHIC SYSTEM." Innovative Technologies and Scientific Solutions for Industries, no. 4 (22) (December 31, 2022): 14–19. http://dx.doi.org/10.30837/itssi.2022.22.014.
Full textSemenov, Serhii, Magdalena Krupska-Klimczak, Patryk Mazurek, Minjian Zhang, and Olena Chernikh. "Improving Unmanned Aerial Vehicle Security as a Factor in Sustainable Development of Smart City Infrastructure: Automatic Dependent Surveillance–Broadcast (ADS-B) Data Protection." Sustainability 17, no. 4 (2025): 1553. https://doi.org/10.3390/su17041553.
Full textGurer, Gursu, Yaser Dalveren, Ali Kara, and Mohammad Derawi. "A Radio Frequency Fingerprinting-Based Aircraft Identification Method Using ADS-B Transmissions." Aerospace 11, no. 3 (2024): 235. http://dx.doi.org/10.3390/aerospace11030235.
Full textKožović, Dejan, and Dragan Đurđević. "Spoofing in civil aviation: Security and safety of GPS/GNSS and ADS-B systems." Megatrend revija 18, no. 3 (2021): 281–306. http://dx.doi.org/10.5937/megrev2103281k.
Full textPourghassemi, Behnam, Jordan Bonecutter, Zhou Li, and Aparna Chandramowlishwaran. "adPerf." Proceedings of the ACM on Measurement and Analysis of Computing Systems 5, no. 1 (2021): 1–26. http://dx.doi.org/10.1145/3447381.
Full textWang, Jian Hui. "Analytical Modeling and its Validation for Data Acquisition of ADS-B System." Applied Mechanics and Materials 641-642 (September 2014): 1303–6. http://dx.doi.org/10.4028/www.scientific.net/amm.641-642.1303.
Full textda Silveira, Celdo S., Juliano B. Lima, and José R. de Oliveira Neto. "ADS-B Communication Security: Assessing the Performance of Format-Preserving Lightweight Block Ciphers." Journal of Communication and Information Systems 39, no. 2024 (2024): 194–206. https://doi.org/10.14209/jcis.2024.21.
Full textKosianchuk, V. V., N. I. Selvesiuk, and R. R. Khammatov. "AN OVERVIEW OF THE MAIN WAYS TO IMPROVE THE ADS-B SYSTEM SECURITY." Civil Aviation High TECHNOLOGIES 22, no. 1 (2019): 39–50. http://dx.doi.org/10.26467/2079-0619-2019-22-1-39-50.
Full textPark, Sang-Woo, Tae-Sung Kim, and Hyo-Jung Jun. "Information Security Consultants’ Role : Analysis of Job Ads in the US and Korea." Information Systems Review 22, no. 3 (2020): 157–72. http://dx.doi.org/10.14329/isr.2020.22.3.157.
Full textWang, Jian Hui. "Applied Technology in Data Evaluation and Position Quality of ADS-B System." Advanced Materials Research 1022 (August 2014): 333–36. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.333.
Full textDarabseh, Ala’, Evangelos Bitsikas, Brice Tedongmo, and Christina Pöpper. "On ADS-B Sensor Placement for Secure Wide-Area Multilateration." Proceedings 59, no. 1 (2020): 3. http://dx.doi.org/10.3390/proceedings2020059003.
Full textAstawa, I. Made, I. Putu Ananta Yogiswara, Tahar Agastani, and Afrias Sarotama. "Analisis Data ADS-B untuk Menentukan Probability of Target Report pada Sistem A-SMGCS." Ultima Computing : Jurnal Sistem Komputer 11, no. 1 (2019): 45–50. http://dx.doi.org/10.31937/sk.v11i1.1180.
Full textFournaris, Apostolos P., Charis Dimopoulos, Konstantinos Lampropoulos, and Odysseas Koufopavlou. "Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices." Sensors 20, no. 11 (2020): 3092. http://dx.doi.org/10.3390/s20113092.
Full textRamanan, K., and E. Baburaj. "An Energy Efficient Fast and Secure Data Aggregation Scheme for Wireless Sensor Network." Journal of Computational and Theoretical Nanoscience 14, no. 1 (2017): 780–88. http://dx.doi.org/10.1166/jctn.2017.6273.
Full textMcCallie, Donald, Jonathan Butts, and Robert Mills. "Security analysis of the ADS-B implementation in the next generation air transportation system." International Journal of Critical Infrastructure Protection 4, no. 2 (2011): 78–87. http://dx.doi.org/10.1016/j.ijcip.2011.06.001.
Full textArrate, Aritz, José González-Cabañas, Ángel Cuevas, and Rubén Cuevas. "Malvertising in Facebook: Analysis, Quantification and Solution." Electronics 9, no. 8 (2020): 1332. http://dx.doi.org/10.3390/electronics9081332.
Full textAbbosova, Ismigul. "AUTONOMIC NERVOUS SYSTEM RESEARCH INDICATORS IN THE ELDERS." American Journal of Medical Sciences and Pharmaceutical Research 03, no. 01 (2022): 35–39. http://dx.doi.org/10.37547/tajmspr/volume04issue01-05.
Full textShang, Fute, Buhong Wang, Fuhu Yan, and Tengyao Li. "Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems." Security and Communication Networks 2019 (March 3, 2019): 1–11. http://dx.doi.org/10.1155/2019/8936784.
Full textPeter Muriithi Wambugu, Dickson Nkonge Kagema, and Stephen Micheni. "Strategies for enhancing community development: A case of Anglican development services in Kenya." Journal of Philosophy and Religion (JPR) 1, no. 1 (2022): 46–58. http://dx.doi.org/10.51317/jpr.v2i1.205.
Full textChen, Yuntianyi, Yuqi Huai, Shilong Li, Changnam Hong, and Joshua Garcia. "Misconfiguration Software Testing for Failure Emergence in Autonomous Driving Systems." Proceedings of the ACM on Software Engineering 1, FSE (2024): 1913–36. http://dx.doi.org/10.1145/3660792.
Full textHerxheimer, Andrew, Cecilia Stålsby Lundborg, and Barbro Westerholm. "Advertisements for Medicines in Leading Medical Journals in 18 Countries: A 12-Month Survey of Information Content and Standards." International Journal of Health Services 23, no. 1 (1993): 161–72. http://dx.doi.org/10.2190/1ak2-x8cx-qq9e-f6ed.
Full textRonen, Rony, and Boaz Ben-Moshe. "Cyberattackson Flight Safety: Detection and Mitigation Using LoRa." Sensors 21, no. 13 (2021): 4610. http://dx.doi.org/10.3390/s21134610.
Full textZheng, Yunfei, Xuejun Zhang, Shenghan Wang, and Weidong Zhang. "Convolutional Neural Network and Ensemble Learning-Based Unmanned Aerial Vehicles Radio Frequency Fingerprinting Identification." Drones 8, no. 8 (2024): 391. http://dx.doi.org/10.3390/drones8080391.
Full textShuba, Anastasia, Athina Markopoulou, and Zubair Shafiq. "NoMoAds: Effective and Efficient Cross-App Mobile Ad-Blocking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (2018): 125–40. http://dx.doi.org/10.1515/popets-2018-0035.
Full textTomasz Balcerzak, Alexandra Yarushina, and Jan Rajchel. "Is Safety Always Going to be More Important Than Privacy?" Journal of Airline Operations and Aviation Management 2, no. 1 (2023): 57–67. http://dx.doi.org/10.56801/jaoam.v2i1.3.
Full textAshwini Bari, Anil Yadav, Sahil Suman, Ramit Ranjan. "Cyber Security Practices Ethical Hacking and its Significance in Modern." Tuijin Jishu/Journal of Propulsion Technology 43, no. 4 (2022): 199–201. http://dx.doi.org/10.52783/tjjpt.v43.i4.2335.
Full textBhardwaj, Pranay, Carla Purdy, and Nawar Obeidat. "A Novel Way to Design ADS-B using UML and TLA+ with Security as a Focus." Advances in Science, Technology and Engineering Systems Journal 5, no. 6 (2020): 1657–65. http://dx.doi.org/10.25046/aj0506197.
Full textKalintsev, Andrey S., and Evgeny A. Rubtsov. "METHOD OF DETECTING FALSE INTENTIONALLY GENERATED ADS-B SIGNALS." T-Comm 14, no. 11 (2020): 4–13. http://dx.doi.org/10.36724/2072-8735-2020-14-11-4-13.
Full textSobera, Waldemar. "The Narration of Threats and Struggle Against Crises in the Parliamentary Elections Campaign in Poland in 2023 – the Perspective of Social Media." Przegląd Politologiczny, no. 4 (December 30, 2024): 221–32. https://doi.org/10.14746/pp.2024.29.4.14.
Full textZhang, Xuzheng, Yifei Meng, Chenxiao Mao, Yaohua Xu, and Na Bai. "A Design of a Developable Automatic Avoidance System of UAV Based on ADS-B." Wireless Communications and Mobile Computing 2021 (July 24, 2021): 1–8. http://dx.doi.org/10.1155/2021/3072606.
Full textVajrobol, Vajratiya, Geetika Jain Saxena, Sanjeev Singh, et al. "Enhancing aviation control security through ADS-B injection detection using ensemble meta-learning models with Explainable AI." Alexandria Engineering Journal 112 (January 2025): 63–73. http://dx.doi.org/10.1016/j.aej.2024.10.042.
Full text