To see the other types of publications on this topic, follow the link: Security of ADS.

Journal articles on the topic 'Security of ADS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security of ADS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lubbe, Heinke, Rudi Serfontein, and Marijke Coetzee. "Assessing the Effectiveness of ADS-B Mitigations." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 535–44. http://dx.doi.org/10.34190/iccws.19.1.2032.

Full text
Abstract:
The rise in aerial traffic necessitates aircraft localisation methods that go beyond radar technology's built-in capabilities. The Automated Dependent Surveillance-Broadcast (ADS-B) system is a novel aircraft localisation method that promises to provide the necessary precision to handle the current air traffic surge. The Federal Aviation Administration has, therefore, enforced ADS-B's deployment. However, the architecture of the ADS-B system holds several vulnerabilities. Most of these vulnerabilities are because ADS-B is designed to rely on wireless networks. This paper provides an in-depth a
APA, Harvard, Vancouver, ISO, and other styles
2

Habibi Markani, Jamal, Abdessamad Amrhar, Jean-Marc Gagné, and René Jr Landry. "Security Establishment in ADS-B by Format-Preserving Encryption and Blockchain Schemes." Applied Sciences 13, no. 5 (2023): 3105. http://dx.doi.org/10.3390/app13053105.

Full text
Abstract:
In the next generation modernization plan, the automatic dependent surveillance-broadcast (ADS-B) system plays a pivotal role. However, the ADS-B’s low level of security and its vulnerabilities have raised valid concerns. The main objectives of this paper are to highlight the limitations of legacy ADS-B systems and to assess the feasibility of using Format-preserving (F), Feistel-based encryption (F), with multiple implementation variances (X) (FFX) algorithms, for enhancing ADS-B’s security. The offered solution is implemented in a standard software-defined radio (SDR) ADS-B to be utilized in
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmed, Waqas, Ammar Masood, Jawad Manzoor, and Sedat Akleylek. "Automatic dependent surveillance-broadcast (ADS-B) anomalous messages and attack type detection: deep learning-based architecture." PeerJ Computer Science 11 (June 9, 2025): e2886. https://doi.org/10.7717/peerj-cs.2886.

Full text
Abstract:
Automatic Dependent Surveillance-Broadcast (ADS-B) is a vital communication protocol within air traffic control (ATC) systems. Unlike traditional technologies, ADS-B utilizes the Global Positioning System (GPS) to deliver more accurate and precise location data while reducing operational and deployment costs. It enhances radar coverage and serves as a standalone solution in areas lacking radar services. Despite these advantages, ADS-B faces significant security vulnerabilities due to its open design and the absence of built-in security features. Given its critical role, developing an advanced
APA, Harvard, Vancouver, ISO, and other styles
4

Patre, Ms Devyani. "Design of Security Framework for Ads-B Based Systems." International Journal for Research in Applied Science and Engineering Technology V, no. III (2017): 274–77. http://dx.doi.org/10.22214/ijraset.2017.3049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kožović, Dejan, and Dragan Đurđević. "Spoofing in aviation: Security threats on GPS and ADS-B systems." Vojnotehnicki glasnik 69, no. 2 (2021): 461–85. http://dx.doi.org/10.5937/vojtehg69-30119.

Full text
Abstract:
Introduction/purpose: The paper provides a review of recent research in the field of GPS and ADS-B spoofing. Systems that rely on satellite positioning technology can be targeted by spoofing in order to generate incorrect positioning/timing, which is accomplished by inserting false signals into the "victim's" receiver. Attackers try to insert false positioning information into systems that, for example, provide navigation of airplanes or drones for the purpose of hijacking or distracting security/safety in airspace surveillance. New concepts of navigation and ATC will thus be necessary. Method
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Rong Shun, Hao Miao Yang, and Hong Gang Wu. "Enabling Confidentiality for ADS-B Broadcast Messages Based on Format-Preserving Encryption." Applied Mechanics and Materials 543-547 (March 2014): 2032–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2032.

Full text
Abstract:
The automatic dependent surveillance-broadcast (ADS-B) system is the backbone of the next-gen air traffic control (ATC) modernization plan. Unfortunately, ADS-B system suffers from serious cyber-security vulnerabilities due to the open broadcast of aircraft data, without regard to message confidentiality. However, using common encryption scheme to provide confidentiality of ADS-B data is not a good solution, because encrypting data with ordinary cryptosystem would violate the original openness intention of ADS-B system design. In this paper, based on the new format-preserving encryption (FPE),
APA, Harvard, Vancouver, ISO, and other styles
7

Kožović, Dejan, Dragan Đurđević, Mirko Dinulović, Saša Milić, and Boško Rašuo. "Air traffic modernization and control: ADS-B system implementation update 2022: A review." FME Transactions 51, no. 1 (2023): 117–30. http://dx.doi.org/10.5937/fme2301117k.

Full text
Abstract:
Automatic Dependent Surveillance-Broadcast (ADS-B) is a multiparameter surveillance system designed to improve key segments of air traffic: enabling real-time surveillance, raising safety and efficiency levels, and improving flight information and weather services. ADS-B consists of two subsystems, ADS-B Out and ADS-B In. Although only a complete system, ADS-B In/Out provides numerous benefits (additional situational awareness, more efficient oceanic routing, etc.) FAA and EASA only require ADS-B Out (by January and June 2020, respectively), whereby ADS-B In remains optional. Because of its ma
APA, Harvard, Vancouver, ISO, and other styles
8

Septiawan, Reza, I. Made Astawa, Arief Rufiyanto, and Tahar Agastani. "Metode Deteksi ‘Potential Security Threats’ Pada ADS-B Data dengan Memonitor EM Emisi Radiasi pada Jaringan Ethernet." Ultima Computing : Jurnal Sistem Komputer 11, no. 1 (2019): 39–44. http://dx.doi.org/10.31937/sk.v11i1.1181.

Full text
Abstract:
Precision, Navigation, and Timing (PNT) system based on Global Navigation Satellite System (GNSS) becomes significant in the air traffic management, especially in the use of Automatic Dependent Surveillance Broadcast system (ADS-B) for air traffic monitoring. Therefore the integrity of GNSS is significant to provide a reliable data necessary for ADS-B. GNSS Interference due to intentional or unintentional surrounding signal source may decrease the integrity of GNSS signal and therefore may result in the in-accurate position data of ADS-B message. ADS-B message itself is also vulnerable from po
APA, Harvard, Vancouver, ISO, and other styles
9

Alghamdi, Fatimah, Amal Alshhrani, and Nermin Hamza. "Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B)." International Journal of Computer Applications 180, no. 26 (2018): 23–28. http://dx.doi.org/10.5120/ijca2018916598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Yoohwan, Ju-Yeon Jo, and Sungchul Lee. "ADS-B vulnerabilities and a security solution with a timestamp." IEEE Aerospace and Electronic Systems Magazine 32, no. 11 (2017): 52–61. http://dx.doi.org/10.1109/maes.2018.160234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Yang, Haomiao, Qixian Zhou, Mingxuan Yao, Rongxing Lu, Hongwei Li, and Xiaosong Zhang. "A Practical and Compatible Cryptographic Solution to ADS-B Security." IEEE Internet of Things Journal 6, no. 2 (2019): 3322–34. http://dx.doi.org/10.1109/jiot.2018.2882633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Bouali, Soufyane, Selma Douha, and Pradeep Mishra. "Influence of targeted digital advertising in enhancing the resilience of the tourism and travel sector during food security crises using a CGE model approach." Marketing and Digital Technologies 9, no. 1 (2025): 20–45. https://doi.org/10.15276/mdt.9.1.2025.2.

Full text
Abstract:
This study aims to analyze the impact of the food security crisis on the travel and tourism sector, focusing on the role of targeted digital advertising, such as Google Ads, in enhancing the sector's resilience. The study explores how digital marketing can be used to steer tourist demand, increase traveler awareness of sustainable destinations, and boost bookings despite food security challenges. The study employs a (CGE) Model to quantitatively analyze the economic impacts of the food security crisis on tourism. Additionally, it analyzes data from digital advertising campaigns and links it to
APA, Harvard, Vancouver, ISO, and other styles
13

Bryans, Jeremy, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, and Siraj Ahmed Shaikh. "Formal Template-Based Generation of Attack–Defence Trees for Automated Security Analysis." Information 14, no. 9 (2023): 481. http://dx.doi.org/10.3390/info14090481.

Full text
Abstract:
Systems that integrate cyber and physical aspects to create cyber-physical systems (CPS) are becoming increasingly complex, but demonstrating the security of CPS is hard and security is frequently compromised. These compromises can lead to safety failures, putting lives at risk. Attack Defense Trees with sequential conjunction (ADS) are an approach to identifying attacks on a system and identifying the interaction between attacks and the defenses that are present within the CPS. We present a semantic model for ADS and propose a methodology for generating ADS automatically. The methodology take
APA, Harvard, Vancouver, ISO, and other styles
14

Agre, Ms Pooja. "Survey on Design of Security Framework for Ads-B Based Systems." International Journal for Research in Applied Science and Engineering Technology V, no. III (2017): 270–73. http://dx.doi.org/10.22214/ijraset.2017.3048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Leonardi, Mauro, Luca Di Gregorio, and Davide Di Fausto. "Air Traffic Security: Aircraft Classification Using ADS-B Message’s Phase-Pattern." Aerospace 4, no. 4 (2017): 51. http://dx.doi.org/10.3390/aerospace4040051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Wu, Zhijun, Tong Shang, and Anxin Guo. "Security Issues in Automatic Dependent Surveillance - Broadcast (ADS-B): A Survey." IEEE Access 8 (2020): 122147–67. http://dx.doi.org/10.1109/access.2020.3007182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Idemudia, Efosa C. "The Visual-Cognitive Model for Internet Advertising in Online Market Places." International Journal of Online Marketing 4, no. 3 (2014): 31–50. http://dx.doi.org/10.4018/ijom.2014070103.

Full text
Abstract:
Social media and online firms are currently facing severe challenges generating revenue through online banner ads, and for two decades, current studies in the information systems, advertising, and marketing literature have shown that online banner ad click-through rates are decreasing steadily (Idemudia, 2014; Idemudia et al., 2007; Li et al., 2012). To address these issues, the Visual-Cognitive (VC) model has been developed for online market places and Internet advertising. An experiment was conducted in which independent variables such as familiarity of online banner ads, perceived security
APA, Harvard, Vancouver, ISO, and other styles
18

Semenov, Serhii, and Min Jian Zhang. "COMPARATIVE STUDIES OF METHODS FOR IMPROVING THE CYBER SECURITY OF UNMANNED AERIAL VEHICLES WITH THE BUILT-IN ADS-B SYSTEM." Advanced Information Systems 6, no. 4 (2022): 69–73. http://dx.doi.org/10.20998/2522-9052.2022.4.10.

Full text
Abstract:
The subject of study in the article is methods for improving the cybersecurity of unmanned aerial vehicles with an integrated ADS-B system. The aim is to analyze and compare methods for improving the cybersecurity of unmanned aerial vehicles with an embedded ADS-B system. Particular scientific tasks: analysis and comparative studies of the main types of cyber threats and methods for improving the cybersecurity of unmanned aerial vehicles with an integrated ADS-B system, the development of an appropriate taxonomy, and the development of proposals for further research. The methods used in the ar
APA, Harvard, Vancouver, ISO, and other styles
19

Lesturgie, Marc, Hian Lim Chan, and Sylvain Azarian. "GICS, a new concept to enhance in-flight safety and security of commercial aviation." MATEC Web of Conferences 304 (2019): 05002. http://dx.doi.org/10.1051/matecconf/201930405002.

Full text
Abstract:
This paper presents a new concept of aircraft tracking based on a LEO constellation of small satellites, each of them carrying receiving and transmitting devices in order to check the integrity of the ADS-B (Automatic Dependent Surveillance - Broadcast) positioning information and proceed with a non-cooperative independent localization of the aircraft, if a flight anomaly comes out. To do so, on side of the conventional ADS-B processing, authors propose to add a multilateration process and two active radar modes, able to perform a finer and reliable localization of the aircraft, as well as a f
APA, Harvard, Vancouver, ISO, and other styles
20

Semenov, Serhii, Minjian Zhang, Serhii Yenhalychev, and Leonid Smidovych. "GENERALIZED MODEL OF THE ADS-B UNMANNED AERIAL VEHICLE DATA TRANSMISSION PROCESS IN A STEGANOGRAPHIC SYSTEM." Innovative Technologies and Scientific Solutions for Industries, no. 4 (22) (December 31, 2022): 14–19. http://dx.doi.org/10.30837/itssi.2022.22.014.

Full text
Abstract:
The subject of the article is a model of the ADS-B data transmission process of an unmanned aerial vehicle in a steganographic system using direct spectrum expansion technology. The aim of the publication is to improve the security of unmanned aerial vehicles with an integrated ADS-B system. Particular scientific tasks: analysis of basic methods of ADS-B format data protection; development of the scheme of ADS-B drone data transfer in steganographic system with the use of direct spectrum expansion technology; improvement of the model of ADS-B drone data transfer in steganographic system with t
APA, Harvard, Vancouver, ISO, and other styles
21

Semenov, Serhii, Magdalena Krupska-Klimczak, Patryk Mazurek, Minjian Zhang, and Olena Chernikh. "Improving Unmanned Aerial Vehicle Security as a Factor in Sustainable Development of Smart City Infrastructure: Automatic Dependent Surveillance–Broadcast (ADS-B) Data Protection." Sustainability 17, no. 4 (2025): 1553. https://doi.org/10.3390/su17041553.

Full text
Abstract:
The rapid integration of Unmanned Aerial Vehicles (UAVs) into smart city infrastructures necessitates advanced security measures to ensure their safe and sustainable operation. However, existing Automatic Dependent Surveillance–Broadcast (ADS-B) systems are highly vulnerable to spoofing, data falsification, and cyber threats, which compromises air traffic management and poses significant challenges to UAV security. This paper presents an innovative approach to improving UAV security by introducing a novel steganographic method for ADS-B data protection. The proposed method leverages Fourier tr
APA, Harvard, Vancouver, ISO, and other styles
22

Gurer, Gursu, Yaser Dalveren, Ali Kara, and Mohammad Derawi. "A Radio Frequency Fingerprinting-Based Aircraft Identification Method Using ADS-B Transmissions." Aerospace 11, no. 3 (2024): 235. http://dx.doi.org/10.3390/aerospace11030235.

Full text
Abstract:
The automatic dependent surveillance broadcast (ADS-B) system is one of the key components of the next generation air transportation system (NextGen). ADS-B messages are transmitted in unencrypted plain text. This, however, causes significant security vulnerabilities, leaving the system open to various types of wireless attacks. In particular, the attacks can be intensified by simple hardware, like a software-defined radio (SDR). In order to provide high security against such attacks, radio frequency fingerprinting (RFF) approaches offer reasonable solutions. In this study, an RFF method is pr
APA, Harvard, Vancouver, ISO, and other styles
23

Kožović, Dejan, and Dragan Đurđević. "Spoofing in civil aviation: Security and safety of GPS/GNSS and ADS-B systems." Megatrend revija 18, no. 3 (2021): 281–306. http://dx.doi.org/10.5937/megrev2103281k.

Full text
Abstract:
Aircraft systems that rely on satellite positioning technology, such as GNSS and ADS-B, can be the target of a spoofing attack - a sophisticated and very dangerous form of radio frequency interference in which false signals are inserted into the "victim's" receiver for incorrect positioning or timing. Although spoofing in civil aviation is a potential threat, its technical feasibility is realistic, and the application of spoofing is becoming more flexible due to the very rapid progress of cheap SDR platforms. In particular, the potential risk is posed by potential air strikes, using unmanned a
APA, Harvard, Vancouver, ISO, and other styles
24

Pourghassemi, Behnam, Jordan Bonecutter, Zhou Li, and Aparna Chandramowlishwaran. "adPerf." Proceedings of the ACM on Measurement and Analysis of Computing Systems 5, no. 1 (2021): 1–26. http://dx.doi.org/10.1145/3447381.

Full text
Abstract:
Monetizing websites and web apps through online advertising is widespread in the web ecosystem, creating a billion-dollar market. This has led to the emergence of a vast network of tertiary ad providers and ad syndication to facilitate this growing market. Nowadays, the online advertising ecosystem forces publishers to integrate ads from these third-party domains. On the one hand, this raises several privacy and security concerns that are actively being studied in recent years. On the other hand, the ability of today's browsers to load dynamic web pages with complex animations and Javascript h
APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Jian Hui. "Analytical Modeling and its Validation for Data Acquisition of ADS-B System." Applied Mechanics and Materials 641-642 (September 2014): 1303–6. http://dx.doi.org/10.4028/www.scientific.net/amm.641-642.1303.

Full text
Abstract:
Based on the accuracy and integrity quality evaluation indexes of ADS-B navigation data, this paper foucses on the analytical modeling of ADS-B navigation data source under the global positioning system (GPS) and Compass system. The factors related to accuracy and integrity of ADS-B are derived and simulated, which include the position estimated uncertainty (EPU) and horizontal position integrity containing radius (RC). It is the first to give the quality index levels of the ADS-B horizontal data source in Tianjin under GPS and Compass. The simulation results show that ADS-B navigation data av
APA, Harvard, Vancouver, ISO, and other styles
26

da Silveira, Celdo S., Juliano B. Lima, and José R. de Oliveira Neto. "ADS-B Communication Security: Assessing the Performance of Format-Preserving Lightweight Block Ciphers." Journal of Communication and Information Systems 39, no. 2024 (2024): 194–206. https://doi.org/10.14209/jcis.2024.21.

Full text
Abstract:
In this work, we document an investigation regarding the vulnerabilities of ADS-B (automatic dependent surveillance-broadcast) communication, considering the risks to operational security. The ADS-B technology is a communication protocol to transmit surveillance information, that is, data related to position, altimetry, and speed, from the aircraft's avionics, an evolution to radars. We present an encryption solution for this communication using format-preserving encryption implemented in a microcontroller-embedded system. We also evaluate the use of lightweight symmetric block ciphers for bet
APA, Harvard, Vancouver, ISO, and other styles
27

Kosianchuk, V. V., N. I. Selvesiuk, and R. R. Khammatov. "AN OVERVIEW OF THE MAIN WAYS TO IMPROVE THE ADS-B SYSTEM SECURITY." Civil Aviation High TECHNOLOGIES 22, no. 1 (2019): 39–50. http://dx.doi.org/10.26467/2079-0619-2019-22-1-39-50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Park, Sang-Woo, Tae-Sung Kim, and Hyo-Jung Jun. "Information Security Consultants’ Role : Analysis of Job Ads in the US and Korea." Information Systems Review 22, no. 3 (2020): 157–72. http://dx.doi.org/10.14329/isr.2020.22.3.157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Wang, Jian Hui. "Applied Technology in Data Evaluation and Position Quality of ADS-B System." Advanced Materials Research 1022 (August 2014): 333–36. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.333.

Full text
Abstract:
Automatic dependent surveillance-broadcast (ADS-B) is a totally new surveillance method, so before practically applied and operated in China, abundant tests and evaluations are necessary to validate the performance of ADS-B and guarantee the operational security. To solve the asynchronous problem among radar data, ADS-B data and real-time kinematic (RTK) data caused by different update rates, this paper proposes the technique of synchronizing multi-surveillance data by extrapolating from the data of low update rate to high update rate according to velocity and heading. Meanwhile, because radar
APA, Harvard, Vancouver, ISO, and other styles
30

Darabseh, Ala’, Evangelos Bitsikas, Brice Tedongmo, and Christina Pöpper. "On ADS-B Sensor Placement for Secure Wide-Area Multilateration." Proceedings 59, no. 1 (2020): 3. http://dx.doi.org/10.3390/proceedings2020059003.

Full text
Abstract:
As automatic dependent surveillance–broadcast (ADS-B) becomes more prevalent, the placement of on-ground sensors is vital for Air Traffic Control (ATC) to control the airspace. However, the current sensors are placed in an unstructured way that keeps some areas without coverage, and others are over-densified by sensors. Therefore, areas with coverage anomalies may cause issues that inhibit accurate ADS-B verifications as well as the availability of ADS-B altogether. In this paper, we tackle the ADS-B-specific optimal sensor placement (OSP) problem. Of importance are both the optimal coverage a
APA, Harvard, Vancouver, ISO, and other styles
31

Astawa, I. Made, I. Putu Ananta Yogiswara, Tahar Agastani, and Afrias Sarotama. "Analisis Data ADS-B untuk Menentukan Probability of Target Report pada Sistem A-SMGCS." Ultima Computing : Jurnal Sistem Komputer 11, no. 1 (2019): 45–50. http://dx.doi.org/10.31937/sk.v11i1.1180.

Full text
Abstract:
A-SMGCS is an airport system that is used to improve the efficiency of using runways, apron and taxiways by maximizing runway capacities in all situations and weather while maintaining the required level of security. One of the parameters that becomes a requirement in the A-SMGCS system is the Probabillity of Target Report (PTR) whose value must be greater or equal to 95% in the area maneuver with update rate of the data one second [1]. Automatic Dependent SurveillanceBroadcast (ADS-B) is one of the cooperative sensors in the A-SMGCS system. The ADS-B sensor is a receiver that is used to captu
APA, Harvard, Vancouver, ISO, and other styles
32

Fournaris, Apostolos P., Charis Dimopoulos, Konstantinos Lampropoulos, and Odysseas Koufopavlou. "Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices." Sensors 20, no. 11 (2020): 3092. http://dx.doi.org/10.3390/s20113092.

Full text
Abstract:
Critical infrastructures and associated real time Informational systems need some security protection mechanisms that will be able to detect and respond to possible attacks. For this reason, Anomaly Detection Systems (ADS), as part of a Security Information and Event Management (SIEM) system, are needed for constantly monitoring and identifying potential threats inside an Information Technology (IT) system. Typically, ADS collect information from various sources within a CI system using security sensors or agents and correlate that information so as to identify anomaly events. Such sensors tho
APA, Harvard, Vancouver, ISO, and other styles
33

Ramanan, K., and E. Baburaj. "An Energy Efficient Fast and Secure Data Aggregation Scheme for Wireless Sensor Network." Journal of Computational and Theoretical Nanoscience 14, no. 1 (2017): 780–88. http://dx.doi.org/10.1166/jctn.2017.6273.

Full text
Abstract:
Energy efficiency and secured data collection are two important performance metrics for critical event monitoring in wireless sensor network. Current state-of-the-art research is limited to either maximizing security under redundant radix-based approach or security through adversary model while satisfying throughput requirement. Although many prior research efforts resulted in optimized solutions, but how to optimize both objectives simultaneously has to be addressed. In this paper, an integrated framework called Secured Marvin and Adaptive Derivative Scheduler (SM-ADS) is presented to improve
APA, Harvard, Vancouver, ISO, and other styles
34

McCallie, Donald, Jonathan Butts, and Robert Mills. "Security analysis of the ADS-B implementation in the next generation air transportation system." International Journal of Critical Infrastructure Protection 4, no. 2 (2011): 78–87. http://dx.doi.org/10.1016/j.ijcip.2011.06.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Arrate, Aritz, José González-Cabañas, Ángel Cuevas, and Rubén Cuevas. "Malvertising in Facebook: Analysis, Quantification and Solution." Electronics 9, no. 8 (2020): 1332. http://dx.doi.org/10.3390/electronics9081332.

Full text
Abstract:
Online advertising is a wealthy industry that generated more than $100B in 2018 only in the US and delivers billions of ads to Internet users every day with. These impressive numbers have also attracted the attention of malicious players that try to exploit the online advertising ecosystem for their own benefit. In particular, one of the most harmful practices refers to malicious users that act as advertisers to deliver unsafe ads. The goal of these ads is to compromise the security of the users that receive those ads. This practice is referred to as Malvertising. Some reports have estimated t
APA, Harvard, Vancouver, ISO, and other styles
36

Abbosova, Ismigul. "AUTONOMIC NERVOUS SYSTEM RESEARCH INDICATORS IN THE ELDERS." American Journal of Medical Sciences and Pharmaceutical Research 03, no. 01 (2022): 35–39. http://dx.doi.org/10.37547/tajmspr/volume04issue01-05.

Full text
Abstract:
The publication discusses the indicators of the study of vegetative tone, vegetative reactivity and vegetative security of activity in elderly people with vegetative dystonia syndrome. 180 patients with CCI of the second stage were studied, the average age was 67.4±6.1 years. The patients were divided into two groups. Group I consisted of 118 patients (62.2% of the total number of patients) with stage 2 chronic cerebral ischemia (CCI) with ADS, group 2 consisted of 62 patients (34.4%) with stage 2 CCI without ADS.
APA, Harvard, Vancouver, ISO, and other styles
37

Shang, Fute, Buhong Wang, Fuhu Yan, and Tengyao Li. "Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems." Security and Communication Networks 2019 (March 3, 2019): 1–11. http://dx.doi.org/10.1155/2019/8936784.

Full text
Abstract:
Location verification is a promising approach among various ADS-B security mechanisms, which can monitor announced positions in ADS-B messages with estimated positions. Based on common assumption that the attacker is equipped with only a single device, this mechanism can estimate the position state through analysis of time measurements of messages using multilateration algorithm. In this paper, we propose the formal model of multidevice false data injection attacks in the ATC system against the location verification. Assuming that attackers equipped with multiple devices can manipulate the ADS
APA, Harvard, Vancouver, ISO, and other styles
38

Peter Muriithi Wambugu, Dickson Nkonge Kagema, and Stephen Micheni. "Strategies for enhancing community development: A case of Anglican development services in Kenya." Journal of Philosophy and Religion (JPR) 1, no. 1 (2022): 46–58. http://dx.doi.org/10.51317/jpr.v2i1.205.

Full text
Abstract:
This research sought to investigate the strategies employed by ADS in enhancing Community Development (CD) in Kenya. The study targeted four Anglican Development Services (ADS) regions in Kenya, namely, Pwani, Eastern, Mount Kenya East and NAIKA (Nairobi, Kajiado and All Saints). A sample of 330 respondents drawn from a target population of 1,827 was acquired through a Descriptive Research design. Statistical Package for Social Sciences (SPSS) version 26. Quantitative data were analysed using frequencies and percentages, while thematic analysis was done on qualitative data. The findings illust
APA, Harvard, Vancouver, ISO, and other styles
39

Chen, Yuntianyi, Yuqi Huai, Shilong Li, Changnam Hong, and Joshua Garcia. "Misconfiguration Software Testing for Failure Emergence in Autonomous Driving Systems." Proceedings of the ACM on Software Engineering 1, FSE (2024): 1913–36. http://dx.doi.org/10.1145/3660792.

Full text
Abstract:
The optimization of a system’s configuration options is crucial for determining its performance and functionality, particularly in the case of autonomous driving software (ADS) systems because they possess a multitude of such options. Research efforts in the domain of ADS have prioritized the development of automated testing methods to enhance the safety and security of self-driving cars. Presently, search-based approaches are utilized to test ADS systems in a virtual environment, thereby simulating real-world scenarios. However, such approaches rely on optimizing the waypoints of ego cars and
APA, Harvard, Vancouver, ISO, and other styles
40

Herxheimer, Andrew, Cecilia Stålsby Lundborg, and Barbro Westerholm. "Advertisements for Medicines in Leading Medical Journals in 18 Countries: A 12-Month Survey of Information Content and Standards." International Journal of Health Services 23, no. 1 (1993): 161–72. http://dx.doi.org/10.2190/1ak2-x8cx-qq9e-f6ed.

Full text
Abstract:
The information content of 6,710 advertisements for medicines in medical journals was surveyed to provide a baseline for monitoring the effect of WHO's Ethical Criteria for Medicinal Drug Promotion. The advertisements (ads) appeared during 12 months (1987–1988) in 23 leading national medical journals in 18 countries. Local participants, mostly doctors or pharmacists, examined them. The presence or absence in each ad of important information was noted. In most ads the generic name appeared in smaller type than the brand name. Indications were mentioned more often than the negative effects of me
APA, Harvard, Vancouver, ISO, and other styles
41

Ronen, Rony, and Boaz Ben-Moshe. "Cyberattackson Flight Safety: Detection and Mitigation Using LoRa." Sensors 21, no. 13 (2021): 4610. http://dx.doi.org/10.3390/s21134610.

Full text
Abstract:
Automatic Dependent Surveillance-Broadcast (ADS-B) is the main communication system currently being used in Air Traffic Control (ATC) around the world. The ADS-B system is planned to be a key component of the Federal Aviation Administration (FAA) NextGen plan, which will manage the increasingly congested airspace in the coming decades. While the benefits of ADS-B are widely known, its lack of security measures and its vulnerability to cyberattacks such as jamming and spoofing is a great concern for flight safety experts. In this paper, we first summarize the cyberattacks and challenges related
APA, Harvard, Vancouver, ISO, and other styles
42

Zheng, Yunfei, Xuejun Zhang, Shenghan Wang, and Weidong Zhang. "Convolutional Neural Network and Ensemble Learning-Based Unmanned Aerial Vehicles Radio Frequency Fingerprinting Identification." Drones 8, no. 8 (2024): 391. http://dx.doi.org/10.3390/drones8080391.

Full text
Abstract:
With the rapid development of the unmanned aerial vehicles (UAVs) industry, there is increasing demand for UAV surveillance technology. Automatic Dependent Surveillance-Broadcast (ADS-B) provides accurate monitoring of UAVs. However, the system cannot encrypt messages or verify identity. To address the issue of identity spoofing, radio frequency fingerprinting identification (RFFI) is applied for ADS-B transmitters to determine the true identities of UAVs through physical layer security technology. This paper develops an ensemble learning ADS-B radio signal recognition framework. Firstly, the
APA, Harvard, Vancouver, ISO, and other styles
43

Shuba, Anastasia, Athina Markopoulou, and Zubair Shafiq. "NoMoAds: Effective and Efficient Cross-App Mobile Ad-Blocking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (2018): 125–40. http://dx.doi.org/10.1515/popets-2018-0035.

Full text
Abstract:
Abstract Although advertising is a popular strategy for mobile app monetization, it is often desirable to block ads in order to improve usability, performance, privacy, and security. In this paper, we propose NoMoAds to block ads served by any app on a mobile device. NoMoAds leverages the network interface as a universal vantage point: it can intercept, inspect, and block outgoing packets from all apps on a mobile device. NoMoAds extracts features from packet headers and/or payload to train machine learning classifiers for detecting ad requests. To evaluate NoMoAds, we collect and label a new
APA, Harvard, Vancouver, ISO, and other styles
44

Tomasz Balcerzak, Alexandra Yarushina, and Jan Rajchel. "Is Safety Always Going to be More Important Than Privacy?" Journal of Airline Operations and Aviation Management 2, no. 1 (2023): 57–67. http://dx.doi.org/10.56801/jaoam.v2i1.3.

Full text
Abstract:
Lately Elon Musk published headlines news that has been focused on his private jet and its whereabouts, leading the billionaire to announce he is taking legal action against a 20-year-old who has been tracking his travels. The US Federal Aviation Administration is proposing an upgrade to air transportation that will fundamentally overhaul the current, aging system. A key component, the automatic dependent surveillance broadcast (ADS-B) system, will enhance air traffic monitoring and control by requiring aircraft to continually broadcast position, identity and velocity via unencrypted data link
APA, Harvard, Vancouver, ISO, and other styles
45

Ashwini Bari, Anil Yadav, Sahil Suman, Ramit Ranjan. "Cyber Security Practices Ethical Hacking and its Significance in Modern." Tuijin Jishu/Journal of Propulsion Technology 43, no. 4 (2022): 199–201. http://dx.doi.org/10.52783/tjjpt.v43.i4.2335.

Full text
Abstract:
Someone who is an ethical hacker is a computer and network expert who breaks into security systems on behalf of their owners to find holes that a bad hacker could use. The internet's rapid rise has led to many good things, such as: shopping, e-mail, shared computers, and new Places for ads and information to be sent through What people in business and the government worry about most these days is ethical hacking, which is also called attack testing, penetration testing, or red teaming. Concerns about being "hacked" are raised by businesses, and possible customers are worried about keeping pers
APA, Harvard, Vancouver, ISO, and other styles
46

Bhardwaj, Pranay, Carla Purdy, and Nawar Obeidat. "A Novel Way to Design ADS-B using UML and TLA+ with Security as a Focus." Advances in Science, Technology and Engineering Systems Journal 5, no. 6 (2020): 1657–65. http://dx.doi.org/10.25046/aj0506197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Kalintsev, Andrey S., and Evgeny A. Rubtsov. "METHOD OF DETECTING FALSE INTENTIONALLY GENERATED ADS-B SIGNALS." T-Comm 14, no. 11 (2020): 4–13. http://dx.doi.org/10.36724/2072-8735-2020-14-11-4-13.

Full text
Abstract:
The International Civil Aviation Organization recommends to use advanced surveillance systems: multi-sensor surveillance system and automatic dependent surveillance broadcast. Ground stations for automatic dependent surveillance have a relatively low cost and can partially replace secondary surveillance radars in the future. Currently, the development of automatic dependent surveillance has slowed down, because the system has vulnerabilities: the complete openness of the 1090ES data link, the lack of encryption and protection against false intentionally generated signals. There are a large num
APA, Harvard, Vancouver, ISO, and other styles
48

Sobera, Waldemar. "The Narration of Threats and Struggle Against Crises in the Parliamentary Elections Campaign in Poland in 2023 – the Perspective of Social Media." Przegląd Politologiczny, no. 4 (December 30, 2024): 221–32. https://doi.org/10.14746/pp.2024.29.4.14.

Full text
Abstract:
The aim of this article is to analyze the narration of threats and struggles against crises in parliamentary election campaign ads in the parliamentary elections in Poland in 2023 in the context of narration based on crisis issues affecting both Poland and the whole world in recent years. The research method used was content analysis enriched with frame analysis. The research aimed to answer the following research questions: Were political parties eager to exploit the issue of the migration crisis during the election campaign? How were the government’s actions to overcome crises presented? Wha
APA, Harvard, Vancouver, ISO, and other styles
49

Zhang, Xuzheng, Yifei Meng, Chenxiao Mao, Yaohua Xu, and Na Bai. "A Design of a Developable Automatic Avoidance System of UAV Based on ADS-B." Wireless Communications and Mobile Computing 2021 (July 24, 2021): 1–8. http://dx.doi.org/10.1155/2021/3072606.

Full text
Abstract:
There are two primary defects in the existing UAV avoidance systems: the system is memoryless; airborne radars are used to detect long-distance barriers, which are unreliable and expensive. The paper adopts the deep learning algorithm and ADS-B communication system based on a satellite base station to solve the above problems. It divides the avoidance problem into two parts: short-distance obstacle avoidance and long-distance route planning. On the one hand, the system establishes the knowledge base storing the previous avoidance experience and the matching mechanism, realizing the corresponde
APA, Harvard, Vancouver, ISO, and other styles
50

Vajrobol, Vajratiya, Geetika Jain Saxena, Sanjeev Singh, et al. "Enhancing aviation control security through ADS-B injection detection using ensemble meta-learning models with Explainable AI." Alexandria Engineering Journal 112 (January 2025): 63–73. http://dx.doi.org/10.1016/j.aej.2024.10.042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!