Stander et al., 2016 - Google Patents
Cyber security in civil aviationStander et al., 2016
View HTML- Document ID
- 17241128933420882118
- Author
- Stander A
- Ophoff J
- Publication year
- Publication venue
- Imam Journal of Applied Sciences
External Links
Snippet
Objective: This study aims to determine if there are grounds for such claims. The aim of this paper is not to show how to compromise the information systems of an aircraft, but to indicate that this is not impossible and that vulnerabilities exist. Methodology: Since …
- 239000000463 material 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/185—Space-based or airborne stations; Stations for satellite systems
- H04B7/18502—Airborne stations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0004—Transmission of traffic-related information to or from an aircraft
- G08G5/0008—Transmission of traffic-related information to or from an aircraft with other aircraft
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/74—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
- G01S13/76—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0017—Arrangements for implementing traffic-related aircraft activities, e.g. arrangements for generating, displaying, acquiring or managing traffic information
Similar Documents
Publication | Publication Date | Title |
---|---|---|
McCallie et al. | Security analysis of the ADS-B implementation in the next generation air transportation system | |
Strohmeier et al. | On perception and reality in wireless air traffic communication security | |
Purton et al. | Identification of ADS-B system vulnerabilities and threats | |
Pollack et al. | Aviation navigation systems security: Ads-b, gps, iff | |
Blasch et al. | Cyber awareness trends in avionics | |
Elmarady et al. | Studying cybersecurity in civil aviation, including developing and applying aviation cybersecurity risk assessment | |
Habler et al. | Assessing aircraft security: A comprehensive survey and methodology for evaluation | |
Viveros | Analysis of the cyber attacks against ADS-B perspective of aviation experts | |
Haass et al. | Aviation and cybersecurity: opportunities for applied research | |
Sampigethaya | Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront | |
Smith et al. | Analyzing privacy breaches in the aircraft communications addressing and reporting system (acars) | |
Pollard et al. | Connected aircraft: Cyber-safety risks, insider threat, and management approaches | |
Stander et al. | Cyber security in civil aviation | |
Clay et al. | A Look into the Vulnerabilities of Automatic Dependent Surveillance-Broadcast | |
Harison et al. | Survey of cyber threats in air traffic control and aircraft communications systems | |
Haass et al. | A framework for aviation cybersecurity | |
Shah et al. | Cybersecurity issues and challenges in civil aviation security | |
Ishtiaq et al. | Cybersecurity Vulnerabilities and Defence Techniques in Aviation Industry | |
Habler et al. | Evaluating the security of aircraft systems | |
Batuwangala et al. | Safety and Security considerations in the certification of next generation avionics and air traffic management systems | |
Longo et al. | On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System ({{{{{TCAS}}}}}) | |
Baron Garcia | Machine Learning and Artificial Intelligence Methods for Cybersecurity Data within the Aviation Ecosystem | |
Lam et al. | Cyberterrorists bringing down airplanes: Will it happen soon? | |
Berthier et al. | On the security of aircraft communication networks | |
PĂSCUȚOIU et al. | QUALITY OF SERVICE AND SECURITY OF AERONAUTICAL COMMUNICATION NETWORKS |