메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Assessment and mitigation of cyber exploits in future aircraft surveillance

Author keywords

[No Author keywords available]

Indexed keywords

AIRBORNE SURVEILLANCE; AIRCRAFT SURVEILLANCE; AUTOMATIC DEPENDENT SURVEILLANCE - BROADCASTS; CYBER SECURITY; FAILURE CONDITIONS; GROUND BASED; NO ADVERSE IMPACTS; NORMAL CONDITION; SECURITY EVALUATION; SECURITY SOLUTIONS; SYSTEM OPERATION; THREAT ASSESSMENT;

EID: 77952848062     PISSN: 1095323X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AERO.2010.5446905     Document Type: Conference Paper
Times cited : (10)

References (24)
  • 8
    • 84962635201 scopus 로고    scopus 로고
    • Secure operation, maintenance and control of future e-enabled airplanes
    • Dec.
    • K. Sampigethaya, R. Poovendran, L. Bushnell, "Secure operation, maintenance and control of future e-enabled airplanes," Proceedings of the IEEE, 96:12, pp. 1992-2007, Dec. 2008.
    • (2008) Proceedings of the IEEE , vol.96 , Issue.12 , pp. 1992-2007
    • Sampigethaya, K.1    Poovendran, R.2    Bushnell, L.3
  • 15
    • 65749118551 scopus 로고    scopus 로고
    • Benefits and incentives for ADS-B equipage in the national airspace system
    • ICAT-2007-2012
    • E. Lester and J. Hansman, "Benefits and incentives for ADS-B equipage in the national airspace system," MIT ICAT Report, ICAT-2007-2012, 2007.
    • (2007) MIT ICAT Report
    • Lester, E.1    Hansman, J.2
  • 17
    • 78651106079 scopus 로고    scopus 로고
    • Graceful Degradation of Air Traffic Operations: Airspace Sensitivity to Degraded Surveillance Systems
    • Dec.
    • M. Gariel, E. Feron, "Graceful Degradation of Air Traffic Operations: Airspace Sensitivity to Degraded Surveillance Systems," Proceedings of the IEEE, 96:12, pp. 2028-2039, Dec. 2008.
    • (2008) Proceedings of the IEEE , vol.96 , Issue.12 , pp. 2028-2039
    • Gariel, M.1    Feron, E.2
  • 19
    • 40449096402 scopus 로고    scopus 로고
    • Security Requirements Engineering: A Framework for Representation and Analysis
    • Jan.-Feb.
    • C. B. Haley, R. Laney, J. D. Moffett, B. Nuseibeh "Security Requirements Engineering: A Framework for Representation and Analysis," IEEE Transactions on Software Engineering, 34:1, pp.133-153, Jan.-Feb. 2008.
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.B.1    Laney, R.2    Moffett, J.D.3    Nuseibeh, B.4
  • 20
    • 77952810883 scopus 로고    scopus 로고
    • 14 CFR Part 25, Special Conditions: Boeing model 787-8 airplane; systems and data networks security protection of airplane systems and data networks from unauthorized external access
    • Federal Aviation Administration
    • Federal Aviation Administration, 14 CFR Part 25, Special Conditions: Boeing model 787-8 airplane; systems and data networks security protection of airplane systems and data networks from unauthorized external access, Federal Register, 72:72, 2007, http://edocket.access.gpo.gov/2007/pdf/07-1838.pdf
    • (2007) Federal Register , vol.72 , pp. 72


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.