Jamming suppression for ADS-B based on a cross-antenna array
暂无分享,去创建一个
Lu Wang | Wenyi Wang | Renbiao Wu | Dan Lu | Geng Chen | R. Wu | Lu Wang | D. Lu | Wenyi Wang | Geng Chen
[1] Brandon Kovell,et al. Comparative Analysis of ADS-B Verification Techniques , 2012 .
[2] Richard Barhydt,et al. Development of Intent Information Changes to Revised Minimum Aviation System Performance Standards for Automatic Dependent Surveillance Broadcast (RTCA/DO-242A) , 2002 .
[3] Andrei Costin,et al. Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices , 2012 .
[4] Joonsang Baek,et al. Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature , 2015, Secur. Commun. Networks.
[5] R. Jehlen. Integrated communications navigation and surveillance (ICNS) conference , 2013, ICNS 2013.
[6] Busyairah Syd Ali,et al. Automatic Dependent Surveillance Broadcast (ADS-B) , 2017 .
[7] Ivan Martinovic,et al. Experimental Analysis of Attacks on Next Generation Air Traffic Communication , 2013, ACNS.
[8] Bashar Nuseibeh,et al. Securing the Skies: In Requirements We Trust , 2009, Computer.
[9] Matthew Trinkle,et al. GPS interference mitigation; Overview and experimental results , 2001 .
[10] Hussein A. Abbass,et al. Identification of ADS-B System Vulnerabilities and Threats , 2010 .