Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System
暂无分享,去创建一个
[1] Ivan Martinovic,et al. Realities and challenges of nextgen air traffic management: the case of ADS-B , 2014, IEEE Communications Magazine.
[2] Jie Yang,et al. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[3] Srdjan Capkun,et al. Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures , 2016, MobiCom.
[4] Srdjan Capkun,et al. SPREE: a spoofing resistant GPS receiver , 2016, MobiCom.
[5] Richard P. Martin,et al. Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[6] Srdjan Capkun,et al. On the requirements for successful GPS spoofing attacks , 2011, CCS '11.
[7] Ivan Martinovic,et al. Bringing up OpenSky: A large-scale ADS-B sensor network for research , 2014, IPSN-14 Proceedings of the 13th International Symposium on Information Processing in Sensor Networks.
[8] Vaibhav Joshi,et al. Detection and Localization of Multiple Spoofing Attackers , 2014 .
[9] Jens B. Schmitt,et al. Secure Track Verification , 2015, 2015 IEEE Symposium on Security and Privacy.
[10] Andrei Costin,et al. Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices , 2012 .
[11] Nils Ole Tippenhauer,et al. Multi-receiver GPS spoofing detection: error models and realization , 2016, ACSAC.
[12] Jens B. Schmitt,et al. Secure Motion Verification using the Doppler Effect , 2016, WISEC.
[13] T. Humphreys,et al. STATEMENT ON THE SECURITY THREAT POSED BY UNMANNED AERIAL SYSTEMS AND POSSIBLE COUNTERMEASURES , 2015 .
[14] Rui Pinheiro,et al. OpenSky report 2016: Facts and figures on SSR mode S and ADS-B usage , 2016, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC).
[15] Todd E. Humphreys,et al. Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.
[16] T. Humphreys. STATEMENT ON THE VULNERABILITY OF CIVIL UNMANNED AERIAL VEHICLES AND OTHER SYSTEMS TO CIVIL GPS , 2012 .
[17] Ivan Martinovic,et al. Experimental Analysis of Attacks on Next Generation Air Traffic Communication , 2013, ACNS.
[18] Ivan Martinovic,et al. On the Security of the Automatic Dependent Surveillance-Broadcast Protocol , 2013, IEEE Communications Surveys & Tutorials.