Detecting ADS-B Spoofing Attacks Using Deep Neural Networks
暂无分享,去创建一个
Mauro Conti | Radha Poovendran | Linda Bushnell | Giuseppe Bernieri | Xuhang Ying | Joanna Mazer | L. Bushnell | R. Poovendran | Xuhang Ying | M. Conti | Giuseppe Bernieri | Joanna Mazer
[1] Tara N. Sainath,et al. Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.
[2] Ivan Martinovic,et al. On the Security of the Automatic Dependent Surveillance-Broadcast Protocol , 2013, IEEE Communications Surveys & Tutorials.
[3] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[4] Ivan Martinovic,et al. Experimental Analysis of Attacks on Next Generation Air Traffic Communication , 2013, ACNS.
[5] Tianqi Chen,et al. XGBoost: A Scalable Tree Boosting System , 2016, KDD.
[6] FENG Ziliang,et al. A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE , 2010 .
[7] Ivan Martinovic,et al. On Passive Data Link Layer Fingerprinting of Aircraft Transponders , 2015, CPS-SPC '15.
[8] Upamanyu Madhow. Fundamentals of Digital Communication: References , 2008 .
[9] Johan A. K. Suykens,et al. Least Squares Support Vector Machine Classifiers , 1999, Neural Processing Letters.
[10] Todd E. Humphreys,et al. Can Cryptography Secure Next Generation Air Traffic Surveillance? , 2014 .
[11] Radha Poovendran,et al. Security and privacy of future aircraft wireless communications with offboard systems , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[12] Mauro Leonardi,et al. Air Traffic Security: Aircraft Classification Using ADS-B Message’s Phase-Pattern , 2017 .
[13] Sungchul Lee,et al. ADS-B vulnerabilities and a security solution with a timestamp , 2017, IEEE Aerospace and Electronic Systems Magazine.
[14] Gaspare Galati,et al. ADS-B jamming mitigation: a solution based on a multichannel receiver , 2017, IEEE Aerospace and Electronic Systems Magazine.
[15] Guy Lapalme,et al. A systematic analysis of performance measures for classification tasks , 2009, Inf. Process. Manag..
[16] D. Hosmer,et al. Applied Logistic Regression , 1991 .
[17] Jens B. Schmitt,et al. Secure Track Verification , 2015, 2015 IEEE Symposium on Security and Privacy.
[18] Andrei Costin,et al. Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices , 2012 .
[19] Jens B. Schmitt,et al. Secure Motion Verification using the Doppler Effect , 2016, WISEC.
[20] Loukas Lazos,et al. Verifying ADS-B navigation information through Doppler shift measurements , 2015, 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC).
[21] Robert F. Mills,et al. Enhancing the security of aircraft surveillance in the next generation air traffic control system , 2013, Int. J. Crit. Infrastructure Prot..
[22] Robert F. Mills,et al. Security analysis of the ADS-B implementation in the next generation air transportation system , 2011, Int. J. Crit. Infrastructure Prot..