Threat model and construction strategy on ADS-B attack data

Tengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao. Threat model and construction strategy on ADS-B attack data. IET Information Security, 14(5):542-552, 2020. [doi]

Authors

Tengyao Li

This author has not been identified. Look up 'Tengyao Li' in Google

Buhong Wang

This author has not been identified. Look up 'Buhong Wang' in Google

Fute Shang

This author has not been identified. Look up 'Fute Shang' in Google

Jiwei Tian

This author has not been identified. Look up 'Jiwei Tian' in Google

Kunrui Cao

This author has not been identified. Look up 'Kunrui Cao' in Google