Threat model and construction strategy on ADS-B attack data

Tengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao. Threat model and construction strategy on ADS-B attack data. IET Information Security, 14(5):542-552, 2020. [doi]

@article{LiWSTC20-0,
  title = {Threat model and construction strategy on ADS-B attack data},
  author = {Tengyao Li and Buhong Wang and Fute Shang and Jiwei Tian and Kunrui Cao},
  year = {2020},
  doi = {10.1049/iet-ifs.2018.5635},
  url = {https://doi.org/10.1049/iet-ifs.2018.5635},
  researchr = {https://researchr.org/publication/LiWSTC20-0},
  cites = {0},
  citedby = {0},
  journal = {IET Information Security},
  volume = {14},
  number = {5},
  pages = {542-552},
}