{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T13:40:49Z","timestamp":1725975649998},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788159"},{"type":"electronic","value":"9783319788166"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78816-6_19","type":"book-chapter","created":{"date-parts":[[2018,4,24]],"date-time":"2018-04-24T03:02:48Z","timestamp":1524538968000},"page":"271-282","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Manipulating the Five V\u2019s in the Next Generation Air Transportation System"],"prefix":"10.1007","author":[{"given":"Dustin","family":"Mink","sequence":"first","affiliation":[]},{"given":"William Bradley","family":"Glisson","sequence":"additional","affiliation":[]},{"given":"Ryan","family":"Benton","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,25]]},"reference":[{"key":"19_CR1","unstructured":"U.S. Department of Transportation: Fact Sheet - FAA Forecast Fact Sheet-Fiscal Years 2016\u20132036, 2017 (2016)"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jairtraman.2014.12.005","volume":"48","author":"D Gillen","year":"2015","unstructured":"Gillen, D., Morrison, W.G.: Aviation security: costing, pricing, finance and performance. J. Air Transp. Manage. 48, 1\u201312 (2015)","journal-title":"J. Air Transp. Manage."},{"key":"19_CR3","unstructured":"Committee on Appropriations: FY2017 Homeland Security Appropriations Bill Cleared for Committee Debate, 2017 (2016)"},{"key":"19_CR4","unstructured":"Kaspersen, A.: Four threats to aviation security \u2013 and four responses, 2017 (2016)"},{"key":"19_CR5","unstructured":"BBC News: Brussels explosions: what we know about airport and metro attacks, 2017 (2016)"},{"key":"19_CR6","unstructured":"BBC News: MH17 Ukraine plane crash: what we know, 2017 (2016)"},{"key":"19_CR7","unstructured":"AirlineReporter: Updated: Malaysia Airlines Flight 370 Has Likely Crashed But Where? 2017 (2014)"},{"key":"19_CR8","unstructured":"United States Government Accountability Office: FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen, 2017 (2015)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Strohmeier, M., Martinovic, I.: On passive data link layer fingerprinting of aircraft transponders. In: Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and\/or PrivaCy, pp. 1\u20139. ACM, Denver (2015)","DOI":"10.1145\/2808705.2808712"},{"key":"19_CR10","unstructured":"Costin, A.: Ghost is in the air (traffic): on insecurity of ADS-B protocol and practical attacks on ADS-B devices. Black Hat USA (2012)"},{"key":"19_CR11","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/MCOM.2014.6815901","volume":"52","author":"M Strohmeier","year":"2014","unstructured":"Strohmeier, M., Schafer, M., Lenders, V., Martinovic, I.: Realities and challenges of nextgen air traffic management: the case of ADS-B. IEEE Commun. Mag. 52, 111\u2013118 (2014)","journal-title":"IEEE Commun. Mag."},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Katal, A., Wazid, M., Goudar, R.H.: Big data: issues, challenges, tools and good practices. In: 2013 Sixth International Conference on Contemporary Computing (IC3), pp. 404\u2013409 (2013)","DOI":"10.1109\/IC3.2013.6612229"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Berman, K., Glisson, W.B., Glisson, L.M.: Investigating the impact of global positioning system (GPS) evidence in court cases. In: Hawaii International Conference on System Sciences (HICSS-48). IEEE, Kauai (2015)","DOI":"10.1109\/HICSS.2015.618"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"McMillan, J., Glisson, W.B., Bromby, M.: Investigating the increase in mobile phone evidence in criminal activities. In: Hawaii International Conference on System Sciences (HICSS-46). IEEE, Wailea (2013)","DOI":"10.1109\/HICSS.2013.366"},{"key":"19_CR15","unstructured":"Mink, D., Yasinsac, A., Choo, K.-K.R., Glisson, W.B.: Next generation aircraft architecture and digital forensic. In: Americas Conference on Information Systems (AMCIS). Americas Conference on Information Systems, San Diego (2016)"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Moallemi, M., Castro-Pe\u00f1a, C.A., Towhidnejad, M., Abraham, B.: Information security in the aircraft access to system wide information management infrastructure. In: 2016 Integrated Communications Navigation and Surveillance (ICNS), pp. 1A3-1\u20131A3-7 (2016)","DOI":"10.1109\/ICNSURV.2016.7486321"},{"key":"19_CR17","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1109\/TIFS.2016.2622682","volume":"12","author":"D He","year":"2017","unstructured":"He, D., Kumar, N., Choo, K.K.R., Wu, W.: Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system. IEEE Trans. Inf. Forens. Secur. 12, 454\u2013464 (2017)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Varga, M., Polg\u00e1r, Z.A., Hede\u015fiu, H.: ADS-B based real-time air traffic monitoring system. In: 2015 38th International Conference on Telecommunications and Signal Processing (TSP), pp. 215\u2013219 (2015)","DOI":"10.1109\/TSP.2015.7296255"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Boci, E., Thistlethwaite, S.: A novel big data architecture in support of ADS-B data analytic. In: 2015 Integrated Communication, Navigation and Surveillance Conference (ICNS), pp. C1-1\u2013C1-8 (2015)","DOI":"10.1109\/ICNSURV.2015.7121281"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Li, W., Kamal, P.: Integrated aviation security for defense-in-depth of next generation air transportation system. In: 2011 IEEE International Conference on Technologies for Homeland Security (HST), pp. 136\u2013142 (2011)","DOI":"10.1109\/THS.2011.6107860"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Samuelson, K., Valovage, E., Hall, D.: Enhanced ADS-B research. In: IEEE Aerospace Conference, pp. 1\u20137 (2006)","DOI":"10.1109\/AERO.2006.1655886"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Robinson, R.V., Sampigethaya, K., Li, M., Lintelman, S., Poovendran, R., Oheimb, D.V.: Secure network-enabled commercial airplane operations: it support infrastructure challenges. In: First CEAS European Air Space Conference, pp. 1\u201310 (2007)","DOI":"10.2514\/6.2007-2891"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Kacem, T., Wijesekera, D., Costa, P.: Integrity and authenticity of ADS-B broadcasts. In: IEEE Aerospace Conference, pp. 1\u20138 (2015)","DOI":"10.1109\/AERO.2015.7119293"},{"key":"19_CR24","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1111\/1556-4029.13431","volume":"62","author":"CFR Tassone","year":"2017","unstructured":"Tassone, C.F.R., Martini, B., Choo, K.-K.R.: Visualizing digital forensic datasets: a proof of concept. J. Forensic Sci. 62, 1197\u20131204 (2017)","journal-title":"J. Forensic Sci."},{"key":"19_CR25","unstructured":"Oates, B.J.: Researching Information Systems and Computing (2006)"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Dong, X.L., Srivastava, D.: Big data integration. In: IEEE 29th International Conference on Data Engineering (ICDE), pp. 1245\u20131248 (2013)","DOI":"10.1109\/ICDE.2013.6544914"},{"key":"19_CR27","unstructured":"U.S. Department of Transportation\u2019s Bureau of Transportation Statistics: Transportation Statistics Annual Report 2016 (2016)"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Marsh, R., Ogaard, K.: Mining heterogeneous ADS-B data sets for probabilistic models of pilot behavior. In: IEEE International Conference on Data Mining Workshops, pp. 606\u2013612 (2010)","DOI":"10.1109\/ICDMW.2010.34"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Finke, C., Butts, J., Mills, R.: ADS-B encryption: confidentiality in the friendly skies. In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, pp. 1\u20134. ACM, Oak Ridge (2013)","DOI":"10.1145\/2459976.2459986"},{"key":"19_CR30","unstructured":"Chen, T.-C.: An authenticated encrption scheme for automatic dependent surveillance-broadcast. IEEE Commun. Mag. (2012)"},{"key":"19_CR31","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1002\/sec.1021","volume":"8","author":"J Baek","year":"2015","unstructured":"Baek, J., Young-jj, B., Hableel, E., Al-Qutavri, M.: Making air traffic surveillance more reliable: a new authentication framework for automatic dependent sureillance-broadcast (ADS-B) based on online\/offline identity-based signature. Secur. Commun. Netw. 8, 740\u2013750 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"19_CR32","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.adhoc.2009.08.002","volume":"8","author":"AP Lauf","year":"2010","unstructured":"Lauf, A.P., Peters, R.A., Robinson, W.H.: A distributed intrusion detection system for resource-constrained devices in ad-hoc networks. Ad Hoc Netw. 8, 253\u2013266 (2010)","journal-title":"Ad Hoc Netw."},{"key":"19_CR33","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/2542049","volume":"46","author":"R Mitchell","year":"2014","unstructured":"Mitchell, R., Chen, I.-R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46, 55 (2014)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"19_CR34","unstructured":"Wesson, K.D., Humphreys, T.E., Evans, B.L.: Can cryptography secure next generation air traffic surveillance. IEEE Secur. Priv. Mag. (2014)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78816-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T22:47:08Z","timestamp":1571266028000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78816-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788159","9783319788166"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78816-6_19","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}