{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T00:53:46Z","timestamp":1772240026402,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/cycon.2016.7529437","type":"proceedings-article","created":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T16:28:26Z","timestamp":1470328106000},"page":"223-241","source":"Crossref","is-referenced-by-count":27,"title":["Assessing the impact of aviation security on cyber power"],"prefix":"10.1109","author":[{"given":"Martin","family":"Strohmeier","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Schafer","sequence":"additional","affiliation":[]},{"given":"Matt","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Lenders","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Martinovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2011.6107860"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2004.1390774"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2001.964187"},{"key":"ref30","article-title":"Repository of Industrial Security Incidents (RISI) Online Incident Database","author":"exida","year":"2015"},{"key":"ref35","article-title":"Is Spying on Corporate Jets Insider Trading?","author":"carney","year":"2012","journal-title":"CNBC"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.02.001"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2365951"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1109\/TITS.2016.2612584","article-title":"On Perception and Reality in Wireless Air Traffic Communications Security","author":"strohmeier","year":"2016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6815901"},{"key":"ref13","article-title":"ADS-B Frequently Asked Questions","year":"2015"},{"key":"ref14","article-title":"dump1090 GitHub repository","year":"2016"},{"key":"ref15","first-page":"2008","year":"2011","journal-title":"The European Commission Commission regulation laying down common airspace usage requirements and operating procedures for airborne collision avoidance"},{"key":"ref16","article-title":"Draft Doc9924 guidance material for the measurement of all-call reply rates","year":"2013","journal-title":"Aeronautical Surveillance Panel"},{"key":"ref17","first-page":"1","article-title":"Traffic Alert and Collision Avoidance System II (TcAS II)","author":"henely","year":"2015","journal-title":"Digital Avionics Handbook"},{"key":"ref18","first-page":"56","article-title":"Initial capability for ground surveillance","year":"2013","journal-title":"Global Air Navigation Plan"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/EURAD.2005.1605606"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref4","article-title":"GNU Radio","year":"2016"},{"key":"ref27","article-title":"App zeigt Kontroll-Flug von Armeedrohne","year":"2015","journal-title":"20 Minuten"},{"key":"ref3","article-title":"Ghost is in the Air(traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices","author":"costin","year":"2012","journal-title":"Black Hat USA"},{"key":"ref6","article-title":"gr-air-modes GitHub Repository","author":"foster","year":"2015"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1049\/SBRA011E","author":"adamy","year":"2006","journal-title":"Introduction to Electronic Warfare Modeling and Simulation"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_16"},{"key":"ref7","article-title":"Forensic Mining WithADS-B","author":"croft","year":"2015","journal-title":"Aviation Week & Space Technology"},{"key":"ref2","first-page":"96","article-title":"FM 3-38: Cyber Electromagnetic Activities","year":"2014","journal-title":"F Man"},{"key":"ref9","first-page":"1","article-title":"Guide to Industrial Control Systems (ICS) Security","author":"stouffer","year":"2007","journal-title":"Recomm Natl Inst Stand Technol"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6815901"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jairtraman.2003.10.008"},{"key":"ref22","article-title":"Review report of the thirteenth meeting of Automatic Dependent Surveillance-Broadcast (ADS-B) study and implementation task force","year":"2014"},{"key":"ref21","article-title":"Updated work on 5 - Final report on electromagnetic environmental effects of, and on, ACAS","year":"2009"},{"key":"ref24","article-title":"How I broke the Ethiopian Airlines #ET702 hijacking on Twitter","author":"walton","year":"2014"},{"key":"ref23","article-title":"Blocking display of Aircraft Situation Display to Industry (ASDI) data","year":"2016"},{"key":"ref26","article-title":"Online flight tracking provides interesting details about Russian air bridge to Syria","author":"cenciotti","year":"2015","journal-title":"The Aviationist"},{"key":"ref25","article-title":"Congress Didn't Notice the FBI Creating a &#x2018;Small Air Force&#x2019; for Surveillance","author":"friedersdorf","year":"2015","journal-title":"The Atlantic"}],"event":{"name":"2016 8th International Conference on Cyber-Conflict (CyCon)","location":"Tallinn","start":{"date-parts":[[2016,5,31]]},"end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 8th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7524181\/7529414\/07529437.pdf?arnumber=7529437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T19:55:48Z","timestamp":1656964548000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7529437\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/cycon.2016.7529437","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}