{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T17:54:46Z","timestamp":1757613286058,"version":"3.44.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.23919\/softcom.2019.8903699","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T14:21:37Z","timestamp":1574691697000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Cyber Security and Information Exchange Analysis of Automatic Dependent Surveillance Broadcast"],"prefix":"10.23919","author":[{"given":"Philipp","family":"Ortner","sequence":"first","affiliation":[{"name":"Institute of Microwave and Photonic Engineering, Graz University of Technology,Graz,Austria"}]},{"given":"Holger","family":"Fl\u00fchr","sequence":"additional","affiliation":[{"name":"Institute of Aviation, FH JOANNEUM (University of Applied Sciences),Graz,Austria"}]},{"given":"Erich","family":"Leitgeb","sequence":"additional","affiliation":[{"name":"Institute of Microwave and Photonic Engineering, Graz University of Technology,Graz,Austria"}]}],"member":"263","reference":[{"journal-title":"Annex 10 - Aeronautical Telecommunications","year":"2007","key":"ref10"},{"journal-title":"Guidance Material for Mode S-Specific Protocol Application Avionics","year":"2007","key":"ref11"},{"journal-title":"Networking the Sky","year":"2018","author":"ortner","key":"ref12"},{"journal-title":"The 1090MHz Riddle","year":"0","author":"sun","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2011.06.001"},{"journal-title":"Minimum aviation system performance standards for automatic dependent surveillance-broadcast (ADS-B)","year":"2006","key":"ref15"},{"journal-title":"RTCA DO-260 Minimum Operational Performance Standards for 1090 MHz Extended Squatter Automatic Dependent Surveillance - Broadcast (ADS-B) and Traffic Information Services - Broadcast (TIS-B)","year":"2009","key":"ref16"},{"journal-title":"Minimum Operational Performance Standards for Universal Access Transceiver (UAT) Automatic Dependent Surveillance - Broadcast","year":"2009","key":"ref17"},{"journal-title":"Security of ADS-B State of the Art and Beyond","year":"0","author":"strohmeier","key":"ref18"},{"key":"ref19","article-title":"Identification of ADS-B System Vulnerabilities and Threats","author":"purton","year":"2010","journal-title":"Australian Transport Forum"},{"journal-title":"Twelfth Air Navigation Conference","article-title":"Cyber Security for Civil Aviation","year":"2012","key":"ref4"},{"key":"ref3","first-page":"2","article-title":"Communications, Navigation and Surveillance","year":"2010","journal-title":"Sky Magazine"},{"journal-title":"Guidance material on comparison of surveillance technologies (GMST)","year":"2007","key":"ref6"},{"key":"ref5","article-title":"Security and privacy of future aircraft wireless communications with offboard systems","author":"poovendran","year":"2011","journal-title":"2011 Third International Conference on Communication Systems and Networks (COMSNETS)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33576-1"},{"journal-title":"Mode S Beacon System Functional Description","year":"1986","key":"ref7"},{"journal-title":"NEASCOG CNS Security Statement","year":"0","key":"ref2"},{"journal-title":"EUROCONTROL SPECIFICATION on Data Link Services","year":"2009","key":"ref9"},{"journal-title":"Single European Sky","year":"0","key":"ref1"},{"journal-title":"A Framework for Securing Future e-Enabled Aircraft Navigation and Surveillance","year":"0","author":"sampigethaya","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_16"},{"journal-title":"Ghost in the Air (Traffic) On Insecurity of ADS-B Protocol and Practical Attacks on ADS-B Devices","year":"0","author":"costin","key":"ref21"},{"journal-title":"Exploiting the Automatic Dependent Surveillance-Broadcast system via false target injection","year":"2012","author":"magazu","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998422"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIWDC.2008.4649019"}],"event":{"name":"2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","start":{"date-parts":[[2019,9,19]]},"location":"Split, Croatia","end":{"date-parts":[[2019,9,21]]}},"container-title":["2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892589\/8903594\/08903699.pdf?arnumber=8903699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T18:20:21Z","timestamp":1757010021000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8903699\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.23919\/softcom.2019.8903699","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}