This work is licensed under the Creative Commons Attribution 4.0 International License.
Tovkach, S. S. (2019). Self-similarity of Operating Modes of Aviation Engine with the use of Wireless Data Transmission. Advances in Science and Technology. Research Journal, 13(2), 176-185.Search in Google Scholar
Ramanatt, P. R., Natarajan, K., & Shobha, K. R. (2020). Challenges in implementing a wireless avionics network. Aircraft engineering and aerospace technology, 92(3), 482-494.Search in Google Scholar
Zeng, D., Giles, S. L., & Phillips, B. (2019, September). Re-envisioning Air/Ground Communications for Aviation. In 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC) (pp. 1-10). IEEE.Search in Google Scholar
Nwadiugwu, W. P., & Kim, D. S. (2019). Ultrawideband network channel models for next-generation wireless avionic system. IEEE Transactions on Aerospace and Electronic Systems, 56(1), 113-129.Search in Google Scholar
Baltaci, A., Dinc, E., Ozger, M., Alabbasi, A., Cavdar, C., & Schupke, D. (2021). A survey of wireless networks for future aerial communications (FACOM). IEEE Communications Surveys & Tutorials, 23(4), 2833-2884.Search in Google Scholar
Mersch, S., Meyerhoff, T., Krüger, L., & Timm-Giel, A. (2018, December). Coexistence of wireless avionics intra-communication networks. In 2018 6th IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE) (pp. 18-23). IEEE.Search in Google Scholar
Monika, Verma, S., & Kumar, P. (2021, March). Wireless technology contribution for aviation safety. In International Conference on Optical and Wireless Technologies (pp. 181-189). Singapore: Springer Nature Singapore.Search in Google Scholar
Matti, E., Johns, O., Khan, S., Gurtov, A., & Josefsson, B. (2020, October). Aviation scenarios for 5g and beyond. In 2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC) (pp. 1-10). IEEE.Search in Google Scholar
Yaacoub, J. P., Noura, H., Salman, O., & Chehab, A. (2020). Security analysis of drones systems: Attacks, limitations, and recommendations. Internet of Things, 11, 100218.Search in Google Scholar
Kagalwalla, N., & Churi, P. P. (2019, September). Cybersecurity in aviation: An intrinsic review. In 2019 5th international conference on computing, communication, control and automation (ICCUBEA) (pp. 1-6). IEEE.Search in Google Scholar
Simmons, H. O. (2017). Cybersecurity in Aviation: Constant Vigilance Required. J. Air L. & Com., 82, 771.Search in Google Scholar
Yu, X., Man, H., & Jiyu, X. (2021, October). Impact of Emerging Network Attack and Defense Technologies on Civil Aviation Information Systems. In 2021 IEEE 3rd International Conference on Civil Aviation Safety and Information Technology (ICCASIT) (pp. 1170-1174). IEEE.Search in Google Scholar
Nobles, C. (2018). Cyber threats in civil aviation. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 1185-1207). IGI Global.Search in Google Scholar
Zhang, R., Liu, G., Liu, J., & Nees, J. P. (2017). Analysis of message attacks in aviation data-link communication. IEEE Access, 6, 455-463.Search in Google Scholar
Lykou, G., Iakovakis, G., & Gritzalis, D. (2019). Aviation cybersecurity and cyber-resilience: assessing risk in air traffic management. Critical Infrastructure Security and Resilience: Theories, Methods, Tools and Technologies, 245-260.Search in Google Scholar
Koroniotis, N., Moustafa, N., Schiliro, F., Gauravaram, P., & Janicke, H. (2020). A holistic review of cybersecurity and reliability perspectives in smart airports. IEEE Access, 8, 209802-209834.Search in Google Scholar
Dou, X. (2020). Big data and smart aviation information management system. Cogent Business & Management, 7(1), 1766736.Search in Google Scholar
Ovchenkov, N. I., & Fadeev, R. S. (2020). Airport vulnerability model in civil aviation. Security & Future, 4(1), 3-5.Search in Google Scholar
Lee, I. (2017). Big data: Dimensions, evolution, impacts, and challenges. Business horizons, 60(3), 293-303.Search in Google Scholar
Van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J., & Kusev, P. (2017). Risk perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior, 75, 547-559.Search in Google Scholar
Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. (2019). Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity, 2(1), 1-22.Search in Google Scholar
Sedjelmaci, H., & Senouci, S. M. (2018). Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution. The Journal of Supercomputing, 74(10), 4928-4944.Search in Google Scholar
Ukwandu, E., Ben-Farah, M. A., Hindy, H., Bures, M., Atkinson, R., Tachtatzis, C., ... & Bellekens, X. (2022). Cyber-security challenges in aviation industry: A review of current and future trends. Information, 13(3), 146.Search in Google Scholar
Habler, E., Bitton, R., & Shabtai, A. (2022). Evaluating the Security of Aircraft Systems. arxiv preprint arxiv:2209.04028.Search in Google Scholar
Dave, G., Choudhary, G., Sihag, V., You, I., & Choo, K. K. R. (2022). Cyber security challenges in aviation communication, navigation, and surveillance. Computers & Security, 112, 102516.Search in Google Scholar
Kumar, S. A., & Xu, B. (2017, June). Vulnerability assessment for security in aviation cyber-physical systems. In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (pp. 145-150). IEEE.Search in Google Scholar
Ying, X., Mazer, J., Bernieri, G., Conti, M., Bushnell, L., & Poovendran, R. (2019, June). Detecting ADS-B spoofing attacks using deep neural networks. In 2019 IEEE conference on communications and network security (CNS) (pp. 187-195). IEEE.Search in Google Scholar
Wang, B., Liu, D., Peng, Y., & Peng, X. (2019). Multivariate regression-based fault detection and recovery of UAV flight data. IEEE Transactions on Instrumentation and Measurement, 69(6), 3527-3537.Search in Google Scholar
Ostroumov, I., Kuzmenko, N., Sushchenko, O., Zaliskyi, M., Solomentsev, O., Averyanova, Y., ... & Nikitina, T. (2021, September). A probability estimation of aircraft departures and arrivals delays. In International Conference on Computational Science and Its Applications (pp. 363-377). Cham: Springer International Publishing.Search in Google Scholar
Yu, B., Guo, Z., Asian, S., Wang, H., & Chen, G. (2019). Flight delay prediction for commercial air transport: A deep learning approach. Transportation Research Part E: Logistics and Transportation Review, 125, 203-221.Search in Google Scholar
Sarker, I. H., Abushark, Y. B., Alsolami, F., & Khan, A. I. (2020). Intrudtree: a machine learning based cyber security intrusion detection model. Symmetry, 12(5), 754.Search in Google Scholar
Devi Suman & Kumar Avadhesh.(2024).Establishment of secure and authentic data security framework in wireless sensor network using key reconciliation.International Journal of Information Technology(5), 3325-3336.Search in Google Scholar
Fitri Rachmillah Fadmi,Bambang Widjanarko Otok,Kuntoro,Soenarnatalina Melaniani & Riry Sriningsih.(2024).Segmentation of stunting, wasting, and underweight in Southeast Sulawesi using geographically weighted multivariate Poisson regression.MethodsX102736-.Search in Google Scholar
Hu Rong & Huang Ping.(2024).Enhanced Secure Storage of Big Data at Rest with Improved ECC and Paillier Homomorphic Encryption Algorithms.Tehnički vjesnik(2),510-517.Search in Google Scholar
Dua M. Ghadi.(2024).Improving the Robustness of RSA Encryption Through Input-Based Key Generation.Mathematical Modelling of Engineering Problems(1),Search in Google Scholar