LEADER 05886nam 22006013 450 001 9911006719903321 005 20231110230518.0 010 $a1-83724-609-2 010 $a1-5231-4236-7 010 $a1-83953-322-6 035 $a(MiAaPQ)EBC6811596 035 $a(Au-PeEL)EBL6811596 035 $a(CKB)19919151300041 035 $a(OCoLC)1287131478 035 $a(NjHacI)9919919151300041 035 $a(PPN)267629338 035 $a(EXLCZ)9919919151300041 100 $a20211129d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAviation Cybersecurity $eFoundations, Principles, and Applications 205 $a1st ed. 210 1$aStevenage :$cInstitution of Engineering & Technology,$d2022. 210 4$d©2022. 215 $a1 online resource (328 pages) 225 1 $aRadar, Sonar and Navigation 311 08$a1-83953-321-8 320 $aIncludes bibliographical references and index. 327 $aIntro -- Contents -- About the editors -- Preface -- 1. Counter unmanned aerial vehicle for aviation security | Chengtao Xu, Yongxin Liu, JianWang, and Houbing Song -- 1.1 Introduction -- 1.2 Background -- 1.3 UAS detection -- 1.4 Radar-based UAS detection -- 1.5 Data-fusion-based UAS detection -- 1.6 UAS mitigation -- 1.7 Conclusion and remarks -- References -- 2. Formal verification of safety-critical software using SPARK | Laura Humphrey, Ryan Baity, and Kenneth Hopkinson -- 2.1 Introduction -- 2.2 Background on SPARK -- 2.3 An example of SPARK for cybersecurity -- 2.4 Aerospace and cybersecurity projects utilizing SPARK -- 2.5 Summary -- Acknowledgements -- References -- 3. Drone surveillance system-RF/WiFi-based drone detection, localization, and tracking: a survey | Igor Bisio, Chiara Garibotto, Halar Haleem, Fabio Lavagetto, and Andrea Sciarrone -- 3.1 Introduction -- 3.2 Drone surveillance system and RF/WiFi approach -- 3.3 Drone detection system -- 3.4 Drone localization system -- 3.5 Drone-tracking system -- 3.6 Research trends and challenges -- 3.7 Summary -- References -- 4. Cybersecurity for the L-band Digital Aeronautical Communications System (LDACS) | Nils Mäurer, Thomas Gräupl, and Corinna Schmitt -- 4.1 Introduction -- 4.2 Background on LDACS -- 4.3 Security requirements, objectives and functions -- 4.4 A comprehensive cybersecurity architecture for LDACS -- 4.5 Evaluation of the LDACS cybersecurity architecture -- 4.6 Conclusion -- References -- 5. Using terrestrial ranging to monitor GNSS for targeted RF interference | Okuary Osechas, Omar García Crespillo1, and Michael Meurer -- 5.1 Background -- 5.2 Fault mechanism -- 5.3 Fault monitoring -- 5.4 Fault-free operation -- 5.5 Faulted operation -- 5.6 Discussion -- 5.7 Conclusion -- References. 327 $a6. Security risk assessments and countermeasures for future aeronautical communication network architecture | Muhammad Ali, Yim-Fun Hu, Rameez Asif, and Jiang-Ping Li -- 6.1 Introduction -- 6.2 Security for data link communications in aviation -- 6.3 Target avionics network architecture -- 6.4 Security risk assessment and treatment -- 6.5 Target network security risk assessment using CESG IAS -- 6.6 Define and assess threat sources -- 6.7 Define focus of interest (FoI) -- 6.8 Define threat actors -- 6.9 Identify estimate and priorities risks -- 6.10 Apply baseline countermeasure controls -- 6.11 Risk treatment -- 6.12 Conclusion -- References -- 7. Physical layer security in wireless HetNets avionics and satellite communication systems | Rameez Asif, Muhammad Ali, Yim-Fun Hu, and George Oguntala -- 7.1 Introduction -- 7.2 Attacks, attackers and impact -- 7.3 Fundamental security requirements of aeronautical communications -- 7.4 Security mechanisms -- 7.5 Physical layer security -- 7.6 Secrecy performance metrics -- 7.7 Physical layer security techniques -- 7.8 Physical layer - attack and countermeasures -- 7.9 Conclusion -- References -- 8. Cybersecurity and privacy issues | Dennis A. Vincenzi, Yupeng Yang, and Dahai Liu -- 8.1 Introduction -- 8.2 Privacy law -- 8.3 Privacy and cybersecurity privacy case law -- 8.4 Cybersecurity-related application -- 8.5 Discussion -- 8.6 Conclusion -- References -- 9. Workforce training and development in cybersecurity | Jiahao Yu, Sang-A Lee, and Dahai Liu -- 9.1 Introduction -- 9.2 Cybersecurity workforce training -- 9.3 Common training approaches -- 9.4 Summary -- References -- 10. Aviation cybersecurity: a cyber-physical systems perspective | Faisal Alrefaei, Abdullah Alzahrani, Houbing Song, and Mohamed Zohdy -- 10.1 Introduction -- 10.2 Importance of security in ACPSs -- 10.3 ACPS architecture. 327 $a10.4 Cyberattack on the ACPSs -- 10.5 Threats in the ACPS -- 10.6 Security of wireless sensor networks in aviation -- 10.7 Conclusion -- References -- Index. 330 $aThe interdisciplinary nature of aviation cybersecurity and its wide-ranging impact requires contributions of expertise from multiple disciplines to collaborate in identifying ways forward. This book provides an understanding of the key technical, social and legal issues in aviation cybersecurity, and proposes innovative solutions. 410 0$aRadar, Sonar and Navigation 606 $aAeronautics$xSecurity measures 606 $aAeronautics$xSafety measures 615 0$aAeronautics$xSecurity measures. 615 0$aAeronautics$xSafety measures. 676 $a363.124 700 $aSong$b Houbing$01824628 701 $aHopkinson$b Kenneth$01824629 701 $aDe Cola$b Tomaso$01824630 701 $aAlexandrovich$b Tom$01824631 701 $aLiu$b Dahai$01824632 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911006719903321 996 $aAviation Cybersecurity$94391836 997 $aUNINA