2018 XIII International Scientific Conference - New Trends in Aviation Development (NTAD) 2018
DOI: 10.1109/ntad.2018.8551678
|View full text |Cite
|
Sign up to set email alerts
|

Current Status of Cyber Security in the Surveillance Data Processing Systems in Europe

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…To overcome the vulnerability of the protocol, the data between the sensors and the input/output gateway to the ATC centre should flow through an encrypted VPN (Virtual Private Network) or secured tunnels. [7] The Fig. 2 shows the example of a typical layoff of such arrangement.…”
Section: Current Statusmentioning
confidence: 99%
“…To overcome the vulnerability of the protocol, the data between the sensors and the input/output gateway to the ATC centre should flow through an encrypted VPN (Virtual Private Network) or secured tunnels. [7] The Fig. 2 shows the example of a typical layoff of such arrangement.…”
Section: Current Statusmentioning
confidence: 99%