Hot Keywords
Cyber-physical systems Post-quantum cryptography Public-key cryptography Edge computing Anti-forensics Big data security control selection Attacks on IoT systems Domain Name System DNS attacks Network security Transport layer security protocol

Top

Volume 3, Issue 2 (June, 2022) –

Cover Picture: In this original article, a detailed taxonomy predicated on security vulnerability is presented. Further, this paper discusses the research aspects and challenges to be taken care of in aviation security and communication Finally, a summary of the current state of threats and their consequences for widely-used aviation models is concluded. The result shows that the aviation system is still exposed to various attacks. Key technological challenges that have been serving as a deterrent to adopting more secure alternative approaches, as well as research avenues where further progress is needed are examined.
view this paper

Original Article

Actions for selected articles

© 2016-2023 OAE Publishing Inc., except certain content provided by third parties