分享
[1]李明洋.面向空管自动化系统的移动介质零信任安全交换体系研究[J].成都信息工程大学学报,2025,40(06):772-779.[doi:10.16836/j.cnki.jcuit.2025.06.005]
 LI Mingyang.A Zero-Trust Security Architecture for Removable Media Exchange in Air Traffic Control Automation Systems[J].Journal of Chengdu University of Information Technology,2025,40(06):772-779.[doi:10.16836/j.cnki.jcuit.2025.06.005]
点击复制

面向空管自动化系统的移动介质零信任安全交换体系研究

参考文献/References:

[1] Elochukwu Ukwandu,Mohamed Amine Ben Farah,Hanan Hindy,et al.Cyber-Security Challenges in Aviation Industry:A Review of Current and Future Trends[J].arXiv:2107.04910,2022.
[2] Espen Nystad,John Eidar Simensen,Christian Raspotnig.Investigating operative cybersecurity awareness in air traffic control[C].2021 14th International Conference on Security of Information and Networks(SIN),2021.
[3] Tang A C.A Review on Cybersecurity Vulnerabilities for Urban Air Mobility[C/OL].AIAA Scitech 2021 Forum.American Institute of Aeronautics and Astronautics,2021.
[4] Raheman F.From Standard Policy-Based Zero Trust to Absolute Zero Trust(AZT):A Quantum Leap to Q-Day Security[J/OL].Journal of Computer and Communications,2024,12(3):252-282.
[5] Rose S,Borchert O,Mitchell S,et al.Zero Trust Architecture[A/OL].National Institute of Standards and Technology,2020.
[6] 王布宏,罗鹏,阳勇,等.空中交通管理系统网络安全研究综述与展望[J].电子与信息学报,2025,47(5):1230-1265.
[7] Strohmeier M,Schafer M,Lenders V,et al.Realities and challenges of nextgen air traffic management:the case of ADS-B[J/OL].IEEE Communications Magazine,2014,52(5):111-118.
[8] Pejovic T,Netjasov F,Crnogorac D.Relationship between Air Traffic Demand,Safety and Complexity in High-Density Airspace in Europe[M/OL].Risk Assessment in Air Traffic Management.Intech Open,2020.
[9] ICAO.Global air traffic management operational concept[R].
[10] 左英男.零信任架构在关键信息基础设施安全保护中的应用研究[J].保密科学技术,2019(11):6.
[11] Jiang Y,Dou Y,Hu A.Identification of IoT Devices Based on Hardware and Software Fingerprint Features[J/OL].Symmetry,2024,16(7):846.
[12] Chaudhary A.Formal Models and Convergence Analysis for Context-Aware Security Verification[A/OL].arXiv preprint.arXiv,2025.
[13] Rodriguez Rodriguez L,Bustamante Orellana C E,Chiou E K,et al.A review of mathematical models of human trust in automation[J/OL].Frontiers in Neuroergonomics,2023,4.
[14] Harang R,Rudd E M.SOREL-20M:A Large Scale Benchmark Dataset for Malicious PE Detection[A/OL].arXiv preprint.arXiv,2020.
[15] F Alshmarni A,A Alliheedi M.Enhancing Malware Detection by Integrating Machine Learning with Cuckoo Sandbox[J/OL].Journal of Information Security and Cybercrimes Research,2024,7(1):85-92.

备注/Memo

收稿日期:2025-06-30
通信作者:李明洋.E-mail:leehack165@gmail.com

更新日期/Last Update: 2025-12-01