{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:35:43Z","timestamp":1732037743547},"reference-count":30,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1016\/j.cose.2018.07.004","type":"journal-article","created":{"date-parts":[[2018,7,11]],"date-time":"2018-07-11T01:10:03Z","timestamp":1531271403000},"page":"155-173","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":93,"special_numbering":"C","title":["Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages"],"prefix":"10.1016","volume":"78","author":[{"given":"Edan","family":"Habler","sequence":"first","affiliation":[]},{"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2018.07.004_bib0001","series-title":"2014 IEEE International Conference on Big Data (Big Data)","first-page":"165","article-title":"Large-scale network traffic monitoring with DBStream, a system for rolling big data analysis","author":"B\u00e4r","year":"2014"},{"key":"10.1016\/j.cose.2018.07.004_bib0002","series-title":"In: Proceedings of IEEE 18th international symposium on high assurance systems engineering (HASE), 2017","first-page":"153","article-title":"A proxy-based solution for securiting remote desktop connections in mission-critical systems","author":"Bitton","year":"2017"},{"key":"10.1016\/j.cose.2018.07.004_bib0003","series-title":"International Civil Aviation Organization","article-title":"ADS-B Implementation and Operations Guidance Document","author":"Blythe","year":"2011"},{"issue":"2","key":"10.1016\/j.cose.2018.07.004_bib0004","first-page":"93","article-title":"LOF: identifying density-based local outliers","volume":"29","author":"Breunig","year":"2000"},{"key":"10.1016\/j.cose.2018.07.004_bib0005","series-title":"In: Proceedings of the 2001 International Conference on Image Processing, 2001, vol. 1","first-page":"34","article-title":"One-class SVM for learning in image retrieval","author":"Chen","year":"2001"},{"key":"10.1016\/j.cose.2018.07.004_bib0006","series-title":"Proceedings of Black Hat USA","first-page":"1","article-title":"Ghost in the air (traffic): on insecurity of ADS-B protocol and practical attacks on ADS-B devices","author":"Costin","year":"2012"},{"key":"10.1016\/j.cose.2018.07.004_bib0007","series-title":"In: Proceedings of the 27th international congress of the aeronautical sciences, ICAS","first-page":"1","article-title":"A data authentication solution of ADS-B system based on x. 509 certificate","author":"Feng","year":"2010"},{"issue":"1","key":"10.1016\/j.cose.2018.07.004_bib0008","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.ijcip.2013.02.001","article-title":"Enhancing the security of aircraft surveillance in the next generation air traffic control system","volume":"6","author":"Finke","year":"2013","journal-title":"Int J Crit Infrastruct Protect"},{"key":"10.1016\/j.cose.2018.07.004_bib0009","series-title":"In: Proceedings of the digital avionics systems conference (DASC), 2015 IEEE\/AIAA 34th","first-page":"4A2","article-title":"Verifying ADS-B navigation information through doppler shift measurements","author":"Ghose","year":"2015"},{"issue":"5","key":"10.1016\/j.cose.2018.07.004_bib0010","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1016\/j.neunet.2005.06.042","article-title":"Framewise phoneme classification with bidirectional LSTM and other neural network architectures","volume":"18","author":"Graves","year":"2005","journal-title":"Neural Netw"},{"issue":"10","key":"10.1016\/j.cose.2018.07.004_bib0011","doi-asserted-by":"crossref","first-page":"2222","DOI":"10.1109\/TNNLS.2016.2582924","article-title":"LSTM: a search space odyssey","volume":"28","author":"Greff","year":"2017","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"10.1016\/j.cose.2018.07.004_bib0012","doi-asserted-by":"crossref","DOI":"10.1109\/TBDATA.2017.2736555","article-title":"Detecting anomalous behavior in cloud servers by nested arc hidden SEMI-Markov model with state summarization","author":"Haider","year":"2017","journal-title":"IEEE Trans Big Data"},{"issue":"8","key":"10.1016\/j.cose.2018.07.004_bib0013","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","author":"Hochreiter","year":"1997","journal-title":"Neural Comput"},{"issue":"1","key":"10.1016\/j.cose.2018.07.004_bib0014","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MNET.2009.4804323","article-title":"A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection","volume":"23","author":"Hu","year":"2009","journal-title":"IEEE Netw"},{"key":"10.1016\/j.cose.2018.07.004_bib0015","series-title":"In: Proceedings of the integrated communication, navigation, and surveillance conference (ICNS), 2015","first-page":"P3","article-title":"Key distribution mechanism in secure ADS-B networks","author":"Kacem","year":"2015"},{"key":"10.1016\/j.cose.2018.07.004_bib0016","unstructured":"Kiros R, Salakhutdinov R, Zemel RS. Unifying visual-semantic embeddings with multimodal neural language models. CoRR abs\/1411.2539 (2014). (2014)."},{"key":"10.1016\/j.cose.2018.07.004_bib0017","doi-asserted-by":"crossref","unstructured":"Liu FT, Ting KM, Zhou ZH. Isolation forest2008:413\u2013422.","DOI":"10.1109\/ICDM.2008.17"},{"key":"10.1016\/j.cose.2018.07.004_bib0018","unstructured":"Malhotra P, Ramakrishnan A, Anand G, Vig L, Agarwal P, Shroff G. LSTM-based encoder-decoder for multi-sensor anomaly detection. arXiv preprint arXiv:160700148 2016."},{"issue":"2","key":"10.1016\/j.cose.2018.07.004_bib0019","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.ijcip.2011.06.001","article-title":"Security analysis of the ADS-B implementation in the next generation air transportation system","volume":"4","author":"McCallie","year":"2011","journal-title":"Int J Crit Infrastruct Protect"},{"key":"10.1016\/j.cose.2018.07.004_bib0020","series-title":"In: Proceedings of the international conference on applied cryptography and network security","first-page":"253","article-title":"Experimental analysis of attacks on next generation air traffic communication","author":"Sch\u00e4fer","year":"2013"},{"key":"10.1016\/j.cose.2018.07.004_bib0021","series-title":"In: Proceedings of the IEEE symposium on security and privacy (SP), 2015","first-page":"199","article-title":"Secure track verification","author":"Sch\u00e4fer","year":"2015"},{"key":"10.1016\/j.cose.2018.07.004_bib0022","series-title":"In: Proceedings of the 9th ACM conference on security & privacy in wireless and mobile networks","first-page":"135","article-title":"Secure motion verification using the doppler effect","author":"Sch\u00e4fer","year":"2016"},{"key":"10.1016\/j.cose.2018.07.004_bib0023","series-title":"Advances in neural information processing systems","first-page":"582","article-title":"Support vector method for novelty detection","author":"Sch\u00f6lkopf","year":"2000"},{"key":"10.1016\/j.cose.2018.07.004_bib0024","series-title":"In: Proceedings of the IEEE\/AIAA 25th digital avionics systems conference, 2006","first-page":"1","article-title":"Methods to provide system-wide ADS-B back-up, validation and security","author":"Smith","year":"2006"},{"key":"10.1016\/j.cose.2018.07.004_bib0025","series-title":"In: Proceedings of the 24th ACM international on conference on information and knowledge management","first-page":"553","article-title":"A hierarchical recurrent encoder-decoder for generative context-aware query suggestion","author":"Sordoni","year":"2015"},{"key":"10.1016\/j.cose.2018.07.004_bib0026","series-title":"In: Proceedings of the international conference on detection of intrusions and malware, and vulnerability assessment","first-page":"67","article-title":"Intrusion detection for airborne communication using phy-layer information","author":"Strohmeier","year":"2015"},{"key":"10.1016\/j.cose.2018.07.004_bib0027","series-title":"In: Proceedings of the 1st ACM workshop on cyber-physical system security","first-page":"49","article-title":"Lightweight location verification in air traffic surveillance networks","author":"Strohmeier","year":"2015"},{"issue":"2","key":"10.1016\/j.cose.2018.07.004_bib0028","doi-asserted-by":"crossref","first-page":"1066","DOI":"10.1109\/COMST.2014.2365951","article-title":"On the security of the automatic dependent surveillance-broadcast protocol","volume":"17","author":"Strohmeier","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"176","key":"10.1016\/j.cose.2018.07.004_bib0029","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1179\/sre.1975.23.176.88","article-title":"Direct and inverse solutions of geodesics on the ellipsoid with application of nested equations","volume":"23","author":"Vincenty","year":"1975","journal-title":"Surv. Rev."},{"key":"10.1016\/j.cose.2018.07.004_bib0030","series-title":"In: Proceedings of the fourth ACM conference on wireless network security","first-page":"47","article-title":"Short paper: reactive jamming in wireless networks: how realistic is the threat?","author":"Wilhelm","year":"2011"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404818303729?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404818303729?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,10,20]],"date-time":"2019-10-20T15:36:50Z","timestamp":1571585810000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404818303729"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":30,"alternative-id":["S0167404818303729"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2018.07.004","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2018,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2018.07.004","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}