{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T21:51:08Z","timestamp":1724881868422},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1109\/sin54109.2021.9699243","type":"proceedings-article","created":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T20:28:50Z","timestamp":1644524930000},"source":"Crossref","is-referenced-by-count":5,"title":["Smart Connected Aircraft: Towards Security, Privacy, and Ethical Hacking"],"prefix":"10.1109","author":[{"given":"Md Jobair Hossain","family":"Faruk","sequence":"first","affiliation":[]},{"given":"Paul","family":"Miner","sequence":"additional","affiliation":[]},{"given":"Ryan","family":"Coughlan","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Masum","sequence":"additional","affiliation":[]},{"given":"Hossain","family":"Shahriar","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Clincy","sequence":"additional","affiliation":[]},{"given":"Coskun","family":"Cetinkaya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"kim","year":"2015","journal-title":"Is it possible for passengers to hack commercial aircraft"},{"key":"ref11","author":"safety","year":"2018","journal-title":"Cyber security and aircraft operations In flight does not mean in the clear"},{"key":"ref12","author":"air","year":"2014","journal-title":"The anatomy of inflight connectivity"},{"key":"ref13","author":"higgins","year":"2018","journal-title":"Researcher successfully hacked in-flight airplanes - from the ground"},{"key":"ref14","first-page":"1","author":"smith","year":"2016","journal-title":"On the security and privacy of acars"},{"key":"ref15","year":"2019","journal-title":"Wireshark Website"},{"key":"ref16","year":"2019","journal-title":"Wireshark Website"},{"key":"ref17","article-title":"Bayesian hyperparameter optimization for deep neural network-based network intrusion detection","author":"mohammad","year":"0","journal-title":"2021 IEEE International Conference on Big Data"},{"key":"ref18","article-title":"Malware detection and prevention using artificial intelligence techniques","author":"faruk","year":"0","journal-title":"2021 IEEE International Conference on Big Data"},{"key":"ref19","article-title":"Ehr data management: Hyper-ledger fabric-based health data storing and sharing","author":"faruk","year":"0","journal-title":"The Fall 2021 Symposium of Student Scholars"},{"key":"ref4","year":"2016","journal-title":"Aircraft systems information security\/protection (asisp) report"},{"key":"ref3","author":"baskas","year":"2019","journal-title":"Delta's test of free in-flight wi-fi may shame other airlines into offering service"},{"key":"ref6","author":"honeywell","year":"2016","journal-title":"The connected aircraft How aviation is changing"},{"key":"ref5","author":"don van","year":"0","journal-title":"Connected aircraft and cybersecurity"},{"key":"ref8","author":"kitchenham","year":"2007","journal-title":"Guidelines for Performing Systematic Literature Reviews in Software Engineering"},{"key":"ref7","author":"wolfe","year":"2020","journal-title":"Will today's cybersecurity guidelines and standards become mandates for connected aircraft systems?"},{"key":"ref2","author":"fox","year":"2013","journal-title":"What is the cost of equipping a plane with wi-fi"},{"key":"ref1","article-title":"On History of Technology Website","year":"2014","journal-title":"Information age a collaborative effort"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916617"},{"key":"ref20","article-title":"Towards blockchain-based secure data management for remote patient monitoring","author":"faruk","year":"0","journal-title":"IEEE International Conference on Digital Health (ICDH)"},{"key":"ref21","article-title":"Ride-hailing for autonomous vehicles: Hyperledger fabric-based secure and decentralize blockchain platform","author":"ryan","year":"0","journal-title":"IEEE International Conference on Big Data"}],"event":{"name":"2021 14th International Conference on Security of Information and Networks (SIN)","location":"Edinburgh, United Kingdom","start":{"date-parts":[[2021,12,15]]},"end":{"date-parts":[[2021,12,17]]}},"container-title":["2021 14th International Conference on Security of Information and Networks (SIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9698820\/9699137\/09699243.pdf?arnumber=9699243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:22Z","timestamp":1652201962000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9699243\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/sin54109.2021.9699243","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]}}}