{"id":"https://openalex.org/W2401122082","doi":"https://doi.org/10.1109/cycon.2016.7529437","title":"Assessing the impact of aviation security on cyber power","display_name":"Assessing the impact of aviation security on cyber power","publication_year":2016,"publication_date":"2016-05-01","ids":{"openalex":"https://openalex.org/W2401122082","doi":"https://doi.org/10.1109/cycon.2016.7529437","mag":"2401122082"},"language":"en","primary_location":{"id":"doi:10.1109/cycon.2016.7529437","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cycon.2016.7529437","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 8th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079874685","display_name":"Martin Strohmeier","orcid":"https://orcid.org/0000-0002-1936-0933"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Martin Strohmeier","raw_affiliation_strings":["Department of Computer Science, University of Oxford, Oxford, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Oxford, Oxford, United Kingdom","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053102600","display_name":"Mathias Sch\u00e4fer","orcid":"https://orcid.org/0000-0002-5943-4335"},"institutions":[{"id":"https://openalex.org/I153267046","display_name":"University of Kaiserslautern","ror":"https://ror.org/04zrf7b53","country_code":"DE","type":"education","lineage":["https://openalex.org/I153267046"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Matthias Schafer","raw_affiliation_strings":["Department of Computer Science, University of Kaiserslautern, Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Kaiserslautern, Kaiserslautern, Germany","institution_ids":["https://openalex.org/I153267046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089336554","display_name":"Matt Smith","orcid":null},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Matt Smith","raw_affiliation_strings":["Department of Computer Science, University of Oxford, Oxford, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Oxford, Oxford, United Kingdom","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048330561","display_name":"Vincent Lenders","orcid":"https://orcid.org/0000-0002-2289-3722"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vincent Lenders","raw_affiliation_strings":["Science and Technology, Armasuisse Thun, Switzerland"],"affiliations":[{"raw_affiliation_string":"Science and Technology, Armasuisse Thun, Switzerland","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033928805","display_name":"Ivan Martinovi\u0107","orcid":"https://orcid.org/0000-0003-2340-3040"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ivan Martinovic","raw_affiliation_strings":["Department of Computer Science, University of Oxford, Oxford, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Oxford, Oxford, United Kingdom","institution_ids":["https://openalex.org/I40120149"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5079874685"],"corresponding_institution_ids":["https://openalex.org/I40120149"],"apc_list":null,"apc_paid":null,"fwci":110.4434,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.99834062,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"223","last_page":"241"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/avionics","display_name":"Avionics","score":0.6929025650024414},{"id":"https://openalex.org/keywords/aviation","display_name":"Aviation","score":0.6691358089447021},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6308894753456116},{"id":"https://openalex.org/keywords/air-traffic-control","display_name":"Air traffic control","score":0.5551745295524597},{"id":"https://openalex.org/keywords/airport-security","display_name":"Airport security","score":0.48918870091438293},{"id":"https://openalex.org/keywords/air-traffic-management","display_name":"Air traffic management","score":0.48202836513519287},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.45992642641067505},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.44778311252593994},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.43152710795402527},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.40308260917663574},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3778982162475586}],"concepts":[{"id":"https://openalex.org/C15792166","wikidata":"https://www.wikidata.org/wiki/Q221329","display_name":"Avionics","level":2,"score":0.6929025650024414},{"id":"https://openalex.org/C74448152","wikidata":"https://www.wikidata.org/wiki/Q765633","display_name":"Aviation","level":2,"score":0.6691358089447021},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6308894753456116},{"id":"https://openalex.org/C166961238","wikidata":"https://www.wikidata.org/wiki/Q221395","display_name":"Air traffic control","level":2,"score":0.5551745295524597},{"id":"https://openalex.org/C180646296","wikidata":"https://www.wikidata.org/wiki/Q1378517","display_name":"Airport security","level":2,"score":0.48918870091438293},{"id":"https://openalex.org/C2776777543","wikidata":"https://www.wikidata.org/wiki/Q1361182","display_name":"Air traffic management","level":3,"score":0.48202836513519287},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.45992642641067505},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.44778311252593994},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.43152710795402527},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.40308260917663574},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3778982162475586},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cycon.2016.7529437","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cycon.2016.7529437","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 8th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"},{"id":"pmh:oai:ora.ox.ac.uk:uuid:cfc16915-e6f8-49bd-80c9-f397a94b85cc","is_oa":false,"landing_page_url":"https://ora.ox.ac.uk/objects/uuid:cfc16915-e6f8-49bd-80c9-f397a94b85cc","pdf_url":null,"source":{"id":"https://openalex.org/S4306402636","display_name":"Oxford University Research Archive (ORA) (University of Oxford)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40120149","host_organization_name":"University of Oxford","host_organization_lineage":["https://openalex.org/I40120149"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference item"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1515073590","https://openalex.org/W1565533147","https://openalex.org/W1946476891","https://openalex.org/W1981647260","https://openalex.org/W2078429717","https://openalex.org/W2097792745","https://openalex.org/W2116520617","https://openalex.org/W2118756516","https://openalex.org/W2131099474","https://openalex.org/W2137417529","https://openalex.org/W2159329869","https://openalex.org/W2162783010","https://openalex.org/W2288762662","https://openalex.org/W2619874920","https://openalex.org/W3041137290","https://openalex.org/W3104706117","https://openalex.org/W4232166910","https://openalex.org/W4256497308","https://openalex.org/W6738520201","https://openalex.org/W6779866417"],"related_works":["https://openalex.org/W2135905813","https://openalex.org/W2152735681","https://openalex.org/W1534603971","https://openalex.org/W2043775914","https://openalex.org/W631350582","https://openalex.org/W2008390173","https://openalex.org/W2585807273","https://openalex.org/W2091753509","https://openalex.org/W4205399654","https://openalex.org/W1508688136"],"abstract_inverted_index":{"We":[0],"analyse":[1,220],"the":[2,14,49,52,57,61,83,91,133,154,159,169,172,178,189,193,195,227,235],"impact":[3,144],"of":[4,51,136,139,161,180,192,197,229],"new":[5,67],"wireless":[6,93,182],"technology":[7,94,103],"threat":[8,95,116,129,140],"models":[9,96,117],"on":[10,132,145,212],"cyber":[11,230],"power,":[12],"using":[13,40],"aviation":[15,53,148,162,173,236],"context":[16],"as":[17,30],"an":[18],"example.":[19],"The":[20],"ongoing":[21],"move":[22],"from":[23,175],"traditional":[24,113],"air":[25,68],"traffic":[26,69],"control":[27,70],"systems":[28,39],"such":[29],"radar":[31],"and":[32,37,60,71,127,142,165,200,208,232],"voice":[33],"towards":[34],"enhanced":[35],"surveillance":[36],"communications":[38],"modern":[41],"data":[42],"networks":[43],"causes":[44],"a":[45,125,146,209],"marked":[46],"shift":[47,225],"in":[48,82,234],"security":[50,160,179],"environment.":[54],"Implemented":[55],"through":[56],"European":[58],"SESAR":[59],"US":[62],"American":[63],"NextGen":[64],"programmes,":[65],"several":[66],"communication":[72,149],"protocols":[73],"are":[74,118],"currently":[75],"being":[76],"rolled":[77],"out":[78],"that":[79],"have":[80],"been":[81],"works":[84],"for":[85,243],"decades.":[86],"Unfortunately,":[87],"during":[88],"their":[89,143],"development":[90,206],"shifting":[92],"were":[97],"not":[98],"taken":[99],"into":[100],"account.":[101],"As":[102],"related":[104],"to":[105,216],"digital":[106],"avionics":[107],"is":[108],"getting":[109],"more":[110],"widely":[111],"accessible,":[112],"electronic":[114],"warfare":[115],"fast":[119],"becoming":[120],"obsolete.":[121],"This":[122],"paper":[123],"defines":[124],"novel":[126],"realistic":[128],"model":[130],"based":[131],"up-to-date":[134],"capabilities":[135],"different":[137],"types":[138],"agents":[141],"digitalised":[147],"system.":[150],"After":[151],"analysing":[152],"how":[153,221],"changing":[155],"technological":[156,224],"environment":[157,237],"affects":[158],"technologies,":[163],"current":[164],"future,":[166],"we":[167,187,219],"discuss":[168],"reasons":[170],"preventing":[171],"industry":[174],"quickly":[176],"improving":[177],"its":[181],"protocols.":[183],"Among":[184],"these":[185],"reasons,":[186],"identify":[188],"existing":[190],"tradition":[191],"industry,":[194],"prevalence":[196],"legacy":[198],"hard-":[199],"software,":[201],"major":[202,223],"cost":[203],"pressures,":[204],"slow":[205],"cycles,":[207],"narrow":[210],"focus":[211],"safety":[213],"(as":[214],"opposed":[215],"security).":[217],"Finally,":[218],"this":[222],"informs":[226],"future":[228],"power":[231],"conflict":[233],"by":[238],"looking":[239],"at":[240],"tangible":[241],"effects":[242],"state":[244],"actors.":[245]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
