Threat model and construction strategy on ADS-B attack data.
Tengyao LiBuhong WangFute ShangJiwei TianKunrui CaoPublished in: IET Inf. Secur. (2020)
Keyphrases
- data sets
- experimental data
- prior knowledge
- high level
- data sources
- probability distribution
- computational model
- synthetic data
- data collection
- statistical model
- empirical data
- database
- original data
- data mining techniques
- data structure
- learning models
- statistical methods
- network structure
- data samples
- mathematical model
- measured data
- input data
- end users
- probabilistic model
- data analysis
- data processing
- sensor data
- image data
- knowledge discovery
- data points
- prior information
- xml documents
- predictive model
- learned models
- neural network