BibTeX record journals/iet-ifs/LiWSTC20

download as .bib file

@article{DBLP:journals/iet-ifs/LiWSTC20,
  author       = {Tengyao Li and
                  Buhong Wang and
                  Fute Shang and
                  Jiwei Tian and
                  Kunrui Cao},
  title        = {Threat model and construction strategy on {ADS-B} attack data},
  journal      = {{IET} Inf. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {542--552},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-ifs.2018.5635},
  doi          = {10.1049/IET-IFS.2018.5635},
  timestamp    = {Mon, 28 Aug 2023 21:31:20 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiWSTC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics