{"version":"1.0","provider_name":"TTTP Traffic and Transport Theory and Practice Journal","provider_url":"https:\/\/tttp-au.com","author_name":"admin","author_url":"https:\/\/tttp-au.com\/index.php\/author\/jita-au-com\/","title":"Aviation cyber security - TTTP Traffic and Transport Theory and Practice Journal","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"oiyykbeKcE\"><a href=\"https:\/\/tttp-au.com\/index.php\/2024\/04\/29\/aviation-cyber-security\/\">Aviation cyber security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/tttp-au.com\/index.php\/2024\/04\/29\/aviation-cyber-security\/embed\/#?secret=oiyykbeKcE\" width=\"600\" height=\"338\" title=\"&#8220;Aviation cyber security&#8221; &#8212; TTTP Traffic and Transport Theory and Practice Journal\" data-secret=\"oiyykbeKcE\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/tttp-au.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/tttp-au.com\/wp-content\/uploads\/2024\/03\/cover_issue_949_en_US.jpg","thumbnail_width":595,"thumbnail_height":793,"description":"Vol. 8 No. 1-2 (2023): TTTP &#8211; APEIRON Boris Z. Ribari\u0107, Dragan Vasiljevi\u0107, Julijana Vasiljevi\u0107, Boris R. Mikanovi\u0107 Aviation cyber security Original scientific paper DOI: 10.7251\/JTTTP2302037R Download Article PDF Abstract Information technology is increasingly prevalent in all branches of traffic. In aviation, a signifi- cant amount of data is processed by computerized systems and transmitted through communication networks. Within this digital environment, characterized by technology and a vast number of digital files, a security system is essential to ensure the proper functioning of the system. To achieve effective and efficient information security management, it is crucial to thoroughly examine the factors influenc- ing information security and plan the necessary measures for implementation. Keywords : information system, safety, cyber, aviation. Vol. 26 No. 2 (2023): JITA &#8211; APEIRON Igor Shubinsky, Alexey Ozerov Application of Artificial Intelligence Methods for the Prediction of Hazardous Failures Original scientific paper DOI: https:\/\/doi.org\/10.7251\/JIT2302061S Download Article PDF Abstract The availability of real-time data on the state of railway facilities and the state-of-the art technologies for data collection and analysis allow transition to the fourth generation maintenance. It is based on the prediction of the facility functional safety and dependability and the risk-oriented facility management. The article describes an approach to assessing the risks of hazardous facility failures using the latest digital data processing methods. The implementation of this approach will help set maintenance objectives and contribute to the efficient use of resources and the reduction of railway facility managers\u2019 expenditures. Keywords: predictive analysis, maintenance, functional safety, Big Data, Data Science, risk indicators. Vol. 8 No. 1-2 (2023): TTTP &#8211; APEIRON Boris Z. Ribari\u0107, Dragan Vasiljevi\u0107, Julijana Vasiljevi\u0107, Boris R. Mikanovi\u0107 viation Cyber Security Original scientific paper DOI: 10.7251\/JTTTP2302037R Download Article PDF Abstract Information technology is increasingly prevalent in all branches of traffic. In aviation, a signifi- cant amount of data is processed by computerized systems and transmitted through communication networks. Within this digital environment, characterized by technology and a vast number of digital files, a security system is essential to ensure the proper functioning of the system. To achieve effective and efficient information security management, it is crucial to thoroughly examine the factors influenc- ing information security and plan the necessary measures for implementation. Keywords : Information System, Safety, Cyber, Aviation."}