{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:12:07Z","timestamp":1743127927959,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030839055"},{"type":"electronic","value":"9783030839062"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-83906-2_9","type":"book-chapter","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T23:05:04Z","timestamp":1629846304000},"page":"117-127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Formal Modelling of the Impact of Cyber Attacks on Railway Safety"],"prefix":"10.1007","author":[{"given":"Ehsan","family":"Poorhadi","sequence":"first","affiliation":[]},{"given":"Elena","family":"Troubitysna","sequence":"additional","affiliation":[]},{"given":"Gy\u00f6rgy","family":"D\u00e1n","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,25]]},"reference":[{"issue":"2","key":"9_CR1","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/2556938","volume":"57","author":"W Young","year":"2014","unstructured":"Young, W., Leveson, N.G.: An integrated approach to safety and security based on systems theory. Commun. ACM 57(2), 31\u201335 (2014)","journal-title":"Commun. ACM"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"335","DOI":"10.2495\/SAFE150291","volume":"VI","author":"S Paul","year":"2015","unstructured":"Paul, S., Rioux, L.: Over 20 years of research into cybersecurity and safety engineering: a short bibliography. Saf. Secur. Eng. VI, 335 (2015)","journal-title":"Saf. Secur. Eng."},{"key":"9_CR3","unstructured":"Steiner, M., Liggesmeyer, P.: Combination of safety and security analysis - finding security problems that threaten the safety of a system. In: SAFECOMP 2013 - Workshop DECS-2013 (2013)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Bouissou, M.: Modeling safety and security interdependencies with BDMP (Boolean logic Driven Markov Processes). In: 2010 IEEE International Conference on Systems, Man and Cybernetics (2010)","DOI":"10.1109\/ICSMC.2010.5641922"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Schmittner, C., Gruber, T., Puschner, P., Schoitsch, E.: Security application of failure mode security application of failure mode and effect analysis (FMEA). In: SAFECOMP 2014, pp. 310\u2013325 (2014)","DOI":"10.1007\/978-3-319-10506-2_21"},{"issue":"9","key":"9_CR6","doi-asserted-by":"publisher","first-page":"1394","DOI":"10.1016\/j.ress.2009.02.020","volume":"94","author":"IN Fovino","year":"2009","unstructured":"Fovino, I.N., Masera, M., De Cian, A.: Integrating cyber attacks within fault trees. Reliab. Eng. Syst. Saf. 94(9), 1394\u20131402 (2009)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Brunel, J., Rioux, L., Paul, S., Faucogney, A., Vallee, F.: Formal safety and security assessment of an avionic architecture with alloy. In: ESSS 2014, pp. 8\u201319 (2014)","DOI":"10.4204\/EPTCS.150.2"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-319-45477-1_17","volume-title":"Computer Safety, Reliability, and Security","author":"E Troubitsyna","year":"2016","unstructured":"Troubitsyna, E., Laibinis, L., Pereverzeva, I., Kuismin, T., Ilic, D., Latvala, T.: Towards security-explicit formal modelling of safety-critical systems. In: Skavhaug, A., Guiochet, J., Bitsch, F. (eds.) SAFECOMP 2016. LNCS, vol. 9922, pp. 213\u2013225. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45477-1_17"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-319-33951-1_4","volume-title":"Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification","author":"J de Ruiter","year":"2016","unstructured":"de Ruiter, J., Thomas, R.J., Chothia, T.: A formal security analysis of ERTMS train to trackside protocols. In: Lecomte, T., Pinger, R., Romanovsky, A. (eds.) RSSRail 2016. LNCS, vol. 9707, pp. 53\u201368. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33951-1_4"},{"key":"9_CR10","unstructured":"Rodin, Event-B platform. http:\/\/www.event-b.org"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Chothia, T., Ordean, M., Ruiter, J., Thomas, R.: An attack against message authentication in the ERTMS train to trackside communication protocols. In: ACM on Asia Conference on Computer and Communications Security (2017)","DOI":"10.1145\/3052973.3053027"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-319-91271-4_20","volume-title":"Abstract State Machines, Alloy, B, TLA, VDM, and Z","author":"D Hansen","year":"2018","unstructured":"Hansen, D., et al.: Using a formal B model at runtime in a demonstration of the ETCS hybrid level 3 concept with real trains. In: Butler, M., Raschke, A., Hoang, T.S., Reichl, K. (eds.) ABZ 2018. LNCS, vol. 10817, pp. 292\u2013306. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91271-4_20"},{"key":"9_CR13","unstructured":"Moving Block System Specification (2019). http:\/\/projects.shift2rail.org\/download.aspx?id=a81c93c2-36a5-46cf-8bd8-4924ae612dd7"},{"key":"9_CR14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139195881","volume-title":"Modeling in Event-B","author":"JR Abrial","year":"2010","unstructured":"Abrial, J.R.: Modeling in Event-B. Cambridge University Press, Cambridge (2010)"},{"key":"9_CR15","unstructured":"https:\/\/github.com\/Poorhadi\/Moving-Block"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security. SAFECOMP 2021 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-83906-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:40:34Z","timestamp":1710265234000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-83906-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030839055","9783030839062"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-83906-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"25 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"York","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp2021.hosted.york.ac.uk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"From the workshops 26 full and 4 short papers were accepted for publication.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}