{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T10:54:08Z","timestamp":1773744848710,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031202148","type":"print"},{"value":"9783031202155","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20215-5_6","type":"book-chapter","created":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T11:33:37Z","timestamp":1665747217000},"page":"66-79","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["AI Cybersecurity Assurance for Autonomous Transport Systems: Scenario, Model, and IMECA-Based Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5352-077X","authenticated-orcid":false,"given":"Vyacheslav","family":"Kharchenko","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4672-6400","authenticated-orcid":false,"given":"Oleg","family":"Illiashenko","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4084-2101","authenticated-orcid":false,"given":"Herman","family":"Fesenko","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4667-2393","authenticated-orcid":false,"given":"Ievgen","family":"Babeshko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,15]]},"reference":[{"key":"6_CR1","unstructured":"Autonomous Transportation Will Arrive Faster Than Predicted And Afford Bigger Business Opportunities. https:\/\/www.forbes.com\/sites\/oliverwyman\/2018\/02\/05\/autonomous-transportation-will-arrive-faster-than-predicted-and-afford-bigger-business-opportunities\/?sh=262f479841e7. Accessed 16 June 2022"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"57243","DOI":"10.1109\/ACCESS.2021.3072030","volume":"9","author":"M Yahuza","year":"2021","unstructured":"Yahuza, M., et al.: Internet of drones security and privacy issues: taxonomy and open challenges. IEEE Access 9, 57243\u201357270 (2021)","journal-title":"IEEE Access"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-030-12786-2_2","volume-title":"Computer Security","author":"G Kavallieratos","year":"2019","unstructured":"Kavallieratos, G., Katsikas, S., Gkioulos, V.: Cyber-attacks against the autonomous ship. In: Katsikas, S.K., et al. (eds.) SECPRE\/CyberICPS -2018. LNCS, vol. 11387, pp. 20\u201336. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12786-2_2"},{"issue":"3","key":"6_CR4","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s10207-020-00503-w","volume":"20","author":"M Manulis","year":"2021","unstructured":"Manulis, M., Bridges, C.P., Harrison, R., Sekar, V., Davis, A.: Cyber security in new space: analysis of threats, key enabling technologies and challenges. Int. J. Inf. Secur. 20(3), 287\u2013311 (2021)","journal-title":"Int. J. Inf. Secur."},{"key":"6_CR5","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"2295","DOI":"10.1007\/978-981-10-6571-2_280","volume-title":"Communications, Signal Processing, and Systems","author":"J Zhu","year":"2019","unstructured":"Zhu, J., Wang, C.: Satellite networking intrusion detection system design based on deep learning method. In: Liang, Q., Mu, J., Jia, M., Wang, W., Feng, X., Zhang, B. (eds.) CSPS 2017. LNEE, vol. 463, pp. 2295\u20132304. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-10-6571-2_280"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"10885","DOI":"10.1007\/s00521-022-07015-9","volume":"34","author":"Q Abu Al-Haija","year":"2022","unstructured":"Abu Al-Haija, Q., Al Badawi, A.: High-performance intrusion detection system for networked UAVs via deep learning. Neural Comput. Appl. 34, 10885\u201310900 (2022)","journal-title":"Neural Comput. Appl."},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Gecgel, S., Kurt, G. K. Intermittent Jamming against telemetry and telecommand of satellite systems and a learning-driven detection strategy. In: WiseML 2021 - Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, pp. 43\u201348. Association for Computing Machinery, Inc. (2021)","DOI":"10.1145\/3468218.3469041"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"107784","DOI":"10.1016\/j.compeleceng.2022.107784","volume":"99","author":"J Whelan","year":"2022","unstructured":"Whelan, J., Almehmadi, A., El-Khatib, K.: Artificial intelligence for intrusion detection systems in Unmanned Aerial Vehicles. Comput. Electr. Eng. 99, 107784 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"107745","DOI":"10.1016\/j.compeleceng.2022.107745","volume":"99","author":"N Koroniotis","year":"2022","unstructured":"Koroniotis, N., Moustafa, N., Slay, J.: A new intelligent satellite deep learning network forensic framework for SSNs. Comput. Electr. Eng. 99, 107745 (2022)","journal-title":"Comput. Electr. Eng."},{"issue":"4","key":"6_CR10","first-page":"667","volume":"11","author":"I Ashraf","year":"2022","unstructured":"Ashraf, I., et al.: A deep learning-based smart framework for cyber-physical and satellite system security threats detection. Electronics (Switzerland) 11(4), 667 (2022)","journal-title":"Electronics (Switzerland)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Yaacoub, J.P., Noura, H., Salman, O., Chehab, A.: Security analysis of drones systems: Attacks, limitations, and recommendations. Internet of Things (Netherlands). Elsevier B.V. (2020)","DOI":"10.1016\/j.iot.2020.100218"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Furumoto, K., Kolehmainen, A., Silverajan, B., Takahashi, T., Inoue, D., Nakao, K.: Toward automated smart ships: designing effective cyber risk management. In Proceedings - IEEE Congress on Cybermatics: 2020 IEEE International Conferences on Internet of Things, iThings 2020, IEEE Green Computing and Communications, GreenCom 2020, IEEE Cyber, Physical and Social Computing, CPSCom 2020 and IEEE Smart Data, SmartData 2020, pp. 100\u2013105. Institute of Electrical and Electronics Engineers Inc. (2020)","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00034"},{"key":"6_CR13","unstructured":"Mendon\u00e7a, H. C., Cocco, M., Miranda, C.M.: Security-compliant cyber measures for satellite systems. In: Proceedings of the International Astronautical Congress, IAC, vol. 2020-October. International Astronautical Federation, IAF (2020)"},{"key":"6_CR14","unstructured":"Torianyk, V., Kharchenko, V., Zemlianko, H.: IMECA based assessment of internet of drones systems cyber security considering radio frequency vulnerabilities. In: CEUR Workshop Proceedings, vol. 2853, pp. 460\u2013470. CEUR-WS (2021)"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"1736","DOI":"10.3390\/electronics9101736","volume":"9","author":"D Piumatti","year":"2020","unstructured":"Piumatti, D., Sini, J., Borlo, S., Sonza Reorda, M., Bojoi, R., Violante, M.: Multilevel simulation methodology for FMECA study applied to a complex cyber-physical system. Electronics 9, 1736 (2020)","journal-title":"Electronics"},{"issue":"4","key":"6_CR16","first-page":"94","volume":"2019","author":"A Waleed Al-Khafaji","year":"2019","unstructured":"Waleed Al-Khafaji, A., Solovyov, A., Uzun, D., Kharchenko, V.: Asset access risk analysis method in the physical protection systems. Radioelectron. Comput. Syst. 2019(4), 94\u2013104 (2019)","journal-title":"Radioelectron. Comput. Syst."},{"issue":"2","key":"6_CR17","first-page":"1","volume":"2022","author":"V Kharchenko","year":"2022","unstructured":"Kharchenko, V., Fesenko, H., Illiashenko, O.: Basic model of non-functional characteristics for assessment of artificial intelligence quality. Radioelectron. Comput. Syst. 2022(2), 1\u201314 (2022)","journal-title":"Radioelectron. Comput. Syst."},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"4865","DOI":"10.3390\/s22134865","volume":"22","author":"V Kharchenko","year":"2022","unstructured":"Kharchenko, V., Fesenko, H., Illiashenko, O.: Quality models for artificial intelligence systems: characteristic-based approach, development and application. Sensors 22, 4865 (2022)","journal-title":"Sensors"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s11219-021-09557-y","volume":"30","author":"J Siebert","year":"2021","unstructured":"Siebert, J., et al.: Construction of a quality model for machine learning systems. Softw. Qual. J. 30, 307\u2013335 (2021). https:\/\/doi.org\/10.1007\/s11219-021-09557-y","journal-title":"Softw. Qual. J."},{"issue":"68","key":"6_CR20","first-page":"41","volume":"2","author":"I Vasyliev","year":"2022","unstructured":"Vasyliev, I., Kharchenko, V.: A framework for metric evaluation of AI systems based on quality model. Syst. Control Navig. 2(68), 41\u201346 (2022)","journal-title":"Syst. Control Navig."},{"key":"6_CR21","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-030-65854-0_3","volume-title":"Software Quality: Future Perspectives on Software Engineering Quality","author":"M Felderer","year":"2021","unstructured":"Felderer, M., Ramler, R.: Quality assurance for ai-based systems: overview and challenges (introduction to interactive session). In: Winkler, D., Biffl, S., Mendez, D., Wimmer, M., Bergsmann, J. (eds.) SWQD 2021. LNBIP, vol. 404, pp. 33\u201342. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-65854-0_3"}],"container-title":["Communications in Computer and Information Science","Multimedia Communications, Services and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20215-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T11:46:15Z","timestamp":1665747975000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20215-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031202148","9783031202155"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20215-5_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"15 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MCSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia Communications, Services and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Krak\u00f3w","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mcss-mult2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/mcss2022.kt.agh.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EquinOCS system","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}