{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:46:39Z","timestamp":1743018399752,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031600227"},{"type":"electronic","value":"9783031600234"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-60023-4_15","type":"book-chapter","created":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T18:02:10Z","timestamp":1719770530000},"page":"135-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intelligent Selection of\u00a0Requirements for\u00a0a\u00a0Secure Design of\u00a0Smart City Transport Infrastructure Interfaces"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9412-5693","authenticated-orcid":false,"given":"Konstantin","family":"Izrailov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9836-5424","authenticated-orcid":false,"given":"Nikita","family":"Romanov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7056-6972","authenticated-orcid":false,"given":"Andrey","family":"Chechulin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4080-8122","authenticated-orcid":false,"given":"Alexander","family":"Yaroshenko","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6859-7120","authenticated-orcid":false,"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,1]]},"reference":[{"issue":"4","key":"15_CR1","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/TITS.2014.2303501","volume":"15","author":"A Agrawal","year":"2014","unstructured":"Agrawal, A., Kumar, M., Prajapati, D.K., Singh, M., Kumar, P.: Smart public transit system using an energy storage system and its coordination with a distribution grid. IEEE Trans. Intell. Transp. Syst. 15(4), 1622\u20131632 (2014). https:\/\/doi.org\/10.1109\/TITS.2014.2303501","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"15_CR2","doi-asserted-by":"publisher","unstructured":"Chen, H., Zhang, D., Chen, J., Lin, W., Shi, D., Zhao, Z.: An automatic vulnerability classification system for IoT softwares. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1525\u20131529 (2020). https:\/\/doi.org\/10.1109\/TrustCom50675.2020.00208","DOI":"10.1109\/TrustCom50675.2020.00208"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"82434","DOI":"10.1109\/ACCESS.2022.3196347","volume":"10","author":"E Dehaerne","year":"2022","unstructured":"Dehaerne, E., Dey, B., Halder, S., De Gendt, S., Meert, W.: Code generation using machine learning: a systematic review. IEEE Access 10, 82434\u201382455 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3196347","journal-title":"IEEE Access"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-33704-8_23","volume-title":"Computer Network Security","author":"V Desnitsky","year":"2012","unstructured":"Desnitsky, V., Kotenko, I., Chechulin, A.: Configuration-based approach to embedded device security. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2012. LNCS, vol. 7531, pp. 270\u2013285. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33704-8_23"},{"key":"15_CR5","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-662-45317-9_35","volume-title":"Telematics - Support for Transport","author":"A Dewalska\u2013Opitek","year":"2014","unstructured":"Dewalska\u2013Opitek, A.: Smart city concept \u2013 the Citizens\u2019 perspective. In: Mikulski, J. (ed.) TST 2014. CCIS, vol. 471, pp. 331\u2013340. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45317-9_35"},{"key":"15_CR6","unstructured":"FSTEC of Russia: Bank of vulnerabilities. https:\/\/bdu.fstec.ru\/vul. Accessed 22 May 2023"},{"key":"15_CR7","unstructured":"FSTEC of Russia: Bdu:2020-03840: Vulnerability in the online payment mechanism of the google chrome browser, allowing the attacker to influence the integrity of the data. https:\/\/bdu.fstec.ru\/vul\/2020-03840. Accessed 22 May 2023"},{"key":"15_CR8","unstructured":"Gaithersburg from U.S.: National vulnerability database. https:\/\/nvd.nist.gov\/. Accessed 22 May 2023"},{"key":"15_CR9","doi-asserted-by":"publisher","unstructured":"Izrailov, K., Levshun, D., Chechulin, A.: Vulnerability classification model for smart city transport infrastructure interfaces. Syst. Control Commun. Secur. (5), 199\u2013223 (2021). https:\/\/doi.org\/10.24412\/2410-9916-2021-5-199-223","DOI":"10.24412\/2410-9916-2021-5-199-223"},{"key":"15_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-981-16-9576-6_21","volume-title":"Mobile Internet Security","author":"K Izrailov","year":"2022","unstructured":"Izrailov, K., Levshun, D., Kotenko, I., Chechulin, A.: Classification and analysis of vulnerabilities in mobile device infrastructure interfaces. In: You, I., Kim, H., Youn, T.-Y., Palmieri, F., Kotenko, I. (eds.) MobiSec 2021. CCIS, vol. 1544, pp. 301\u2013319. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-9576-6_21"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Jacobs, J., Romanosky, S., Suciu, O., Edwards, B., Sarabi, A.: Enhancing vulnerability prioritization: data-driven exploit predictions with community-driven insights (2023)","DOI":"10.1109\/EuroSPW59978.2023.00027"},{"key":"15_CR12","doi-asserted-by":"publisher","unstructured":"Keramati, M., Keramati, M.: Novel security metrics for ranking vulnerabilities in computer networks. In: 7\u2019th International Symposium on Telecommunications (IST\u20192014), pp. 883\u2013888 (2014). https:\/\/doi.org\/10.1109\/ISTEL.2014.7000828","DOI":"10.1109\/ISTEL.2014.7000828"},{"key":"15_CR13","doi-asserted-by":"publisher","unstructured":"Kotenko, I., Izrailov, K., Buinevich, M.: Analytical modeling for identification of the machine code architecture of cyberphysical devices in smart homes. Sensors 22(3) (2022). https:\/\/doi.org\/10.3390\/s22031017, https:\/\/www.mdpi.com\/1424-8220\/22\/3\/1017, Art. no. 1017","DOI":"10.3390\/s22031017"},{"key":"15_CR14","doi-asserted-by":"publisher","unstructured":"Kotenko, I., Izrailov, K., Buinevich, M.: Static analysis of information systems for IoT cyber security: a survey of machine learning approaches. Sensors 22(4) (2022). https:\/\/doi.org\/10.3390\/s22041335, https:\/\/www.mdpi.com\/1424-8220\/22\/4\/1335, Art. no. 1335","DOI":"10.3390\/s22041335"},{"key":"15_CR15","doi-asserted-by":"publisher","unstructured":"Nasiruzzaman, A.B.M., Shakeruzzaman, A.B.M., Akter, M.N.: Power grid vulnerability ranking: a linear programming approach. In: The 4th International Conference on Advances in Electrical Engineering (ICAEE), pp. 579\u2013582 (2017). https:\/\/doi.org\/10.1109\/ICAEE.2017.8255423","DOI":"10.1109\/ICAEE.2017.8255423"},{"key":"15_CR16","doi-asserted-by":"publisher","unstructured":"Olaverri-Monreal, C., Jizba, T.: Human factors in the design of human-machine interaction: an overview emphasizing v2x communication. IEEE Trans. Intell. Veh. 1(4), 302\u2013313 (2016). https:\/\/doi.org\/10.1109\/TIV.2017.2695891","DOI":"10.1109\/TIV.2017.2695891"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"16350","DOI":"10.1109\/ACCESS.2022.3147323","volume":"10","author":"A Pundir","year":"2022","unstructured":"Pundir, A., Singh, S., Kumar, M., Bafila, A., Saxena, G.J.: Cyber-physical systems enabled transport networks in smart cities: challenges and enabling technologies of the new mobility era. IEEE Access 10, 16350\u201316364 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3147323","journal-title":"IEEE Access"},{"key":"15_CR18","doi-asserted-by":"publisher","unstructured":"Raman, Jha, S.K., Arora, A.: An enhanced intrusion detection system using combinational feature ranking and machine learning algorithms. In: 2022 2nd International Conference on Intelligent Technologies (CONIT), pp. 1\u20138 (2022). https:\/\/doi.org\/10.1109\/CONIT55038.2022.9847815","DOI":"10.1109\/CONIT55038.2022.9847815"},{"issue":"8","key":"15_CR19","doi-asserted-by":"publisher","first-page":"7519","DOI":"10.1109\/JSEN.2022.3160178","volume":"22","author":"S Shen","year":"2022","unstructured":"Shen, S., Lv, C.X., Zhu, H., Sun, L.J., Wang, R.C.: Potentials and prospects of bicycle sharing system in smart cities: a review. IEEE Sens. J. 22(8), 7519\u20137533 (2022). https:\/\/doi.org\/10.1109\/JSEN.2022.3160178","journal-title":"IEEE Sens. J."},{"key":"15_CR20","doi-asserted-by":"publisher","first-page":"44756","DOI":"10.1109\/ACCESS.2022.3168716","volume":"10","author":"N Sun","year":"2022","unstructured":"Sun, N., et al.: Defining security requirements with the common criteria: applications, adoptions, and challenges. IEEE Access 10, 44756\u201344777 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3168716","journal-title":"IEEE Access"},{"issue":"2","key":"15_CR21","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/TKDE.2020.2986749","volume":"34","author":"TT Wong","year":"2022","unstructured":"Wong, T.T.: Linear approximation of f-measure for the performance evaluation of classification algorithms on imbalanced data sets. IEEE Trans. Knowl. Data Eng. 34(2), 753\u2013763 (2022). https:\/\/doi.org\/10.1109\/TKDE.2020.2986749","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"15_CR22","doi-asserted-by":"publisher","first-page":"7193","DOI":"10.1109\/ACCESS.2020.3047139","volume":"9","author":"J Yang","year":"2021","unstructured":"Yang, J., Kwon, Y., Kim, D.: Regional smart city development focus: the South Korean national strategic smart city program. IEEE Access 9, 7193\u20137210 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2020.3047139","journal-title":"IEEE Access"},{"key":"15_CR23","doi-asserted-by":"publisher","unstructured":"Yang, X., Shunhong, S., L., Y.: Vulnerability ranking based on exploitation and defense graph. In: 2010 International Conference on Information, Networking and Automation (ICINA), vol. 1, pp. V1\u2013163\u2013V1\u2013167 (2010). https:\/\/doi.org\/10.1109\/ICINA.2010.5636412","DOI":"10.1109\/ICINA.2010.5636412"},{"key":"15_CR24","doi-asserted-by":"publisher","unstructured":"Yosifova, V., Tasheva, A., Trifonov, R.: Predicting vulnerability type in common vulnerabilities and exposures (CVE) database with machine learning classifiers. In: 2021 12th National Conference with International Participation (Electronica), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/ELECTRONICA52725.2021.9513723","DOI":"10.1109\/ELECTRONICA52725.2021.9513723"},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"45304","DOI":"10.1109\/ACCESS.2020.2977778","volume":"8","author":"JY Yu","year":"2020","unstructured":"Yu, J.Y., Lee, E., Oh, S.R., Seo, Y.D., Kim, Y.G.: A survey on security requirements for WSNs: focusing on the characteristics related to security. IEEE Access 8, 45304\u201345324 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2977778","journal-title":"IEEE Access"},{"key":"15_CR26","doi-asserted-by":"publisher","first-page":"121858","DOI":"10.1109\/ACCESS.2020.3006361","volume":"8","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Xie, H., Yang, H., Shao, H., Zhu, M.: A general framework to understand vulnerabilities in information systems. IEEE Access 8, 121858\u2013121873 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3006361","journal-title":"IEEE Access"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XVI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-60023-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T18:03:38Z","timestamp":1719770618000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-60023-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031600227","9783031600234"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-60023-4_15","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hamburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/idc2023.haw-hamburg.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}