{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T16:25:22Z","timestamp":1764865522814,"version":"3.46.0"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032107619"},{"type":"electronic","value":"9783032107626"}],"license":[{"start":{"date-parts":[[2025,11,16]],"date-time":"2025-11-16T00:00:00Z","timestamp":1763251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,16]],"date-time":"2025-11-16T00:00:00Z","timestamp":1763251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10762-6_15","type":"book-chapter","created":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T16:08:13Z","timestamp":1763222893000},"page":"182-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Run-Time Monitoring of\u00a0ERTMS\/ETCS Control Flow by\u00a0Process Mining"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2325-0056","authenticated-orcid":false,"given":"Francesco","family":"Vitale","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9820-6047","authenticated-orcid":false,"given":"Tommaso","family":"Zoppi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2833-7196","authenticated-orcid":false,"given":"Francesco","family":"Flammini","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0401-9687","authenticated-orcid":false,"given":"Nicola","family":"Mazzocca","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,16]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08848-3","volume-title":"Process Mining Handbook","author":"WMP van der Aalst","year":"2022","unstructured":"van der Aalst, W.M.P., Carmona, J.: Process Mining Handbook. Springer, Cham (2022)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Ameur-Boulifa, R., Cavalli, A., Maag, S.: From formal test objectives to TTCN-3 for verifying ETCS complex software control systems. In: Software Technologies, pp. 156\u2013178 (2020)","DOI":"10.1007\/978-3-030-52991-8_8"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s10817-010-9172-3","volume":"45","author":"D Angeletti","year":"2010","unstructured":"Angeletti, D., Giunchiglia, E., Narizzano, M., Puddu, A., Sabina, S.: Using bounded model checking for coverage analysis of safety-critical software in an industrial setting. J. Autom. Reason. 45, 397\u2013414 (2010)","journal-title":"J. Autom. Reason."},{"issue":"1","key":"15_CR4","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 1(1), 11\u201333 (2004)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Burattin, A.: Streaming process discovery and conformance checking, pp.\u00a01\u20139. Springer (2020)","DOI":"10.1007\/978-3-319-63962-8_103-2"},{"key":"15_CR6","doi-asserted-by":"publisher","unstructured":"Cai, B., Liu, Y., Liu, Z., Chang, Y., Jiang, L.: Operation-oriented reliability and availability evaluation for onboard high-speed train control system with dynamic bayesian network. In: Cai, B., Liu, Y., Liu, Z., Chang, Y., Jiang, L. (eds.) Bayesian Networks for Reliability Engineering, pp. 109\u2013133. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-13-6516-4_6","DOI":"10.1007\/978-981-13-6516-4_6"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Campanile, L., Biase, M.S.d., Marrone, S., Raimondo, M., Verde, L.: On the evaluation of BDD requirements with text-based metrics: the ETCS-L3 case study. In: Intelligent Decision Technologies, pp. 561\u2013571 (2022)","DOI":"10.1007\/978-981-19-3444-5_48"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3) (2009)","DOI":"10.1145\/1541880.1541882"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Cimatti, A., et al.: Formal verification and validation of ERTMS industrial railway train spacing system. In: Computer Aided Verification, pp. 378\u2013393 (2012)","DOI":"10.1007\/978-3-642-31424-7_29"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1109\/TSE.2012.67","volume":"39","author":"M Cinque","year":"2013","unstructured":"Cinque, M., Cotroneo, D., Pecchia, A.: Event logs for the analysis of software failures: a rule-based approach. IEEE Trans. Software Eng. 39, 806\u2013821 (2013)","journal-title":"IEEE Trans. Software Eng."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Cinque, M., Della\u00a0Corte, R., Pecchia, A.: Discovering hidden errors from application log traces with process mining. In: 2019 15th European Dependable Computing Conference (EDCC), pp. 137\u2013140 (2019)","DOI":"10.1109\/EDCC.2019.00034"},{"issue":"12","key":"15_CR12","doi-asserted-by":"publisher","first-page":"11553","DOI":"10.1109\/TII.2023.3246983","volume":"19","author":"A De Benedictis","year":"2023","unstructured":"De Benedictis, A., Flammini, F., Mazzocca, N., Somma, A., Vitale, F.: Digital twins for anomaly detection in the industrial internet of things: conceptual architecture and proof-of-concept. IEEE Trans. Industr. Inf. 19(12), 11553\u201311563 (2023)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"100379","DOI":"10.1016\/j.cosrev.2021.100379","volume":"40","author":"S Dong","year":"2021","unstructured":"Dong, S., Wang, P., Abbas, K.: A survey on deep learning and its applications. Comput. Sci. Rev. 40, 100379 (2021)","journal-title":"Comput. Sci. Rev."},{"issue":"01","key":"15_CR14","doi-asserted-by":"publisher","first-page":"1450001","DOI":"10.1142\/S0218539314500016","volume":"21","author":"F Flammini","year":"2014","unstructured":"Flammini, F., Marrone, S., Iacono, M., Mazzocca, N., Vittorini, V.: A multiformalism modular approach to ERTMS\/ETCS failure modelling. Int. J. Reliab. Qual. Saf. Eng. 21(01), 1450001 (2014)","journal-title":"Int. J. Reliab. Qual. Saf. Eng."},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Gaspari, P., Riccobene, E., Gargantini, A.: A formal design of the hybrid European rail traffic management system. In: Proceedings of the 13th European Conference on Software Architecture, vol. 2, p. 156\u2013162 (2019)","DOI":"10.1145\/3344948.3344993"},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.trc.2014.02.002","volume":"42","author":"M Ghazel","year":"2014","unstructured":"Ghazel, M.: Formalizing a subset of ERTMS\/ETCS specifications for verification purposes. Transp. Res. Part C: Emerg. Technol. 42, 60\u201375 (2014)","journal-title":"Transp. Res. Part C: Emerg. Technol."},{"issue":"4","key":"15_CR17","doi-asserted-by":"publisher","first-page":"e0152173","DOI":"10.1371\/journal.pone.0152173","volume":"11","author":"M Goldstein","year":"2016","unstructured":"Goldstein, M., Uchida, S.: A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS ONE 11(4), e0152173 (2016)","journal-title":"PLoS ONE"},{"issue":"1","key":"15_CR18","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1109\/TNSM.2020.3038172","volume":"18","author":"A Hemmer","year":"2021","unstructured":"Hemmer, A., Abderrahim, M., Badonnel, R., Fran\u00e7ois, J., Chrisment, I.: Comparative assessment of process mining for supporting IoT predictive security. IEEE Trans. Netw. Serv. Manage. 18(1), 1092\u20131103 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"2","key":"15_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","volume":"5","author":"M Hossin","year":"2015","unstructured":"Hossin, M., Sulaiman, M.N.: A review on evaluation metrics for data classification evaluations. Int. J. Data Min. Knowl. Manage. Process 5(2), 1 (2015)","journal-title":"Int. J. Data Min. Knowl. Manage. Process"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Karg, S., Raschke, A., Tichy, M., Liebel, G.: Model-driven software engineering in the openETCS project: project experiences and lessons learned. In: Proceedings of the ACM\/IEEE 19th International Conference on Model Driven Engineering Languages and Systems, pp. 238\u2013248 (2016)","DOI":"10.1145\/2976767.2976811"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Laprie, J.: Resilience for the scalability of dependability. In: Fourth IEEE International Symposium on Network Computing and Applications, pp.\u00a05\u20136 (2005)","DOI":"10.1109\/NCA.2005.44"},{"key":"15_CR22","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.is.2012.04.004","volume":"38","author":"F de Lima Bezerra","year":"2013","unstructured":"de Lima Bezerra, F., Wainer, J.: Algorithms for anomaly detection of traces in logs of process aware information systems. Inf. Syst. 38, 33\u201344 (2013)","journal-title":"Inf. Syst."},{"key":"15_CR23","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.cose.2018.06.002","volume":"78","author":"D Myers","year":"2018","unstructured":"Myers, D., Suriadi, S., Radke, K., Foo, E.: Anomaly detection for industrial control systems using process mining. Comput. Secur. 78, 103\u2013125 (2018)","journal-title":"Comput. Secur."},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Nardone, R., et al.: An OSLC-based environment for system-level functional testing of ERTMS\/ETCS controllers. J. Syst. Softw. 161, 110478 (2020)","DOI":"10.1016\/j.jss.2019.110478"},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"105054","DOI":"10.1016\/j.knosys.2019.105054","volume":"189","author":"A Pecchia","year":"2020","unstructured":"Pecchia, A., Weber, I., Cinque, M., Ma, Y.: Discovering process models for the analysis of application failures under uncertainty of event logs. Knowl.-Based Syst. 189, 105054 (2020)","journal-title":"Knowl.-Based Syst."},{"issue":"6","key":"15_CR26","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1109\/TAI.2021.3133846","volume":"3","author":"A Rawal","year":"2022","unstructured":"Rawal, A., McCoy, J., Rawat, D.B., Sadler, B.M., Amant, R.S.: Recent advances in trustworthy explainable artificial intelligence: status, challenges, and perspectives. IEEE Trans. Artif. Intell. 3(6), 852\u2013866 (2022)","journal-title":"IEEE Trans. Artif. Intell."},{"key":"15_CR27","unstructured":"Rosenberg, A., Hirschberg, J.: V-measure: A conditional entropy-based external cluster evaluation measure. In: Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL), pp. 410\u2013420 (2007)"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Saint-Pierre, C., Cifuentes, F., Bustos-Jim\u00e9nez, J.: Detecting anomalies in DNS protocol traces via Passive Testing and Process Mining. In: 2014 IEEE Conference on Communications and Network Security, pp. 520\u2013521 (2014)","DOI":"10.1109\/CNS.2014.6997534"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Su, H., Chai, M., Liu, H., Chai, J., Yue, C.: A model-based testing system for safety of railway interlocking. In: 2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC), pp. 335\u2013340 (2022)","DOI":"10.1109\/ITSC55140.2022.9922557"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"di\u00a0Tommaso, P., Flammini, F., Lazzaro, A., Pellecchia, R., Sanseviero, A.: The simulation of anomalies in the functional testing of the ERTMS\/ETCS trackside system. In: Ninth IEEE International Symposium on High-Assurance Systems Engineering (HASE 2005), pp. 131\u2013139 (2005)","DOI":"10.1109\/HASE.2005.24"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Tr\u00f6ls, M.A., Mashkoor, A., Egyed, A.: Multifaceted consistency checking of collaborative engineering artifacts. In: 2019 ACM\/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), pp. 278\u2013287. IEEE (2019)","DOI":"10.1109\/MODELS-C.2019.00044"},{"issue":"2","key":"15_CR32","doi-asserted-by":"publisher","first-page":"213","DOI":"10.7307\/ptt.v29i2.2171","volume":"29","author":"LJ Valdivia","year":"2017","unstructured":"Valdivia, L.J., Solas, G., A\u00f1orga, J., Arrizabalaga, S., Adin, I., Mendizabal, J.: ETCS On-board unit safety testing: saboteurs, testing strategy and results. Promet - Traffic &Transp. 29(2), 213\u2013223 (2017)","journal-title":"Promet - Traffic &Transp."},{"issue":"4","key":"15_CR33","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1093\/comjnl\/44.4.246","volume":"44","author":"HMW Verbeek","year":"2001","unstructured":"Verbeek, H.M.W., Basten, T., van der Aalst, W.M.P.: Diagnosing workflow processes using Woflan. Comput. J. 44(4), 246\u2013279 (2001)","journal-title":"Comput. J."},{"key":"15_CR34","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1109\/TII.2024.3465600","volume":"21","author":"F Vitale","year":"2025","unstructured":"Vitale, F., Guarino, S., Flammini, F., Faramondi, L., Mazzocca, N., Setola, R.: Process mining for digital twin development of industrial cyber-physical systems. IEEE Trans. Industr. Inf. 21, 866\u2013875 (2025)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"15_CR35","doi-asserted-by":"publisher","first-page":"112970","DOI":"10.1016\/j.knosys.2025.112970","volume":"310","author":"F Vitale","year":"2025","unstructured":"Vitale, F., Pegoraro, M., van der Aalst, W.M., Mazzocca, N.: Control-flow anomaly detection by process mining-based feature extraction and dimensionality reduction. Knowl.-Based Syst. 310, 112970 (2025)","journal-title":"Knowl.-Based Syst."},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Weidmann, N.: Tolerant consistency management in model-driven engineering. In: Proceedings of the 21st ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, pp. 192\u2013197 (2018)","DOI":"10.1145\/3270112.3275339"},{"key":"15_CR37","unstructured":"Witten, I.H., Frank, E., Hall, M.: Data Mining: Practical Machine Learning Tools and Techniques, 4 edn. Morgan Kaufmann (2017)"},{"key":"15_CR38","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s41060-017-0078-6","volume":"8","author":"SJ van Zelst","year":"2019","unstructured":"van Zelst, S.J., Bolt, A., Hassani, M., van Dongen, B.F., van der Aalst, W.M.: Online conformance checking: relating event streams to process models using prefix-alignments. Int. J. Data Sci. Anal. 8, 269\u2013284 (2019)","journal-title":"Int. J. Data Sci. Anal."},{"key":"15_CR39","doi-asserted-by":"publisher","first-page":"90603","DOI":"10.1109\/ACCESS.2021.3090957","volume":"9","author":"T Zoppi","year":"2021","unstructured":"Zoppi, T., Ceccarelli, A., Bondavalli, A.: Unsupervised algorithms to detect zero-day attacks: strategy and application. IEEE Access 9, 90603\u201390615 (2021)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10762-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T16:23:33Z","timestamp":1764865413000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10762-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,16]]},"ISBN":["9783032107619","9783032107626"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10762-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,11,16]]},"assertion":[{"value":"16 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"RSSRail","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Reliability, Safety, and Security of Railway Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pisa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rssrail2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rssrail2025.isti.cnr.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}