{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:50:35Z","timestamp":1742914235841,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_18","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:22:30Z","timestamp":1511248950000},"page":"213-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Railway System Failure Scenario Analysis"],"prefix":"10.1007","author":[{"given":"William G.","family":"Temple","sequence":"first","affiliation":[]},{"given":"Yuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bao Anh N.","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Binbin","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"18_CR1","unstructured":"ARGUS. \nwww.secret-project.eu\/IMG\/pdf\/20150128-02-uic-argus.pdf"},{"key":"18_CR2","unstructured":"CyberSAGE portal. \nhttps:\/\/www.illinois.adsc.com.sg\/cybersage\/index.html"},{"key":"18_CR3","unstructured":"Drools business rule management system. \nwww.drools.org\/"},{"key":"18_CR4","unstructured":"Repository of industrial security incidents. \nwww.risidata.com\/Database"},{"key":"18_CR5","unstructured":"Secured urban transportation project. \nwww.secur-ed.eu\/"},{"key":"18_CR6","unstructured":"Security of railways against electromagnetic attacks. \nwww.secret-project.eu\/"},{"key":"18_CR7","unstructured":"SecUTS: A cyber-phyiscal approach to securing urban transportation systems. \nwww.secuts.net"},{"key":"18_CR8","unstructured":"Smart grid protection against cyber attacks. \nhttps:\/\/project-sparks.eu\/"},{"key":"18_CR9","unstructured":"Trustworthy cyber infrastructure for the power grid. \nhttps:\/\/tcipg.org\/"},{"key":"18_CR10","unstructured":"SECRET project white paper, November 2015. \nwww.secret-project.eu\/IMG\/pdf\/white_paper_security_of_railway-against_em_attacks.pdf"},{"key":"18_CR11","unstructured":"APTA security for transit systems standards program, July 2016. \nhttp:\/\/www.apta.com\/resources\/standards\/security\/Pages\/default.aspx"},{"key":"18_CR12","unstructured":"Moxa EDR-G903 vulnerabilities, May 2016. \nhttps:\/\/ics-cert.us-cert.gov\/advisories\/ICSA-16-042-01"},{"key":"18_CR13","unstructured":"UK rail cyber attacks, July 2016. \nhttp:\/\/www.telegraph.co.uk\/technology\/2016\/07\/12\/uk-rail-network-hit-by-multiple-cyber-attacks-last-year\/"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Bloomfield, R., Bloomfield, R., Gashi, I., Stroud, R.: How secure is ERTMS? In: Proceedings of SAFECOMP (2012)","DOI":"10.1007\/978-3-642-33675-1_22"},{"issue":"1","key":"18_CR15","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s10550-007-0013-9","volume":"25","author":"F Braber den","year":"2007","unstructured":"den Braber, F., Hogganvik, I., Lund, M., St\u00f8len, K., Vraalsen, F.: Model-based security analysis in seven stepsa guided tour to the CORAS method. BT Technol. J. 25(1), 101\u2013117 (2007)","journal-title":"BT Technol. J."},{"key":"18_CR16","unstructured":"Electric Power Research Institute: Smart Grid Resource Center - NESCOR. \nhttp:\/\/smartgrid.epri.com\/NESCOR.aspx"},{"issue":"2","key":"18_CR17","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1111\/0272-4332.00020","volume":"22","author":"YY Haimes","year":"2002","unstructured":"Haimes, Y.Y., Kaplan, S., Lambert, J.H.: Risk filtering, ranking, and management framework using hierarchical holographic modeling. Risk Anal. 22(2), 383\u2013397 (2002)","journal-title":"Risk Anal."},{"key":"18_CR18","unstructured":"IEC 60812: Analysis techniques for system reliability - procedure for failure mode and effects analysis (FMEA) (2006)"},{"key":"18_CR19","unstructured":"Industrial Control Systems Cyber Emergency Response Team: ICS-CERT year in review. \nhttps:\/\/ics-cert.us-cert.gov\/Year-Review-2014"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Jauhar, S., Chen, B., Temple, W.G., Dong, X., Kalbarczyk, Z., Sanders, W.H., Nicol, D.M.: Model-based cybersecurity assessment with NESCOR smart grid failure scenarios. In: Proceedings of IEEE PRDC (2015)","DOI":"10.1109\/PRDC.2015.37"},{"key":"18_CR21","unstructured":"National Electric Sector Cybersecurity Organization Resource (NESCOR) Technical Working Group (TWG) 1. Electric Sector Failure Scenarios and Impact Analyses, Version 3.0 (2015)"},{"key":"18_CR22","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-319-23570-7","volume-title":"Cyber-Risk Management","author":"A Refsdal","year":"2015","unstructured":"Refsdal, A., Solhaug, B., St\u00f8len, K.: Cyber-Risk Management, pp. 33\u201347. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-23570-7"},{"key":"18_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-540-73031-6_27","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"G Sindre","year":"2007","unstructured":"Sindre, G.: Mal-activity diagrams for capturing attacks on business processes. In: Sawyer, P., Paech, B., Heymans, P. (eds.) REFSQ 2007. LNCS, vol. 4542, pp. 355\u2013366. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-73031-6_27"},{"key":"18_CR24","unstructured":"Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ICS) security. NIST special publication 800\u201382 (2011)"},{"key":"18_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-319-10696-0_29","volume-title":"Quantitative Evaluation of Systems","author":"AH Vu","year":"2014","unstructured":"Vu, A.H., Tippenhauer, N.O., Chen, B., Nicol, D.M., Kalbarczyk, Z.: CyberSAGE: a tool for automatic security assessment of cyber-physical systems. In: Norman, G., Sanders, W. (eds.) QEST 2014. LNCS, vol. 8657, pp. 384\u2013387. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-10696-0_29"},{"key":"18_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/3-540-45416-0_2","volume-title":"Computer Safety, Reliability and Security","author":"R Winther","year":"2001","unstructured":"Winther, R., Johnsen, O.-A., Gran, B.A.: Security assessments of safety critical systems using HAZOPs. In: Voges, U. (ed.) SAFECOMP 2001. LNCS, vol. 2187, pp. 14\u201324. Springer, Heidelberg (2001). \nhttps:\/\/doi.org\/10.1007\/3-540-45416-0_2"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T22:33:50Z","timestamp":1517438030000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}