{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T15:10:34Z","timestamp":1771427434921,"version":"3.50.1"},"reference-count":165,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T00:00:00Z","timestamp":1769558400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1016\/j.compeleceng.2026.110994","type":"journal-article","created":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T23:05:27Z","timestamp":1769814327000},"page":"110994","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Cybersecurity in intelligent railway systems: Taxonomy, research trends, challenges, and future directions"],"prefix":"10.1016","volume":"132","author":[{"given":"Mays","family":"Abukeshek","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Al-Mhiqani","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Parkinson","sequence":"additional","affiliation":[]},{"given":"Saad","family":"Khan","sequence":"additional","affiliation":[]},{"given":"George","family":"Bearfield","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.compeleceng.2026.110994_bib0001","doi-asserted-by":"crossref","DOI":"10.3390\/s17061457","article-title":"Towards the internet of smart trains: a review on industrial IoT-connected railways","volume":"17","author":"Fraga-Lamas","year":"2017","journal-title":"SENSORS"},{"issue":"7","key":"10.1016\/j.compeleceng.2026.110994_bib0002","doi-asserted-by":"crossref","first-page":"6764","DOI":"10.1109\/TITS.2023.3254442","article-title":"Railway cyber-security in the era of interconnected systems: a survey","volume":"24","author":"Soderi","year":"2023","journal-title":"Ieee Trans Intell Transp Syst"},{"issue":"12","key":"10.1016\/j.compeleceng.2026.110994_bib0003","first-page":"669","article-title":"A systematic literature review on the cyber security","volume":"9","author":"Perwej","year":"2021","journal-title":"Int J Sci Res Manag"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.110994_bib0004","doi-asserted-by":"crossref","DOI":"10.3390\/electronics10010092","article-title":"SPD-Safe: secure administration of railway intelligent transportation systems","volume":"10","author":"Hatzivasilis","year":"2021","journal-title":"Electronics"},{"issue":"18","key":"10.1016\/j.compeleceng.2026.110994_bib0005","doi-asserted-by":"crossref","DOI":"10.3390\/su151813369","article-title":"Counterattacking cyber threats: a framework for the future of cybersecurity","volume":"15","author":"Safitra","year":"2023","journal-title":"Sustainability"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0006","doi-asserted-by":"crossref","first-page":"23235","DOI":"10.1109\/ACCESS.2021.3056650","article-title":"A review of cybersecurity guidelines for manufacturing factories in industry 4.0","volume":"9","author":"Mullet","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0007","series-title":"Proceedings Of The 18th International Conference On Cyber Warfare And Security Iccws, no. 18th International Conference on Cyber Warfare and Security (ICCWS)","first-page":"318","article-title":"Gaps in asset management systems to integrate railway companies\u2019 resilience","author":"Rajam\u00e4ki","year":"2023"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.110994_bib0008","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/09544097221089389","article-title":"A review on cybersecurity in railways","volume":"237","author":"Kour","year":"2023","journal-title":"Proc Inst Mech Eng F-J Rail Rapid Transit"},{"issue":"20","key":"10.1016\/j.compeleceng.2026.110994_bib0009","doi-asserted-by":"crossref","DOI":"10.3390\/s22207698","article-title":"Information security and privacy in railway transportation: a systematic review","volume":"22","author":"L\u00f3pez-Aguilar","year":"2022","journal-title":"Sensors"},{"issue":"10","key":"10.1016\/j.compeleceng.2026.110994_bib0010","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1177\/0954409719881849","article-title":"Cybersecurity for railways - a maturity model","volume":"234","author":"Kour","year":"2020","journal-title":"Proc Inst Mech Eng F-J Rail Rapid Transit"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0011","series-title":"Proceedings of the 6th Annual Conference on Research in Information Technology","first-page":"23","article-title":"Information privacy of cyber transportation system: opportunities and challenges","author":"Han","year":"2017"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0012","series-title":"Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media","first-page":"251","article-title":"Taxonomy of emerging security risks in digital railway","author":"Al-Mhiqani","year":"2024"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.110994_bib0013","doi-asserted-by":"crossref","DOI":"10.3390\/app13020790","article-title":"An overview of cyber threats, attacks and countermeasures on the primary domains of smart cities","volume":"13","author":"Demertzi","year":"2023","journal-title":"Appl Sci"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.110994_bib0014","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.3390\/vehicles5040069","article-title":"Securing the future railway system: technology forecast, security measures, and research demands","volume":"5","author":"Unger","year":"2023","journal-title":"Vehicles"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0015","series-title":"Proceeding of the 15th ISCRAM Conference","first-page":"17","article-title":"Cyber security flaws and deficiencies in the European Rail Traffic Management System towards cyber-attacks","author":"Gabriel","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0016","series-title":"Italian railway it system suffers major cyber-attack","author":"Briginshaw","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0017","series-title":"Transportation research in india: practices and future directions","first-page":"233","article-title":"A global perspective of railway security","author":"Jayakumar","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0018","doi-asserted-by":"crossref","DOI":"10.1108\/ICS-05-2023-0078","article-title":"Human factors and cyber-security risks on the railway - the critical role played by signalling operations","author":"Thron","year":"2024","journal-title":"Inf Comput Secur"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0019","series-title":"EU cybersecurity agency reports on threat to railm","author":"Preston","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.mex.2022.101895","article-title":"How-to conduct a systematic literature review: a quick guide for computer science research","volume":"9","author":"Carrera-Rivera","year":"2022","journal-title":"MethodsX"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0021","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2024.109489","article-title":"Insider threat detection in cyber-physical systems: a systematic literature review","volume":"119","author":"Al-Mhiqani","year":"2024","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0022","series-title":"The infosec handbook: an introduction to information security","first-page":"225","article-title":"Intrusion detection and prevention systems","author":"Rao","year":"2014"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0023","doi-asserted-by":"crossref","unstructured":"S. I.K. Nebaba A.N. Butakova M.A., Chernov A.V., Shevchuk P.S., Machinery A.C., N. Nebaba A., K. Savvas I., A. Butakova M., V. Chernov A., S. Shevchuk P., \u201cImproving multiclass classification of cybersecurity breaches in railway infrastructure using imbalanced learning.\u201d 2021.","DOI":"10.1145\/3501774.3501789"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0024","series-title":"ICC 2022 - IEEE International Conference on Communications","first-page":"4193","article-title":"Detecting intrusions in communication-based train control systems","author":"Z","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0025","series-title":"2023 IEEE 34th International Symposium on Software Reliability Engineering Workshops (ISSREW)","first-page":"57","article-title":"CBTCset: a reference dataset for detecting misbehavior attacks in CBTC networks","author":"Z","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0026","series-title":"2016 IEEE International Conference on Intelligent Rail Transportation (ICIRT)","first-page":"39","article-title":"Rail Radio Intrusion Detection System (RRIDS) for Communication Based Train Control (CBTC)","author":"W","year":"2016"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0027","series-title":"2021 IEEE International Intelligent Transportation Systems Conference (ITSC)","first-page":"3939","article-title":"Intrusion detection methods in communication-based train control systems based on relative entropy and trust evaluation","author":"Hu","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0028","doi-asserted-by":"crossref","first-page":"132290","DOI":"10.1109\/ACCESS.2021.3112166","article-title":"A novel hierarchical situation awareness model for CBTC using SVD entropy and GRU with PRD algorithms","volume":"9","author":"Li","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0029","doi-asserted-by":"crossref","unstructured":"L. X. Gao B. Zhang W. Bu B., \u201cAn Intrusion Detection Method Based on Machine Learning and State Observer for Train-Ground Communication Systems,\u201d vol. 23, no. 7, pp. 6608\u20136620, 2022.","DOI":"10.1109\/TITS.2021.3058553"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0030","series-title":"2022 International Wireless Communications and Mobile Computing (IWCMC)","first-page":"211","article-title":"A novel machine learning based intrusion detection method for 5G empowered CBTC systems","author":"Z","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0031","series-title":"2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing","first-page":"380","article-title":"Model-Driven estimation of distributed vulnerability in complex railway networks","author":"T","year":"2013"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0032","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.compeleceng.2015.07.011","article-title":"On synergies of cyber and physical security modelling in vulnerability assessment of railway systems","volume":"47","author":"R","year":"2015","journal-title":"Comput Electr Eng"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.110994_bib0033","doi-asserted-by":"crossref","first-page":"32","DOI":"10.36244\/ICJ.2021.2.5","article-title":"Risk management and standard compliance for cyber-physical systems of systems","volume":"13","author":"C","year":"2021","journal-title":"Infocommunications J"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0034","series-title":"2017 IEEE Symposium on Computers and Communications (ISCC)","first-page":"558","article-title":"SecRoute: end-to-end secure communications for wireless ad-hoc networks","author":"A","year":"2017"},{"issue":"8","key":"10.1016\/j.compeleceng.2026.110994_bib0035","doi-asserted-by":"crossref","first-page":"7283","DOI":"10.1109\/TVT.2019.2920988","article-title":"improving the security of wireless communications on high-speed trains by efficient authentication in SCN-R","volume":"68","author":"F","year":"2019","journal-title":"IEEE Trans Veh Technol"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0036","doi-asserted-by":"crossref","unstructured":"N. B. Zhu L. Tang T. Yu F. R., \u201can integrated train\u2013ground communication system using wireless network virtualization: security and quality of service provisioning.\u201d 2016.","DOI":"10.1109\/TVT.2016.2597153"},{"issue":"11","key":"10.1016\/j.compeleceng.2026.110994_bib0037","doi-asserted-by":"crossref","first-page":"9689","DOI":"10.1109\/TVT.2017.2750219","article-title":"G2RHA:group-to-route handover authentication scheme for mobile relays in LTE-A high-speed rail networks","volume":"66","author":"M","year":"2017","journal-title":"IEEE Trans Veh Technol"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0038","series-title":"2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)","first-page":"594","article-title":"Blockchain based train-ground communication of CBTC system","author":"Z","year":"2021"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.110994_bib0039","article-title":"Data integrity threats and countermeasures in railway spot transmission systems","volume":"4","author":"T","year":"2019","journal-title":"ACM Trans Cyber-Phys Syst"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0040","series-title":"Proceedings of the 33rd Annual Computer Security Applications Conference","first-page":"327","article-title":"TRAKS: a universal key management scheme for ERTMS","author":"O","year":"2017"},{"issue":"12","key":"10.1016\/j.compeleceng.2026.110994_bib0041","doi-asserted-by":"crossref","first-page":"13948","DOI":"10.1109\/TITS.2023.3294546","article-title":"joint security and resources allocation scheme design in edge intelligence enabled CBTCS: a two-level game theoretic approach","volume":"24","author":"Y","year":"2023","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"11","key":"10.1016\/j.compeleceng.2026.110994_bib0042","doi-asserted-by":"crossref","first-page":"8119","DOI":"10.1109\/JIOT.2021.3097156","article-title":"Joint security and train control design in blockchain-empowered CBTC system","volume":"9","author":"N","year":"2022","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.110994_bib0043","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1109\/TITS.2022.3211020","article-title":"A cross-layer defense method for blockchain empowered CBTC systems against data tampering attacks","volume":"24","author":"W","year":"2023","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0044","series-title":"Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks","first-page":"160","article-title":"Signal jamming attacks against communication-based train control: attack impact and countermeasure","author":"K","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0045","article-title":"Rule-based anomaly detection for railway signalling networks","volume":"42","author":"G","year":"2023","journal-title":"Int J Crit Infrastruct Prot"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0046","series-title":"2018 IEEE International Conference on Communications (ICC)","first-page":"1","article-title":"Cooperative security framework for CBTC network","author":"P","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0047","article-title":"An ensemble intrusion detection method for train ethernet consist network based on CNN and RNN","volume":"9","author":"D","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0048","series-title":"2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)","first-page":"1","article-title":"Cyber threat assessment in monitoring turnout railway systems","author":"Z","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0049","doi-asserted-by":"crossref","unstructured":"I. J. Soderi S. H\u00e4m\u00e4l\u00e4inen M. Masti D., \u201cCybersecurity Considerations for Communication Based Train Control,\u201d IEEE Access, pp. 92312\u201392321, 2023.","DOI":"10.1109\/ACCESS.2023.3309005"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.110994_bib0050","doi-asserted-by":"crossref","first-page":"5073","DOI":"10.1109\/JSYST.2023.3276644","article-title":"ADEROS: artificial intelligence-based detection system of critical events for road security","volume":"17","author":"M","year":"2023","journal-title":"IEEE Syst J"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0051","series-title":"Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles","first-page":"27","article-title":"A game-theoretic approach to secure control of communication-based train control systems under jamming attacks","author":"Xu","year":"2017"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0052","series-title":"Proceedings of the Symposium and Bootcamp on the Science of Security","first-page":"99","article-title":"Software and attack centric integrated threat modeling for quantitative risk assessment","author":"M","year":"2016"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.110994_bib0053","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1007\/s10559-018-0068-2","article-title":"mathematical differential models and methods for assessing the cybersecurity of intelligent computer networks for control of technological processes of railway power supply","volume":"54","author":"G","year":"2018","journal-title":"Cybern Syst Anal"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0054","series-title":"2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI)","first-page":"1","article-title":"Analysis of cyber-attacks for modern digital railway system using cyber range","author":"B","year":"2022"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.110994_bib0055","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1109\/TITS.2016.2590579","article-title":"Vulnerabilities, attacks, and countermeasures in balise-based train control systems","volume":"18","author":"L","year":"2017","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0056","first-page":"1","article-title":"weighted train-to-train communication-based data-driven consensus tracking of multiple HSTs subject to deception attacks","author":"G","year":"2023","journal-title":"IEEE Trans Veh Technol"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0057","series-title":"IECON 2022 \u201348th Annual Conference of the IEEE Industrial Electronics Society","first-page":"1","article-title":"Secure event-triggered distributed cooperative control of high-speed trains under DoS attacks","author":"Xiao","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0058","series-title":"2017 Resilience Week (RWS)","first-page":"177","article-title":"Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed","author":"K","year":"2017"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0059","series-title":"2018 Resilience Week (RWS)","first-page":"155","article-title":"Metrics-Driven evaluation of cybersecurity for critical railway infrastructure","author":"T","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0060","series-title":"2021 IEEE 6th International Conference on Signal and Image Processing (ICSIP)","first-page":"1065","article-title":"Urban rail traffic security management system based on big data platform","author":"Y","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0061","series-title":"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)","first-page":"1","article-title":"interoperability of signaling interlocking and its cyber-security requirements","author":"A","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0062","series-title":"2019 6th International Conference on Advanced Control Circuits and Systems (ACCS) & 2019 5th International Conference on New Paradigms in Electronics & information Technology (PEIT)","first-page":"54","article-title":"automated railway security system","author":"Eid","year":"2019"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0063","series-title":"2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN)","first-page":"135","article-title":"Security system for railway crossings using machine learning","author":"Singh","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0064","series-title":"2018 ACM\/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","first-page":"339","article-title":"WiP abstract: KRS-DGIST: a resilient CPS testbed for radio-based train control","author":"P","year":"2018"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.110994_bib0065","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1177\/09544097211000518","article-title":"Railway cyber safety: an intelligent threat perspective","volume":"236","author":"S","year":"2022","journal-title":"Proc Inst Mech Eng F-J Rail Rapid Transit"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0066","article-title":"Cyber security of railway cyber-physical system (CPS) - A risk management methodology","volume":"2","author":"L","year":"2022","journal-title":"Commun Transp Res"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0067","series-title":"2018 IEEE Conference on Communications and Network Security (CNS)","first-page":"1","article-title":"Cyber-Physical security risk assessment for train control and monitoring systems","author":"G","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0068","series-title":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","first-page":"1","article-title":"Cyber-physical threats and vulnerabilities analysis for train control and monitoring systems","author":"G","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0069","series-title":"2020 IEEE 5th International Conference on Signal and Image Processing (ICSIP)","first-page":"1015","article-title":"Approach of risk assessment for railway critical information infrastructure based on fuzzy analytic hierarchy process","author":"H","year":"2020"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.110994_bib0070","doi-asserted-by":"crossref","first-page":"287","DOI":"10.3934\/mbe.2022015","article-title":"Parallel anomaly detection algorithm for cybersecurity on the high- speed train control system","volume":"19","author":"H","year":"2022","journal-title":"Math Biosci Eng"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0071","series-title":"2017 17th International Conference on Control, Automation and Systems (ICCAS)","first-page":"149","article-title":"Sensor attack detection for railway vehicles using topographic information","author":"Yu","year":"2017"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.110994_bib0072","doi-asserted-by":"crossref","first-page":"7188","DOI":"10.1109\/TIA.2023.3307496","article-title":"Detection of cyber attacks on railway autotransformer traction power systems","volume":"59","author":"S","year":"2023","journal-title":"IEEE Trans Ind Appl"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.110994_bib0073","article-title":"SPD-Safe: secure administration of railway intelligent transportation systems","volume":"10","author":"F","year":"2021","journal-title":"Electronics"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.110994_bib0074","article-title":"CyberSAGE: the cyber security argument graph evaluation tool","volume":"28","author":"W","year":"2023","journal-title":"Empir Softw Eng"},{"issue":"10","key":"10.1016\/j.compeleceng.2026.110994_bib0075","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/MCOM.2015.7295471","article-title":"Cyber Security Analysis of the European Train Control System","volume":"53","author":"A","year":"2015","journal-title":"Ieee Commun Mag"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.110994_bib0076","article-title":"Modeling adversarial physical movement in a railway station: classification and metrics","volume":"4","author":"C","year":"2019","journal-title":"ACM Trans Cyber-Phys Syst"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0077","series-title":"TENCON 2015 - 2015 IEEE Region 10 Conference","first-page":"1","article-title":"Impact of signal delay attack on voltage control for electrified railways","author":"T","year":"2015"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0078","article-title":"Human factors and cyber-security risks on the railway - the critical role played by signalling operations","author":"F","year":"2024","journal-title":"Inf Comput Secur"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0079","series-title":"2013 10th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","first-page":"190","article-title":"Fuzzy logic based security region evaluation of the urban rail transit operating system","author":"S","year":"2013"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0080","series-title":"Proceedings of the 7th Symposium on Hot Topics in the Science of Security","article-title":"Simulation testbed for railway infrastructure security and resilience evaluation","author":"K","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0081","article-title":"A resilience-based security assessment approach for CBTC systems","author":"D","year":"2021","journal-title":"Complexity"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0082","series-title":"Signal Processing, Sensor\/Information Fusion, And Target Recognition Xxxi","article-title":"Impact assessment and mitigation strategies in rail\/metro infrastructure with the use of iCrowd Simulator","author":"K","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0083","series-title":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","first-page":"33","article-title":"Quantifying the impact of external attacks on a distributed automatic track warning system","author":"L","year":"2015"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0084","series-title":"2019 IEEE Intelligent Transportation Systems Conference (ITSC)","first-page":"2521","article-title":"attacks and counter defense mechanisms for CBTC systems: system modeling and availability analysis","author":"B","year":"2019"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0085","series-title":"2020 IEEE Region 10 Conference (Tencon)","first-page":"824","article-title":"Rail system anomaly detection via machine learning approaches","author":"G","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0086","series-title":"2015 23rd Telecommunications Forum Telfor (TELFOR)","first-page":"1","article-title":"Security incident detection technique for multilevel intelligent control systems on railway transport in Russia","author":"B","year":"2015"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0087","series-title":"2017 Chinese Automation Congress (CAC)","first-page":"6407","article-title":"An attack tree-based approach for vulnerability assessment of communication-based train control systems","author":"W","year":"2017"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0088","series-title":"2018 15th International Multi-Conference on Systems, Signals & Devices (SSD)","first-page":"693","article-title":"Analysis of security threats and vulnerabilities for train control and monitoring systems","author":"G","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0089","series-title":"2016 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2016","first-page":"1","article-title":"Developing Cyber Security Asset Management framework for UK rail","author":"Kohli","year":"2016"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0090","series-title":"2017 Smart City Symposium Prague (SCSP)","first-page":"1","article-title":"Cyber security of underground railway system operation","author":"P","year":"2017"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0091","series-title":"2019 IEEE Globecom Workshops (GC Wkshps)","first-page":"1","article-title":"Security analysis of wireless train control systems","author":"Fang","year":"2019"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0092","series-title":"9th IET International Conference on System Safety and Cyber Security (2014)","first-page":"1","article-title":"Cyber security of the railway signalling & control system","author":"MD","year":"2014"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0093","series-title":"Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy","first-page":"49","article-title":"Developing models for physical attacks in cyber-physical systems","author":"K","year":"2017"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.110994_bib0094","article-title":"Modeling and detecting false data injection attacks against railway traction power systems","volume":"2","author":"T","year":"2018","journal-title":"ACM Trans Cyber-Phys Syst"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0095","series-title":"2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)","first-page":"414","article-title":"A robust approach for on-line and off-line threat detection based on event tree similarity analysis","author":"V","year":"2011"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0096","series-title":"2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","first-page":"383","article-title":"On false data injection attacks against railway traction power systems","author":"Y","year":"2016"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0097","series-title":"2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC)","first-page":"274","article-title":"On train automatic stop control using balises: attacks and a software-only countermeasure","author":"K","year":"2017"},{"issue":"12","key":"10.1016\/j.compeleceng.2026.110994_bib0098","doi-asserted-by":"crossref","first-page":"9027","DOI":"10.1109\/TII.2022.3164087","article-title":"Improved LSTM-based time-series anomaly detection in rail transit operation environments","volume":"18","author":"D","year":"2022","journal-title":"IEEE Trans Ind Inform"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.110994_bib0099","doi-asserted-by":"crossref","first-page":"6353","DOI":"10.1109\/JIOT.2019.2919066","article-title":"Cyber-Physical vulnerability analysis of communication-based train control","volume":"6","author":"E","year":"2019","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"10.1016\/j.compeleceng.2026.110994_bib0100","doi-asserted-by":"crossref","first-page":"7266","DOI":"10.1109\/TITS.2020.3005931","article-title":"Cross-Layer defense methods for jamming-resistant CBTC systems","volume":"22","author":"N","year":"2021","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0101","series-title":"2020 IEEE Vehicular Networking Conference (VNC)","first-page":"1","article-title":"Demo: railway signalling security testbed","author":"A","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0102","series-title":"2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","first-page":"1","article-title":"Digital forensic investigation process in railway environment","author":"S","year":"2021"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.110994_bib0103","article-title":"Data-driven model-based detection of malicious insiders via physical access logs","volume":"29","author":"T","year":"2019","journal-title":"ACM Trans Model Comput Simul"},{"issue":"18","key":"10.1016\/j.compeleceng.2026.110994_bib0104","article-title":"Distributed ledger for cybersecurity: issues and challenges in railways","volume":"13","author":"T","year":"2021","journal-title":"Sustainability"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.110994_bib0105","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s13198-019-00778-w","article-title":"Cybersecurity for eMaintenance in railway infrastructure: risks and consequences","volume":"10","author":"A","year":"2019","journal-title":"Int J Syst Assur Eng Manag"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0106","series-title":"2017 6th Mediterranean Conference on Embedded Computing (MECO)","first-page":"1","article-title":"Real-time management of railway CPS secure administration of IoT and CPS infrastructure","author":"P","year":"2017"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0107","series-title":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","first-page":"265","article-title":"A cryptographic and key management glance at cybersecurity challenges of the future European railway system","author":"K","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0108","first-page":"1","article-title":"LPDB: lightweight policy-driven blockchain with batch verification for rail transit systems","author":"H","year":"2023","journal-title":"IEEE Trans Veh Technol"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0109","series-title":"2019 7th Mediterranean Congress of Telecommunications (CMT)","first-page":"1","article-title":"The Integrity of encryption keys of European Train Control System sessions during an offline loading","author":"N","year":"2019"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0110","series-title":"IEEE EUROCON 2023 - 20th International Conference on Smart Technologies","first-page":"331","article-title":"An approach to provide functional identity privacy in future railway communications","author":"A","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0111","series-title":"ACM International Conference Proceeding Series","first-page":"292","article-title":"Multi-National cyber security exercise, case flagship 2","author":"P","year":"2022"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.110994_bib0112","first-page":"453","article-title":"Cybersecurity workforce in railway: its maturity and awareness","volume":"27","author":"K","year":"2020","journal-title":"J Qual Maint Eng"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0113","series-title":"2023 10th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","first-page":"278","article-title":"Comparative phishing attack simulations: a case study of critical information infrastructure organization using two different contents","author":"R","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0114","series-title":"2021 5th International Conference on System Reliability and Safety (ICSRS)","first-page":"47","article-title":"Knowledge based training derived from risk evaluation concerning failure mode, effects and criticality analysis in autonomous railway systems","author":"C","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0115","series-title":"2018 IEEE Industrial Cyber-Physical Systems (ICPS)","first-page":"603","article-title":"The human operator as the ultimate barrier to cyber attacks","author":"M","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0116","series-title":"Proceedings of the 13th International Conference on Availability, Reliability and Security","article-title":"A pyramidal-based model to compute the impact of cyber security events","author":"R-H","year":"2018"},{"issue":"10","key":"10.1016\/j.compeleceng.2026.110994_bib0117","article-title":"eMaintenance in railways: issues and challenges in cybersecurity","volume":"233","author":"A","year":"2019","journal-title":"Proc Inst Mech Eng F-J Rail Rapid Transit"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0118","doi-asserted-by":"crossref","DOI":"10.1051\/matecconf\/201929403003","article-title":"Concept of the railway safety, security and cybersecurity functional integrity levels","author":"Pawlik","year":"2019"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.110994_bib0119","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1007\/s13198-020-00952-5","article-title":"Predictive model for multistage cyber-attack simulation","volume":"11","author":"T","year":"2020","journal-title":"Int J Syst Assur Eng Manag"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.110994_bib0120","article-title":"Cyber resilience meta-modelling: the railway communication case study","volume":"10","author":"M","year":"2021","journal-title":"Electronics"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0121","article-title":"Orchestrator for ensuring interdependency between safety and cybersecurity in railway control systems","author":"E","year":"2023","journal-title":"Int J Rail Transp"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.110994_bib0122","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1177\/09544097221102292","article-title":"Redefining rail systems verification and validation: the safety\/security STAIRCASE model","volume":"237","author":"V","year":"2023","journal-title":"Proc Inst Mech Eng F-J Rail Rapid Transit"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0123","series-title":"2016 IEEE Region 10 Conference (TENCON)","first-page":"95","article-title":"SecureRails: towards an open simulation platform for analyzing cyber-physical attacks in railways","author":"T","year":"2016"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0124","series-title":"2016 Resilience Week (RWS)","first-page":"101","article-title":"Performance evaluation of secure industrial control system design: a railway control system case study","author":"B","year":"2016"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0125","series-title":"Urban Transport XXIII, vol. 176, no. 23rd International Conference on Urban Transport and the Environment","first-page":"405","article-title":"Human factors in cybersecurity for transportation systems","author":"Caire","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0126","series-title":"2022 2nd International Signal Processing, Communications and Engineering Management Conference (ISPCEM)","first-page":"19","article-title":"Research on railway devsecops system construction based on \u2018people-process-technology","author":"Z","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0127","series-title":"12th International Conference on System Safety and Cyber-Security 2017 (SCSS)","first-page":"1","article-title":"System security assessment for safety critical railway signalling systems for the thameslink infrastructure programme","author":"NJ","year":"2017"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0128","series-title":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","first-page":"1","article-title":"Cybersecurity and privacy issues when applying railway technologies to intelligent roadway systems","author":"CW","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0129","series-title":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","first-page":"684","article-title":"Security risk assessment of high - speed railway communication system based on set pair analysis","author":"Xiong","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0130","article-title":"A survey on the acceptance of unattended trains","volume":"25","author":"V","year":"2023","journal-title":"J Rail Transp Plan Manag"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0131","author":"Wang"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0132","unstructured":"\u201cindex @ www. illinois. adsc.com.sg.\u201d [Online]. Available: https:\/\/www.illinois.adsc.com.sg\/cybersage\/index.html."},{"key":"10.1016\/j.compeleceng.2026.110994_bib0133","author":"\u00d6zg\u00fcr"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0134","series-title":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","first-page":"553","article-title":"A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA","author":"Meena","year":"2017"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0135","series-title":"Recent advances in network simulation: the OMNeT++ environment and its ecosystem","first-page":"215","article-title":"Veins: the Open Source Vehicular Network Simulation Framework","author":"Sommer","year":"2019"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0136","first-page":"954","article-title":"Enhance work for java based network analyzer tool used to analyze network simulator files","volume":"29","author":"Alkenani","year":"2023","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0137","doi-asserted-by":"crossref","first-page":"52","DOI":"10.20517\/jsss.2023.35","article-title":"A survey on wireless-communication vulnerabilities of ERTMS in the railway sector","volume":"5","author":"Gaggero","year":"2024","journal-title":"J Surveill Secur Saf"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0138","series-title":"International Conference on Reliability, Safety, and Security of Railway Systems","first-page":"22","article-title":"TrainSec: a simulation framework for security modeling and evaluation in CBTC networks","author":"Fakhereldine","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0139","series-title":"Proceedings Of The 18th International Conference On Cyber Warfare And Security Iccws","first-page":"318","article-title":"Gaps in asset management systems to integrate railway companies\u2019 resilience","author":"S","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0140","article-title":"Internet of Things for sustainable railway transportation: past, present, and future","volume":"4","author":"Singh","year":"2022","journal-title":"Clean Logist Supply Chain"},{"issue":"22","key":"10.1016\/j.compeleceng.2026.110994_bib0141","doi-asserted-by":"crossref","DOI":"10.3390\/s22228663","article-title":"Cybersecurity Awareness and Training (CAT) framework for remote working employees","volume":"22","author":"Hijji","year":"2022","journal-title":"Sensors"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.110994_bib0142","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1007\/s00521-021-06400-0","article-title":"Asset criticality and risk prediction for an effective cybersecurity risk management of cyber-physical system","volume":"34","author":"Kure","year":"2022","journal-title":"Neural Comput Appl"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0143","doi-asserted-by":"crossref","DOI":"10.1016\/j.autcon.2020.103486","article-title":"IoT for predictive assets monitoring and maintenance: an implementation strategy for the UK rail industry","volume":"122","author":"Gbadamosi","year":"2021","journal-title":"Autom Constr"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0144","series-title":"Disaster resilience and sustainability","first-page":"509","article-title":"Chapter 23 - Risk reduction and resilience buildup in railroad transport","author":"Sharma","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0145","doi-asserted-by":"crossref","first-page":"151019","DOI":"10.1109\/ACCESS.2020.3016826","article-title":"Cyber-Physical Power System (CPPS): a review on modeling, simulation, and analysis with cyber security applications","volume":"8","author":"Yohanandhan","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0146","doi-asserted-by":"crossref","first-page":"29775","DOI":"10.1109\/ACCESS.2021.3058403","article-title":"Cyber-Physical energy systems security: threat modeling, risk assessment, resources, metrics, and case studies","volume":"9","author":"Zografopoulos","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0147","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.compind.2018.04.017","article-title":"Cyber-physical systems and their security issues","volume":"100","author":"Alguliyev","year":"2018","journal-title":"Comput Ind"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0148","doi-asserted-by":"crossref","DOI":"10.1016\/j.cie.2021.107534","article-title":"Discussing resilience in the context of cyber physical systems","volume":"160","author":"Colabianchi","year":"2021","journal-title":"Comput Ind Eng"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0149","series-title":"Proceedings of the 43rd Annual Southeast Regional Conference - Volume 2, in ACM-SE 43","first-page":"178","article-title":"Information security models and metrics","author":"Wang","year":"2005"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0150","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.ress.2014.12.013","article-title":"Vulnerability assessment and mitigation for the Chinese railway system under floods","volume":"137","author":"Hong","year":"2015","journal-title":"Reliab Eng Syst Saf"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.110994_bib0151","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1002\/qre.1738","article-title":"Risk assessment of railway transportation systems using timed fault trees","volume":"32","author":"Peng","year":"2016","journal-title":"Qual Reliab Eng Int"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.110994_bib0152","doi-asserted-by":"crossref","DOI":"10.1177\/20539517221108369","article-title":"When the future meets the past: can safety and cyber security coexist in modern critical infrastructures?","volume":"9","author":"Michalec","year":"2022","journal-title":"Big Data Soc"},{"issue":"43","key":"10.1016\/j.compeleceng.2026.110994_bib0153","first-page":"90","article-title":"The security of IoT systems in railway transport","author":"Voronko","year":"2024","journal-title":"Transp Syst Technol"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.110994_bib0154","doi-asserted-by":"crossref","first-page":"1695","DOI":"10.1109\/TASE.2023.3243147","article-title":"Digital twin-based cyber-attack detection framework for cyber-physical manufacturing systems","volume":"21","author":"Balta","year":"2024","journal-title":"IEEE Trans Autom Sci Eng"},{"issue":"7","key":"10.1016\/j.compeleceng.2026.110994_bib0155","doi-asserted-by":"crossref","first-page":"6449","DOI":"10.1109\/TITS.2024.3401716","article-title":"Digital twins in transportation infrastructure: an investigation of the key enabling technologies, applications, and challenges","volume":"25","author":"Chang","year":"2024","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0156","doi-asserted-by":"crossref","first-page":"120237","DOI":"10.1109\/ACCESS.2023.3327042","article-title":"Digital twin for railway: a comprehensive survey","volume":"11","author":"Ghaboura","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0157","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2020.106744","article-title":"Multi-agent-based modelling and simulation of high-speed train","volume":"86","author":"Kou","year":"2020","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0158","first-page":"49184","article-title":"A comprehensive survey on revolutionizing connectivity through artificial intelligence-enabled digital twin network in 6G","volume":"12","author":"Sheraz","year":"2024","journal-title":"IEEE Access"},{"issue":"14","key":"10.1016\/j.compeleceng.2026.110994_bib0159","doi-asserted-by":"crossref","first-page":"24581","DOI":"10.1109\/JIOT.2024.3395186","article-title":"Toward transportation digital twin systems for traffic safety and mobility: a review","volume":"11","author":"Irfan","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0160","series-title":"2021 13th Electrical Engineering Faculty Conference (BulEF)","first-page":"1","article-title":"Digital twins: an advanced technology for railways maintenance transformation","author":"Dimitrova","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0161","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2022.107983","article-title":"Digital twins and artificial intelligence in transportation infrastructure: classification, application, and future research directions","volume":"101","author":"Wu","year":"2022","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0162","series-title":"2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI)","first-page":"1","article-title":"Analysis of cyber-attacks for modern digital railway system using cyber range","author":"Sharma","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.110994_bib0163","doi-asserted-by":"crossref","DOI":"10.1016\/j.compind.2023.103980","article-title":"Digital twins in condition-based maintenance apps: a case study for train axle bearings","volume":"151","author":"CRESPO MARQUEZ","year":"2023","journal-title":"Comput Ind"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.110994_bib0164","doi-asserted-by":"crossref","DOI":"10.3390\/machines9090193","article-title":"Blockchain-Empowered digital twins collaboration: smart transportation use case","volume":"9","author":"Sahal","year":"2021","journal-title":"Machines"},{"issue":"12","key":"10.1016\/j.compeleceng.2026.110994_bib0165","doi-asserted-by":"crossref","DOI":"10.3390\/su14127060","article-title":"Towards resilient and sustainable rail and road networks: a systematic literature review on digital twins","volume":"14","author":"Vieira","year":"2022","journal-title":"Sustainability"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626000662?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626000662?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T14:12:24Z","timestamp":1771423944000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626000662"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":165,"alternative-id":["S0045790626000662"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.110994","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Cybersecurity in intelligent railway systems: Taxonomy, research trends, challenges, and future directions","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.110994","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"110994"}}