{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T22:31:03Z","timestamp":1775773863049,"version":"3.50.1"},"reference-count":87,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"USDOT National Center for Transportation Cybersecurity and Resiliency","award":["69A3552344812"],"award-info":[{"award-number":["69A3552344812"]}]},{"name":"USDOT National Center for Transportation Cybersecurity and Resiliency","award":["69A3552348317"],"award-info":[{"award-number":["69A3552348317"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3603580","type":"journal-article","created":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:43:14Z","timestamp":1756489394000},"page":"163046-163070","source":"Crossref","is-referenced-by-count":2,"title":["A Large Language Model-Supported Threat Modeling Framework for Transportation Cyber-Physical Systems"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7326-3694","authenticated-orcid":false,"given":"M Sabbir","family":"Salek","sequence":"first","affiliation":[{"name":"Glenn Department of Civil Engineering, Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3275-6983","authenticated-orcid":false,"given":"Mashrur","family":"Chowdhury","sequence":"additional","affiliation":[{"name":"Glenn Department of Civil Engineering, Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3884-3818","authenticated-orcid":false,"given":"Muhaimin Bin","family":"Munir","sequence":"additional","affiliation":[{"name":"Erik Jonsson School of Engineering and Computer Science, The University of Texas at Dallas, Richardson, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1423-6399","authenticated-orcid":false,"given":"Yuchen","family":"Cai","sequence":"additional","affiliation":[{"name":"Erik Jonsson School of Engineering and Computer Science, The University of Texas at Dallas, Richardson, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9799-6773","authenticated-orcid":false,"given":"Mohammad Imtiaz","family":"Hasan","sequence":"additional","affiliation":[{"name":"Glenn Department of Civil Engineering, Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1121-7323","authenticated-orcid":false,"given":"Jean-Michel","family":"Tine","sequence":"additional","affiliation":[{"name":"Glenn Department of Civil Engineering, Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9300-1576","authenticated-orcid":false,"given":"Latifur","family":"Khan","sequence":"additional","affiliation":[{"name":"Erik Jonsson School of Engineering and Computer Science, The University of Texas at Dallas, Richardson, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1128-753X","authenticated-orcid":false,"given":"Mizanur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Department of Civil, Construction, and Environmental Engineering, The University of Alabama, Tuscaloosa, AL, USA"}]}],"member":"263","reference":[{"issue":"5","key":"ref1","first-page":"629","article-title":"A survey on intelligent transportation systems","volume":"15","author":"Qureshi","year":"2013","journal-title":"Middle-East J. Scientific Res."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3050038"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/mits.2019.2898973"},{"key":"ref4","volume-title":"Under Attack: Trucking Industry Increasingly at Risk of Cyberattacks","year":"2025"},{"key":"ref5","volume-title":"Aviation is Facing a Rising Wave of Cyber-Attacks in the Wake of COVID","year":"2025"},{"key":"ref6","volume-title":"IAPH Cybersecurity Guidelines for Ports and Port Facilities","year":"2025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.03.010"},{"key":"ref8","volume-title":"Threat Modeling","author":"Swiderski","year":"2004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2021.3135197"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49443-8_13"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/cdt2.12045"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2010.110"},{"key":"ref13","volume-title":"MITRE ATT&CK?","year":"2025"},{"key":"ref14","volume-title":"CVE: Common Vulnerabilities and Exposures","year":"2025"},{"key":"ref15","volume-title":"Known Exploited Vulnerabilities Catalog | CISA","year":"2025"},{"key":"ref16","volume-title":"CVSS V3.1 Specification Document","year":"2025"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103543"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-02221-1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.oceaneng.2024.118059"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/access.2025.3550337"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/access.2025.3547932"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3294090"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-0272-9_19"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2013.12.008"},{"issue":"6","key":"ref25","first-page":"21","article-title":"Threat modeling for aviation computer security","volume":"28","author":"Baquero","year":"2015","journal-title":"Crosstalk"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-021-00898-7"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4156\/jdcta.vol5.issue5.32"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2005.119"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/1263820"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.21236\/ADA634134","volume-title":"Introduction to the OCTAVE\u24c7 Approach","author":"Alberts","year":"2003"},{"key":"ref31","volume-title":"Microsoft Threat Modeling Tool Overview\u2014Azure","year":"2025"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0115-7"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1002\/9781118988374","volume-title":"Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis","author":"UcedaVelez","year":"2015"},{"issue":"4","key":"ref34","first-page":"124","article-title":"Threat modeling using attack trees","volume":"23","author":"Saini","year":"2008","journal-title":"J. Comput. Sci. Colleges"},{"issue":"12","key":"ref35","first-page":"21","article-title":"Attack trees","volume":"24","author":"Schneier","year":"1999","journal-title":"Dr. Dobb\u2019s J."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2021.3122368"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/icccnt61001.2024.10725968"},{"key":"ref38","first-page":"1","article-title":"Towards comprehensive threat modeling for vehicles","volume-title":"Proc. 1st Workshop Secur. Dependability Crit. Embedded Real-Time Syst.","author":"Hamad"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/tps-isa62245.2024.00046"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ccwc60891.2024.10427746"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/info15040214"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc9020023"},{"key":"ref43","volume-title":"Threats\u2014Microsoft Threat Modeling Tool\u2014Azure","year":"2025"},{"key":"ref44","first-page":"35","article-title":"Experiences threat modeling at Microsoft","author":"Shostack","year":"2008"},{"key":"ref45","volume-title":"Architecture Reference for Cooperative and Intelligent Transportation","year":"2025"},{"key":"ref46","volume-title":"NVD\u2014Vulnerability Metrics","year":"2025"},{"key":"ref47","first-page":"9459","article-title":"Retrieval-augmented generation for knowledge-intensive NLP tasks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Lewis"},{"key":"ref48","article-title":"GPT-4o system card","author":"Hurst","year":"2024","journal-title":"arXiv:2410.21276"},{"key":"ref49","article-title":"GPT-4 technical report","volume-title":"arXiv:2303.08774","author":"Achiam","year":"2023"},{"key":"ref50","volume-title":"Simple Directory Reader\u2014LlamaIndex V0.10.10","year":"2025"},{"key":"ref51","volume-title":"Vector Embeddings\u2014OpenAI API","year":"2025"},{"key":"ref52","volume-title":"New Embedding Models and API Updates","year":"2025"},{"key":"ref53","volume-title":"VectorIndexRetriever","year":"2025"},{"key":"ref54","volume-title":"Node Postprocessor Modules","year":"2025"},{"key":"ref55","article-title":"Smarter, better, faster, longer: A modern bidirectional encoder for fast, memory efficient, and long context finetuning and inference","author":"Warner","year":"2024","journal-title":"arXiv:2412.13663"},{"key":"ref56","volume-title":"Transformers","year":"2025"},{"key":"ref57","volume-title":"Creating a GPT | OpenAI Help Center","year":"2025"},{"key":"ref58","volume-title":"Prioritize Known Exploited Vulnerabilities","year":"2025"},{"key":"ref59","volume-title":"CVE Mapping Methodology\u2014Mappings Explorer","year":"2025"},{"key":"ref60","volume-title":"Known Exploited Vulnerabilities Landing\u2014Mappings Explorer","year":"2025"},{"key":"ref61","volume-title":"Electronic Clearance","year":"2025"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1177\/08944393241286471"},{"key":"ref63","volume-title":"Reproducibility\u2014PyTorch 2.7 Documentation","year":"2025"},{"key":"ref64","volume-title":"TraCR-National-UTC, TraCR-TMF","year":"2025"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/mipro60963.2024.10569238"},{"key":"ref66","volume-title":"Create Account, Technique T1136\u2014Enterprise | MITRE ATT&CK\u24c7","year":"2025"},{"key":"ref67","volume-title":"Account Manipulation, Technique T1098\u2014Enterprise | MITRE ATT&CK\u24c7","year":"2025"},{"key":"ref68","volume-title":"Reversible Lane Management","year":"2025"},{"key":"ref69","volume-title":"Exploit Public-Facing Application, Technique T1190\u2014Enterprise | MITRE ATT&CK\u24c7","year":"2025"},{"key":"ref70","volume-title":"NVD\u2014CVE-2021-44228","year":"2025"},{"key":"ref71","volume-title":"DarkSide Ransomware: Best Practices for Preventing Business Disruption From Ransomware Attacks | CISA","year":"2025"},{"key":"ref72","volume-title":"Colonial Pipeline: The DarkSide Strikes","author":"Chris","year":"2011"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ccgridw59191.2023.00017"},{"key":"ref74","volume-title":"Back to Basics: A Deeper Look at the Colonial Pipeline Hack","year":"2025"},{"key":"ref75","first-page":"10","article-title":"Purdue model framework for industrial control systems & cybersecurity segmentation","volume":"14","author":"Garton","year":"2022"},{"key":"ref76","volume-title":"Unsecured Credentials, Technique T1552\u2014Enterprise | MITRE ATT&CK\u24c7","year":"2025"},{"key":"ref77","volume-title":"Command and Scripting Interpreter, Technique T1059\u2014Enterprise | MITRE ATT&CK\u24c7","year":"2025"},{"key":"ref78","volume-title":"Ingress Tool Transfer, Technique T1105\u2014Enterprise | MITRE ATT&CK\u24c7","year":"2025"},{"key":"ref79","volume-title":"Network Sniffing, Technique T1040\u2014Enterprise | MITRE ATT&CK\u24c7","year":"2025"},{"key":"ref80","volume-title":"Adversary-in-the-Middle, Technique T1557\u2014Enterprise | MITRE ATT&CK\u24c7","year":"2025"},{"key":"ref81","volume-title":"#StopRansomware: ALPHV Blackcat | CISA","year":"2025"},{"key":"ref82","volume-title":"Data Manipulation, Technique T1565\u2014Enterprise | MITRE ATT&CK\u24c7","year":"2025"},{"key":"ref83","volume-title":"Firmware Corruption, Technique T1495\u2014Enterprise | MITRE ATT&CK\u24c7","year":"2025"},{"key":"ref84","volume-title":"Abuse Elevation Control Mechanism, Technique T1548\u2014Enterprise | MITRE ATT&CK\u24c7","year":"2025"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3045700"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2009.183"},{"key":"ref87","volume-title":"MAKCEDWARD\/NLPAUG","author":"Ma","year":"2025"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6287639\/10820123\/11143218-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11143218.pdf?arnumber=11143218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T12:19:38Z","timestamp":1759234778000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11143218\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":87,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3603580","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}