{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T03:06:10Z","timestamp":1776308770585,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"award":["101103772"],"award-info":[{"award-number":["101103772"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130038","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"562-569","source":"Crossref","is-referenced-by-count":1,"title":["Security Risk Analysis of Logistical Support Solutions for MaaS and DLT-based Mitigations"],"prefix":"10.1109","author":[{"given":"Gizay Kisa","family":"Isik","sequence":"first","affiliation":[{"name":"University of Bristol,Bristol,UK"}]},{"given":"Akin","family":"Eker","sequence":"additional","affiliation":[{"name":"University of Bristol,Bristol,UK"}]},{"given":"Theo","family":"Tryfonas","sequence":"additional","affiliation":[{"name":"University of Bristol,Bristol,UK"}]},{"given":"George","family":"Oikonomou","sequence":"additional","affiliation":[{"name":"University of Bristol,Bristol,UK"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-020-2984-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.trpro.2020.03.051"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE62659.2024.10620969"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5220\/0011043900003194"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC57777.2023.10422567"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2021.100014"},{"key":"ref7","article-title":"Maas (mobility as a service) - mobility of the future","year":"2024","journal-title":"Repsol"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/qrs-c.2018.00036"},{"key":"ref9","article-title":"Mobility as a service (maas) in the uk: change and its implications","volume-title":"Foresight, Government Office for Science, Tech. Rep","author":"Enoch","year":"2018"},{"key":"ref10","article-title":"Cyber security and resilience of intelligent public transport: Good practices and recommendations","volume-title":"European Union Agency for Network and Information Security (ENISA)","year":"2015"},{"key":"ref11","author":"News","year":"2023","journal-title":"Cyber-attack brought elron ticketing system down wednesday"},{"key":"ref12","author":"Herald","year":"2023","journal-title":"Auckland transport hit by another cyberattack: At app and website impacted"},{"key":"ref13","article-title":"14 recent cyber attacks on the transport & logistics sector","year":"2024","journal-title":"James"},{"key":"ref14","author":"News","year":"2024","journal-title":"Tfl cyber-attack: London transport targeted by hackers"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2024.3427655"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.rtbm.2024.101162"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cities.2020.103036"},{"key":"ref18","article-title":"Enhancing cybersecurity in public transportation","volume-title":"Tech. Rep. CUTR-2019-09","author":"Barbeau","year":"2019"},{"key":"ref19","volume-title":"Cyber security and resilience of intelligent public transport - Good practices and recommendations","author":"L\u00e9vy-Bencheton","year":"2015"},{"key":"ref20","volume-title":"Handbook: Ticketing in mobility as a service","year":"2022"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.rtbm.2019.100388"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC57777.2023.10421849"},{"key":"ref23","first-page":"2024","article-title":"Transforming public transport ticketing with thales fare media issuance solutions","volume-title":"Thales Group"},{"key":"ref24","volume-title":"Vix Technology. (2025, January) Account-based ticketing"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.25019\/am7zzf87"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-2112-0.ch008"},{"key":"ref27","author":"Soehnchen","year":"2022","journal-title":"Open loop payment in public transport"},{"key":"ref28","volume-title":"RegioMove","year":"2025"},{"key":"ref29","volume-title":"OpenMove","year":"2025"},{"key":"ref30","volume-title":"FAIRTIQ","year":"2025"},{"key":"ref31","author":"Bahia","year":"2025","journal-title":"\u00a0"},{"key":"ref32","volume-title":"OMNY","year":"2025"},{"key":"ref33","volume-title":"Mwasalat","year":"2025"},{"key":"ref34","author":"Campania","year":"2025","journal-title":"\u00a0"},{"key":"ref35","volume-title":"MonaPass","year":"2025"},{"key":"ref36","year":"2025","journal-title":"My hop card"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.52866\/ijcsm.2024.05.03.004"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79915-1_4"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79915-1_5"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896108"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"102857","DOI":"10.1016\/j.jnca.2020.102857","article-title":"Survey on blockchain based smart contracts: Applications, opportunities and challenges","volume":"177","author":"Hewa","year":"2021","journal-title":"Journal of Network and Computer Applications"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902501"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISC260477.2024.11004198"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Chania, Crete, Greece","start":{"date-parts":[[2025,8,4]]},"end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130038.pdf?arnumber=11130038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T04:59:34Z","timestamp":1757480374000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130038\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130038","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}