{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:30:39Z","timestamp":1763343039659,"version":"3.45.0"},"reference-count":45,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"vor","delay-in-days":144,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061525","type":"journal-article","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T05:08:41Z","timestamp":1743484121000},"page":"4281-4313","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["A Hierarchical Security Situation Assessment Approach for Train Control System under Cyber Attacks"],"prefix":"10.32604","volume":"83","author":[{"given":"Qichang","family":"Li","sequence":"first","affiliation":[]},{"given":"Bing","family":"Bu","sequence":"additional","affiliation":[]},{"given":"Junyi","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.hspr.2022.12.001","article-title":"Security of railway control systems: a survey, research issues and challenges","volume":"1","author":"Yu","year":"2023","journal-title":"High-speed Railway"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"92312","DOI":"10.1109\/ACCESS.2023.3309005","article-title":"Cybersecurity considerations for communication based train control","volume":"11","author":"Soderi","year":"2023","journal-title":"IEEE Access"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/09544097221089389","article-title":"A review on cybersecurity in railways","volume":"237","author":"Kour","year":"2023","journal-title":"Proc Institut Mech Eng Part F: J Rail Rapid Transit"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"991","DOI":"10.3390\/electronics8090991","article-title":"Security analysis for CBTC systems under attack-defense confrontation","volume":"8","author":"Wu","year":"2019","journal-title":"Electronics"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"3909173","DOI":"10.1155\/2024\/3909173","article-title":"A critical review of artificial intelligence based approaches in intrusion detection: a comprehensive analysis","volume":"2024","author":"Muneer","year":"2024","journal-title":"J Eng"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.comcom.2023.09.030","article-title":"Untargeted white-box adversarial attack with heuristic defence methods in real-time deep learning based network intrusion detection system","volume":"218","author":"Roshan","year":"2024","journal-title":"Comput Commun"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"2608","DOI":"10.3390\/s23052608","article-title":"Survey of technology in network security situation awareness","volume":"23","author":"Zhang","year":"2023","journal-title":"Sensors"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"6909","DOI":"10.1002\/int.22867","article-title":"Network security situation assessment with network attack behavior classification","volume":"37","author":"Yang","year":"2022","journal-title":"Int J Intell Syst"},{"key":"ref9","series-title":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","first-page":"451","article-title":"CBTC systems resilience evaluation based on resource state model under DoS attacks","author":"Guo","year":"2021"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1029","DOI":"10.1007\/s10462-021-09976-0","article-title":"Artificial intelligence in cyber security: research advances, challenges, and opportunities","volume":"55","author":"Zhang","year":"2022","journal-title":"Artif Intell Rev"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"109680","DOI":"10.1016\/j.asoc.2022.109680","article-title":"A generic cyber immune framework for anomaly detection using artificial immune systems","volume":"130","author":"Bejoy","year":"2022","journal-title":"Appl Soft Comput"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"103054","DOI":"10.1016\/j.cose.2022.103054","article-title":"Synthetic attack data generation model applying generative adversarial network for intrusion detection","volume":"125","author":"Kumar","year":"2023","journal-title":"Comput Secur"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"4179","DOI":"10.1109\/TNSM.2024.3403842","article-title":"Cooperative edge caching based on elastic federated and multi-agent deep reinforcement learning in next-generation networks","volume":"21","author":"Wu","year":"2024","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"38521","DOI":"10.1109\/JIOT.2024.3448538","article-title":"Semantic-aware spectrum sharing in internet of vehicles based on deep reinforcement learning","volume":"11","author":"Shao","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"102066","DOI":"10.1016\/j.inffus.2023.102066","article-title":"A multi-objective decision method for the network security situation grade assessment under multi-source information","volume":"102","author":"Yu","year":"2024","journal-title":"Inf Fusion"},{"key":"ref16","first-page":"209","article-title":"Network awareness of security situation information security measurement method based on data mining","volume":"46","author":"Wang","year":"2024","journal-title":"J Intell Fuzzy Syst"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"483","DOI":"10.3390\/electronics12030483","article-title":"Network situation assessment method based on improved BP neural network","volume":"12","author":"Du","year":"2023","journal-title":"Electronics"},{"key":"ref18","first-page":"549","article-title":"Research on network security situation awareness and dynamic game based on deep Q learning network","volume":"24","author":"Guo","year":"2023","journal-title":"J Internet Technol"},{"journal-title":"Security and communication networks","year":"2020","author":"Yang","key":"ref19"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1401","DOI":"10.1007\/s11277-017-5202-3","article-title":"Research on network security situation assessment and quantification method based on analytic hierarchy process","volume":"102","author":"Wang","year":"2018","journal-title":"Wirel Pers Commun"},{"key":"ref21","series-title":"2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)","first-page":"776","article-title":"Power Grid Security Situation Awareness Method based on Deep Learning","author":"Zhang","year":"2023"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"11384","DOI":"10.3390\/app142311384","article-title":"Security situation assessment for terminal area control system operation based on BN-ISSA-ELM","volume":"14","author":"Zhang","year":"2024","journal-title":"Appl Sci"},{"key":"ref23","volume":"2078","author":"Zhao","year":"2021","journal-title":"Journal of Physics: Conference Series"},{"key":"ref24","series-title":"2022 11th International Conference of Information and Communication Technology (ICTech)","first-page":"43","article-title":"Industrial control network security situation assessment based on SAE-RBF","author":"Li","year":"2022"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"3101","DOI":"10.3390\/app11073101","article-title":"MADDPG-based security situational awareness for smart grid with intelligent edge","volume":"11","author":"Lei","year":"2021","journal-title":"Appl Sci"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"21670","DOI":"10.1109\/JIOT.2023.3289625","article-title":"A survey on cyber-physical systems security","volume":"10","author":"Yu","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1186\/s13677-023-00564-x","article-title":"Security strategy for autonomous vehicle cyber-physical systems using transfer learning","volume":"12","author":"Alsulami","year":"2023","journal-title":"J Cloud Comput"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.1109\/TIV.2023.3326736","article-title":"Cybersecurity on connected and automated transportation systems: a survey","volume":"9","author":"Abdo","year":"2024","journal-title":"IEEE Trans Intell Vehicles"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"2175780","DOI":"10.1155\/2021\/2175780","article-title":"A resilience-based security assessment approach for CBTC systems","volume":"2021","author":"Lu","year":"2021","journal-title":"Complexity"},{"key":"ref30","series-title":"2020 Chinese Automation Congress (CAC)","first-page":"3488","article-title":"A quantitative situation awareness approach for cbtc systems based on multi-dimensional Gaussian hidden Markov model","author":"Kanghao","year":"2020"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"2286","DOI":"10.1109\/TITS.2020.3030496","article-title":"A cross-layer defense scheme for edge intelligence-enabled CBTC systems against MitM attacks","volume":"22","author":"Li","year":"2020","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"8153","DOI":"10.1109\/TIE.2018.2798605","article-title":"Assessing the physical impact of cyberattacks on industrial cyber-physical systems","volume":"65","author":"Huang","year":"2018","journal-title":"IEEE Trans Ind Electron"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"2018","DOI":"10.1109\/JSYST.2022.3215591","article-title":"A cyber-physical power system risk assessment model against cyberattacks","volume":"17","author":"Yan","year":"2022","journal-title":"IEEE Syst J"},{"key":"ref34","series-title":"IEEE INFOCOM 2008\u2014The 27th Conference on Computer Communications","first-page":"1957","article-title":"A novel quantitative approach for measuring network security","author":"Ahmed","year":"2008"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.ins.2013.02.036","article-title":"A security risk analysis model for information systems: causal relationships of risk factors and vulnerability propagation analysis","volume":"256","author":"Feng","year":"2014","journal-title":"Inf Sci"},{"key":"ref36","first-page":"125","article-title":"Information security vulnerability association analysis based on ontology technology","volume":"40","author":"Zhang","year":"2015","journal-title":"J East China Univ Sci Technol"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"14049","DOI":"10.1007\/s00521-021-06047-x","article-title":"A novel deep learning-based feature selection model for improving the static analysis of vulnerability detection","volume":"33","author":"Batur \u015eahin","year":"2021","journal-title":"Neural Comput Appl"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","article-title":"Generative adversarial networks: an overview","volume":"35","author":"Creswell","year":"2018","journal-title":"IEEE Signal Process Mag"},{"key":"ref39","series-title":"2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC)","first-page":"4253","article-title":"A hybrid intrusion detection method using improved stacking ensemble algorithm and false positive elimination strategy for CBTC","author":"Yin","year":"2022"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"132290","DOI":"10.1109\/ACCESS.2021.3112166","article-title":"A novel hierarchical situation awareness model for CBTC using SVD entropy and GRU with PRD algorithms","volume":"9","author":"Li","year":"2021","journal-title":"IEEE Access"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"182","DOI":"10.4236\/jcc.2017.57016","article-title":"An immunity-based IOT environment security situation awareness model","volume":"5","author":"Shi","year":"2017","journal-title":"J Comput Commun"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"7094","DOI":"10.1007\/s10489-021-02205-9","article-title":"Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM","volume":"51","author":"Binbusayyis","year":"2021","journal-title":"Appl Intell"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1186\/s13634-022-00871-6","article-title":"Intrusion detection system combined enhanced random forest with SMOTE algorithm","volume":"2022","author":"Wu","year":"2022","journal-title":"EURASIP J Adv Signal Process"},{"key":"ref44","series-title":"International Conference on Electrical and Electronics Engineering","first-page":"13","article-title":"Intrusion detection based on PCA with improved K-means","author":"Chapagain","year":"2022"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"103","DOI":"10.3390\/info14020103","article-title":"A comparative analysis of supervised and unsupervised models for detecting attacks on the intrusion detection systems","volume":"14","author":"Talaei Khoei","year":"2023","journal-title":"Information"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_61525\/TSP_CMC_61525.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:27:39Z","timestamp":1763342859000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/60990"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":45,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061525","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-11-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-27","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}