{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T12:21:50Z","timestamp":1778070110151,"version":"3.51.4"},"reference-count":55,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T00:00:00Z","timestamp":1690329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Union","doi-asserted-by":"publisher","award":["830943"],"award-info":[{"award-number":["830943"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>The entropy-oriented approach called security- or cybersecurity-informed safety (SIS or CSIS, respectively) is discussed and developed in order to analyse and evaluate the safety and dependability of autonomous transport systems (ATSs) such as unmanned aerial vehicles (UAVs), unmanned maritime vehicles (UMVs), and satellites. This approach allows for extending and integrating the known techniques FMECA (Failure Modes, Effects, and Criticality Analysis) and IMECA (Intrusion MECA), as well as developing the new SISMECA (SIS-based Intrusion Modes, Effects, and Criticality Analysis) technique. The ontology model and templates for SISMECA implementation are suggested. The methodology of safety assessment is based on (i) the application and enhancement of SISMECA considering the particularities of various ATSs and roles of actors (regulators, developers, operators, customers); (ii) the development of a set of scenarios describing the operation of ATS in conditions of cyberattacks and physical influences; (iii) AI contribution to system protection for the analysed domains; (iv) scenario-based development and analysis of user stories related to different cyber-attacks, as well as ways to protect ATSs from them via AI means\/platforms; (v) profiling of AI platform requirements by use of characteristics based on AI quality model, risk-based assessment of cyberattack criticality, and efficiency of countermeasures which actors can implement. Examples of the application of SISMECA assessment are presented and discussed.<\/jats:p>","DOI":"10.3390\/e25081123","type":"journal-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T01:27:46Z","timestamp":1690421266000},"page":"1123","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection"],"prefix":"10.3390","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4672-6400","authenticated-orcid":false,"given":"Oleg","family":"Illiashenko","sequence":"first","affiliation":[{"name":"Department of Computer Systems, Networks and Cybersecurity, National Aerospace University \u201cKhAI\u201d, 17, Chkalov Str., 61070 Kharkiv, Ukraine"},{"name":"Software Engineering & Dependable Computing Lab, Istituto di Scienza e Tecnologie dell\u2019Informazione \u201cAlessandro Faedo\u201d, Area della Ricerca CNR di Pisa, Via G. Moruzzi 1, 56124 Pisa, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5352-077X","authenticated-orcid":false,"given":"Vyacheslav","family":"Kharchenko","sequence":"additional","affiliation":[{"name":"Department of Computer Systems, Networks and Cybersecurity, National Aerospace University \u201cKhAI\u201d, 17, Chkalov Str., 61070 Kharkiv, Ukraine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4667-2393","authenticated-orcid":false,"given":"Ievgen","family":"Babeshko","sequence":"additional","affiliation":[{"name":"Department of Computer Systems, Networks and Cybersecurity, National Aerospace University \u201cKhAI\u201d, 17, Chkalov Str., 61070 Kharkiv, Ukraine"},{"name":"Software Engineering & Dependable Computing Lab, Istituto di Scienza e Tecnologie dell\u2019Informazione \u201cAlessandro Faedo\u201d, Area della Ricerca CNR di Pisa, Via G. Moruzzi 1, 56124 Pisa, Italy"}]},{"given":"Herman","family":"Fesenko","sequence":"additional","affiliation":[{"name":"Department of Computer Systems, Networks and Cybersecurity, National Aerospace University \u201cKhAI\u201d, 17, Chkalov Str., 61070 Kharkiv, Ukraine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8760-7299","authenticated-orcid":false,"given":"Felicita","family":"Di Giandomenico","sequence":"additional","affiliation":[{"name":"Software Engineering & Dependable Computing Lab, Istituto di Scienza e Tecnologie dell\u2019Informazione \u201cAlessandro Faedo\u201d, Area della Ricerca CNR di Pisa, Via G. Moruzzi 1, 56124 Pisa, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2023,7,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Javed, M.A., Ben Hamida, E., and Znaidi, W. (2016). Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice. Sensors, 16.","DOI":"10.3390\/s16060879"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Zeddini, B., Maachaoui, M., and Inedjaren, Y. (2022). Security Threats in Intelligent Transportation Systems and Their Risk Levels. Risks, 10.","DOI":"10.3390\/risks10050091"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"50","DOI":"10.32620\/reks.2022.4.04","article-title":"Smart Grid, and Wind Generators: An Overview of Cyber Threats and Vulnerabilities of Power Supply Networks","volume":"4","author":"Fursov","year":"2022","journal-title":"Radioelectron. Comput. Syst."},{"key":"ref_4","first-page":"102722","article-title":"Weaponized AI for cyber attacks","volume":"57","author":"Yamin","year":"2021","journal-title":"J. Inform. Secur. Appl."},{"key":"ref_5","first-page":"20","article-title":"The AI-based Cyber Threat Landscape: A survey","volume":"53","author":"Kaloudi","year":"2020","journal-title":"ACM Comput. Surv."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2037254","DOI":"10.1080\/08839514.2022.2037254","article-title":"The Emerging Threat of AI-driven Cyber Attacks: A Review","volume":"36","author":"Guembe","year":"2022","journal-title":"Appl. Art. Intell."},{"key":"ref_7","unstructured":"Kasabji, D. (2023, March 20). How Could AI Simplify Malware Attacks, and Why Is This Worrying?. Available online: https:\/\/conscia.com\/blog\/how-could-ai-simplify-malware-attacks-and-why-is-this-worrying."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/978-3-030-21568-2_11","article-title":"PassGAN: A Deep Learning Approach for Password Guessing","volume":"Volume 11464","author":"Deng","year":"2019","journal-title":"Applied Cryptography and Network Security. ACNS 2019"},{"key":"ref_9","unstructured":"Trieu, K., and Yang, Y. (2018, January 17\u201318). Artificial Intelligence-Based Password Brute Force Attacks. Proceedings of the 2018 Midwest Association for Information Systems Conference, St. Louis, MO, USA."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Lee, K., and Yim, K. (2020). Cybersecurity Threats Based on Machine Learning-Based Offensive Technique for Password Authentication. Appl. Sci., 10.","DOI":"10.3390\/app10041286"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Hu, W., and Tan, Y. (2021). Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. arXiv.","DOI":"10.1007\/978-981-19-8991-9_29"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Chung, K., Kalbarczyk, Z.T., and Iyer, R.K. (2019, January 16\u201318). Availability Attacks on Computing Systems Through Alteration of Environmental Control: Smart Malware Approach. Proceedings of the 10th ACM\/IEEE International Conference on Cyber-Physical Systems (ICCPS), Montreal, QC, Canada.","DOI":"10.1145\/3302509.3311041"},{"key":"ref_13","unstructured":"Kirat, D., Jang, J., and Stoecklin, M. (2023, April 20). DeepLocker Concealing Targeted Attacks with AI Locksmithing. Available online: https:\/\/www.blackhat.com\/us-18\/briefings\/schedule\/index.html#deeplocker\u2014concealing-targeted-attacks-with-ailocksmithing-11549."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"57243","DOI":"10.1109\/ACCESS.2021.3072030","article-title":"Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges","volume":"9","author":"Yahuza","year":"2021","journal-title":"IEEE Access"},{"key":"ref_15","first-page":"20","article-title":"Cyber-attacks Against the Autonomous Ship","volume":"Volume 11387","author":"Katsikas","year":"2019","journal-title":"Computer Security. SECPRE CyberICPS 2018"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/s10207-020-00503-w","article-title":"Cyber Security in New Space: Analysis of Threats, Key Enabling Technologies and Challenges","volume":"20","author":"Manulis","year":"2021","journal-title":"Int. J. Inf. Secur."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2295","DOI":"10.1007\/978-981-10-6571-2_280","article-title":"Satellite Networking Intrusion Detection System Design Based on Deep Learning Method","volume":"Volume 463","author":"Liang","year":"2019","journal-title":"Communications, Signal Processing, and Systems. CSPS 2017"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"10885","DOI":"10.1007\/s00521-022-07015-9","article-title":"High-performance Intrusion Detection System for Networked UAVs via Deep Learning","volume":"34","year":"2022","journal-title":"Neural Comput. Appl."},{"key":"ref_19","unstructured":"Gecgel, S., and Kurt, G.K. (July, January 28). Intermittent Jamming Against Telemetry and Telecommand of Satellite Systems and a Learning-driven Detection Strategy. Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning (WiseML), Abu Dhabi, United Arab Emirates."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"107784","DOI":"10.1016\/j.compeleceng.2022.107784","article-title":"Artificial Intelligence for Intrusion Detection Systems in Unmanned Aerial Vehicles","volume":"99","author":"Whelan","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"107745","DOI":"10.1016\/j.compeleceng.2022.107745","article-title":"A New Intelligent Satellite Deep Learning Network Forensic Framework for SSNs","volume":"99","author":"Koroniotis","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Ashraf, I., Narra, M., Umer, M., Majeed, R., Sadiq, S., Javaid, F., and Rasool, N. (2022). A Deep Learning-Based Smart Framework for Cyber-Physical and Satellite System Security Threats Detection. Electronics, 11.","DOI":"10.3390\/electronics11040667"},{"key":"ref_23","first-page":"100218","article-title":"Security Analysis of Drones Systems: Attacks, limitations, and Recommendations","volume":"11","author":"Yaacoub","year":"2020","journal-title":"IoT"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Furumoto, K., Kolehmainen, A., Silverajan, B., Takahashi, T., Inoue, D., and Nakao, K. (2020, January 2\u20136). Toward Automated Smart Ships: Designing Effective Cyber Risk Management. Proceedings of the 2020 IEEE Congress on Cybermatics, Rhodes Island, Greece.","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00034"},{"key":"ref_25","unstructured":"Torianyk, V., Kharchenko, V., and Zemlianko, H. (2021, January 24\u201326). IMECA Based Assessment of Internet of Drones Systems Cyber Security Considering Radio Frequency Vulnerabilities. Proceedings of the 2nd International Workshop on Intelligent Information Technologies and Systems of Information Security, Khmelnytskyi, Ukraine. Available online: https:\/\/ceur-ws.org\/Vol-2853\/paper50.pdf."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Piumatti, D., Sini, J., Borlo, S., Sonza Reorda, M., Bojoi, R., and Violante, M. (2020). Multilevel Simulation Methodology for FMECA Study Applied to a Complex Cyber-Physical System. Electronics, 9.","DOI":"10.3390\/electronics9101736"},{"key":"ref_27","first-page":"94","article-title":"Asset Access Risk Analysis Method in the Physical Protection Systems","volume":"4","author":"Solovyov","year":"2019","journal-title":"Radioelectron. Comput. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"131","DOI":"10.32620\/reks.2022.2.11","article-title":"Basic Model of Non-functional Characteristics for Assessment of Artificial Intelligence Quality","volume":"2","author":"Kharchenko","year":"2022","journal-title":"Radioelectron. Comput. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Kharchenko, V., Fesenko, H., and Illiashenko, O. (2022). Quality Models for Artificial Intelligence Systems: Characteristic-Based Approach, Development and Application. Sensors, 22.","DOI":"10.3390\/s22134865"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/s11219-021-09557-y","article-title":"Construction of a Quality Model for Machine Learning Systems","volume":"30","author":"Siebert","year":"2021","journal-title":"Softw. Qual. J."},{"key":"ref_31","first-page":"41","article-title":"A Framework for Metric Evaluation of AI Systems Based on Quality Model","volume":"2","author":"Vasyliev","year":"2022","journal-title":"Syst. Control Navig."},{"key":"ref_32","first-page":"33","article-title":"Quality Assurance for AI-Based Systems: Overview and Challenges (Introduction to Interactive Session)","volume":"Volume 404","author":"Winkler","year":"2021","journal-title":"Software Quality: Future Perspectives on Software Engineering Quality. SWQD 2021"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"121","DOI":"10.32620\/reks.2022.3.09","article-title":"Information-extreme Machine Learning of a Cyber attack Detection System","volume":"3","author":"Dovbysh","year":"2022","journal-title":"Radioelectron. Comput. Syst."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"133","DOI":"10.32620\/reks.2021.1.12","article-title":"Vulnerability Analysis and Method of Selection of Communication Protocols for Information Transfer in Internet of Things Systems","volume":"1","author":"Kolisnyk","year":"2021","journal-title":"Radioelectron. Comput. Syst."},{"key":"ref_35","first-page":"17","article-title":"Security-Informed Safety: If It\u2019s Not Secure, It\u2019s Not Safe","volume":"Volume 8166","author":"Gorbenko","year":"2013","journal-title":"Software Engineering for Resilient Systems. SERENE 2013"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"108569","DOI":"10.1016\/j.oceaneng.2021.108569","article-title":"A System-theoretic Approach to Safety and Security Co-Analysis of Autonomous Ships","volume":"222","author":"Zhou","year":"2021","journal-title":"Ocean Eng."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Pascarella, D., Gigante, G., Vozella, A., Bieber, P., Dubot, T., Martinavarro, E., Barraco, G., and Li Calzi, G. (2022). A Methodological Framework for the Risk Assessment of Drone Intrusions in Airports. Aerospace, 9.","DOI":"10.3390\/aerospace9120747"},{"key":"ref_38","unstructured":"Breda, P., Markova, R., Abdin, A., Jha, D., Carlo, A., and Mant\u0131, N.P. (2022, January 18\u201322). Cyber Vulnerabilities and Risks of AI Technologies in Space Applications. Proceedings of the 73rd International Astronautical Congress (IAC), Paris, France. Available online: https:\/\/hal.science\/hal-03908014\/document."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Babeshko, I., Illiashenko, O., Kharchenko, V., and Leontiev, K. (2022). Towards Trustworthy Safety Assessment by Providing Expert and Tool-Based XMECA Techniques. Mathematics, 10.","DOI":"10.3390\/math10132297"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Dziech, A., Mees, W., and Niemiec, M. (2022). Multimedia Communications, Services and Security. MCSS 2022. Communications in Computer and Information Science, Springer.","DOI":"10.1007\/978-3-031-20215-5"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1151","DOI":"10.3390\/smartcities5030058","article-title":"UAV Fleet as a Dependable Service for Smart Cities: Model-Based Assessment and Application","volume":"5","author":"Kharchenko","year":"2022","journal-title":"Smart Cities"},{"key":"ref_42","unstructured":"(2018). Failure Modes and Effects Analysis (FMEA and FMECA) (Standard No. IEC 60812:2018)."},{"key":"ref_43","unstructured":"(2023, March 09). Deliverables\u2014ECHO Network. Available online: https:\/\/echonetwork.eu\/deliverables\/."},{"key":"ref_44","unstructured":"European Commission (2023, March 09). Communication from the Commission to the European Parliament, the European Council, the Council, the European economic and Social Committee and the Committee of the Regions. Artificial Intelligence for Europe. Available online: https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:52018DC0237&from=EN."},{"key":"ref_45","unstructured":"(2023, March 09). European Agency for Safety and Health at Work, EU Strategic Framework on Health and Safety at Work 2021\u20132027. Available online: https:\/\/osha.europa.eu\/en\/safety-and-health-legislation\/eu-strategic-framework-health-and-safety-work-2021-2027."},{"key":"ref_46","unstructured":"(2023, March 09). European Agency for Safety and Health at Work, Directive 2006\/42\/EC\u2014New Machinery Directive. Available online: https:\/\/osha.europa.eu\/en\/legislation\/directives\/directive-2006-42-ec-of-the-european-parliament-and-of-the-council."},{"key":"ref_47","unstructured":"European Commission (2023, March 09). Radio Equipment Directive (RED). Available online: https:\/\/single-market-economy.ec.europa.eu\/sectors\/electrical-and-electronic-engineering-industries-eei\/radio-equipment-directive-red_en."},{"key":"ref_48","unstructured":"European Parliament (2023, March 09). Council of the European Union, Directive 2001\/95\/EC of the European Parliament and of the Council of 3 December 2001 on General Product Safety. Available online: https:\/\/eur-lex.europa.eu\/legal-content\/EN\/ALL\/?uri=celex%3A32001L0095."},{"key":"ref_49","unstructured":"Bertuzzi, L. (2023, March 09). EU Finalises New Product Safety Requirements: Here Is What Changes. Available online: https:\/\/www.euractiv.com\/section\/digital-single-market\/news\/eu-finalises-new-product-safety-requirements-here-is-what-changes\/."},{"key":"ref_50","unstructured":"(2023, March 09). European CBRN Innovation for the Market Cluster ENCIRCLE, EU CBRNe Policy. Available online: https:\/\/encircle-cbrn.eu\/resources\/eu-cbrn-policy\/."},{"key":"ref_51","unstructured":"European Commission (2023, March 09). EU Develops Strategic Reserves for Chemical, Biological and Radio-Nuclear Emergencies. Available online: https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/en\/ip_22_2218."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Veprytska, O., and Kharchenko, V. (2022, January 9\u201311). AI Powered Attacks Against AI Powered Protection: Classification, Scenarios and Risk Analysis. Proceedings of the 2022 12th International Conference on Dependable Systems, Services and Technologies (DESSERT), Athens, Greece.","DOI":"10.1109\/DESSERT58054.2022.10018770"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"145","DOI":"10.32620\/reks.2022.2.12","article-title":"Functional Safety Analysis of Safety-Critical System Using State Transition Diagram","volume":"1","author":"Ozirkovskyy","year":"2022","journal-title":"Radioelectron. Comput. Syst."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Kharchenko, V., Ponochovnyi, Y., Ivanchenko, O., Fesenko, H., and Illiashenko, O. (2022). Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems. Cryptography, 6.","DOI":"10.3390\/cryptography6030044"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Bisikalo, O., Kovtun, V., Kovtun, O., and Romanenko, V. (2020, January 14\u201318). Research of safety and survivability models of the information system for critical use. Proceedings of the 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine.","DOI":"10.1109\/DESSERT50317.2020.9125061"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/8\/1123\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:19:42Z","timestamp":1760127582000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/8\/1123"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,26]]},"references-count":55,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2023,8]]}},"alternative-id":["e25081123"],"URL":"https:\/\/doi.org\/10.3390\/e25081123","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,26]]}}}