{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T08:18:55Z","timestamp":1770452335638,"version":"3.49.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/cns.2018.8433201","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T22:09:06Z","timestamp":1534198146000},"page":"1-9","source":"Crossref","is-referenced-by-count":9,"title":["Cyber-Physical Security Risk Assessment for Train Control and Monitoring Systems"],"prefix":"10.1109","author":[{"given":"Mouna","family":"Rekik","sequence":"first","affiliation":[]},{"given":"Christophe","family":"Gransart","sequence":"additional","affiliation":[]},{"given":"Marion","family":"Berbineau","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","year":"2011","journal-title":"ETSI TS 102 165-1 V4 2 3 (2011-03) Part 1 Method and proforma for Threat Risk Vulnerability Analysis"},{"key":"ref32","year":"2017","journal-title":"Common Methodology for Information Technology Security Evaluation-Evaluation Methodology"},{"key":"ref31","first-page":"195","article-title":"A systematic approach to a qualified security risk analysis for vehicular IT systems","author":"wolf","year":"2012","journal-title":"Automotive-Safety & Security"},{"key":"ref30","year":"2016","journal-title":"Cyber Threat Scenarios for Rail Vehicle IT Systems Technical report"},{"key":"ref34","article-title":"WTCMS Security Risk Assessment Methodology","year":"2016","journal-title":"Technical Report"},{"key":"ref10","year":"2006","journal-title":"FIPS PUB 200 Minimum Security Requirements for Federal Information and Information Systems"},{"key":"ref11","year":"2014","journal-title":"NIST Special Publication 800-37 Revision 1 Guide for Applying the Risk Management Framework to Federal Information Systems A Security Life Cycle Approach"},{"key":"ref12","year":"2013","journal-title":"NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems and Organizations"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.02.002"},{"key":"ref14","year":"0","journal-title":"Cyber security a threat to industry 4 0 implementation?"},{"key":"ref15","article-title":"Interoperability and security challenges of industry 4.0","author":"watson","year":"2017","journal-title":"INFORMATIK 2017"},{"key":"ref16","year":"2016","journal-title":"Specification of Wireless TCMS Technical report"},{"key":"ref17","year":"2016","journal-title":"WLAN in WTCN Discussion Paper Technical report"},{"key":"ref18","year":"2016","journal-title":"Deliverable D2 5 - Architecture for the Train and Consist Wireless Networks Technical report"},{"key":"ref19","year":"2016","journal-title":"Infotainment and CCTV Technical report"},{"key":"ref28","article-title":"Cyber security and financial stability: How cyber-attacks could materially impact the global financial system","author":"vazquez","year":"2017","journal-title":"Technical Report"},{"key":"ref4","year":"2010","journal-title":"EN 50159 Railway Applications - Communication Signalling and Processing Systems - Safety-related Communication in Transmission Systems"},{"key":"ref27","author":"mcdonald","year":"2013","journal-title":"Stuxnet 0 5 The missing link Technical report"},{"key":"ref3","year":"2009","journal-title":"IEC ISO\/IEC 15408&#x2013;1 2009 Information technology &#x2013; Security techniques &#x2013; Evaluation criteria for IT security &#x2013; Part 1 Introduction and general model"},{"key":"ref6","year":"2007","journal-title":"ETSI - TS 102 165 Telecommunications And Internet Converged Services And Protocols For Advanced Networking (Tispan) Methods And Protocols"},{"key":"ref29","year":"2011","journal-title":"ISO\/IEC 27005 2011 technologies de l&#x2019;information &#x2013; techniques de s&#x00E9;curit&#x00E9; &#x2013; gestion des risques li&#x00E9;s &#x00E0; la s&#x00E9;curit&#x00E9; de l&#x2019;information"},{"key":"ref5","author":"fraser","year":"1997","journal-title":"RFC 2196 Site Security Handbook"},{"key":"ref8","year":"2015","journal-title":"VDE V 0831-104 2015-10 Electric signalling systems for railways - Part 104 IT Security Guideline based on IEC 62443"},{"key":"ref7","year":"2013","journal-title":"VDE V 0831-102 2013-12 Electric signalling systems for railways - Part 102 Protection profile for technical functions in railway signalling"},{"key":"ref2","year":"2016","journal-title":"ISO\/IEC 27000 Pr&#x00E9;visualiser Technologies de l&#x2019;information &#x2013; Techniques de s&#x00E9;curit&#x00E9; &#x2013; Syst&#x00E8;mes de gestion de s&#x00E9;curit&#x00E9; de l&#x2019;information &#x2013; Vue d&#x2019;ensemble et vocabulaire"},{"key":"ref9","year":"2004","journal-title":"FIPS PUB 199 Standards for Security Categorization of Federal Information and Information Systems"},{"key":"ref1","year":"2016","journal-title":"ISA99 Industrial Automation and Control System Security"},{"key":"ref20","year":"2016","journal-title":"IEC 61375-2-4 TS Electronic Railway Equipment &#x2013; Train Communication Network (TCN) &#x2013; Part 2-4 TCN Application profile"},{"key":"ref22","article-title":"Cyber security and resilience of smart cars: Good practices and recommendations","year":"2016","journal-title":"Technical Report EN"},{"key":"ref21","year":"2016","journal-title":"Threat taxonomy A tool for structuring threat information Technical report"},{"key":"ref24","article-title":"CERT Insider Threat Team. Unintentional insider threats: A foundational study","year":"2013","journal-title":"Software Engineering Institute Technical Report"},{"key":"ref23","article-title":"Cyber security and resilience of intelligent public transport: Good practices and recommendations","author":"l\u00e9vy-bencheton","year":"2015","journal-title":"Technical Report"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"ref25","article-title":"Human errors in information security","volume":"1","author":"ahmed","year":"2012","journal-title":"International Journal of Advanced Trends in Computer Science and Engineering"}],"event":{"name":"2018 IEEE Conference on Communications and Network Security (CNS)","location":"Beijing","start":{"date-parts":[[2018,5,30]]},"end":{"date-parts":[[2018,6,1]]}},"container-title":["2018 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410986\/8433121\/08433201.pdf?arnumber=8433201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T14:57:51Z","timestamp":1643209071000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8433201\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/cns.2018.8433201","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}