{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:15:31Z","timestamp":1742912131470,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030187439"},{"type":"electronic","value":"9783030187446"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-18744-6_17","type":"book-chapter","created":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T10:32:32Z","timestamp":1558348352000},"page":"261-271","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Threat Modeling in the Railway Domain"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4430-6813","authenticated-orcid":false,"given":"Christoph","family":"Schmittner","sequence":"first","affiliation":[]},{"given":"Peter","family":"Tummeltshammer","sequence":"additional","affiliation":[]},{"given":"David","family":"Hofbauer","sequence":"additional","affiliation":[]},{"given":"Abdelkader Magdy","family":"Shaaban","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Meidlinger","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Tauber","sequence":"additional","affiliation":[]},{"given":"Arndt","family":"Bonitz","sequence":"additional","affiliation":[]},{"given":"Reinhard","family":"Hametner","sequence":"additional","affiliation":[]},{"given":"Manuela","family":"Brandstetter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,24]]},"reference":[{"key":"17_CR1","unstructured":"Securing Control and Communications Systems in Rail Transit Environments Part II: Defining a Security Zone Architecture for Rail Transit and Protecting Critical Zones. RECOMMENDED PRACTICE APTA-SS-CCS-RP-002-13, American Public Transportation Association, June 2013"},{"key":"17_CR2","unstructured":"Common Methodology for Information Technology Security Evaluation. Technical report, CCMB-2017-04-004, April 2017"},{"key":"17_CR3","unstructured":"IEC 62443 Security for industrial automation and control systems - Part 3-2: Security risk assessment and system design. Committee Draft for Vote (CDV) IEC 62443-3-2 ED1, France (2018)"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-33951-1_1","volume-title":"Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification","author":"R Bloomfield","year":"2016","unstructured":"Bloomfield, R., Bendele, M., Bishop, P., Stroud, R., Tonks, S.: The risk assessment of ERTMS-based railway systems from a cyber security perspective: methodology and lessons learned. In: Lecomte, T., Pinger, R., Romanovsky, A. (eds.) RSSRail 2016. LNCS, vol. 9707, pp. 3\u201319. Springer, Cham (2016). \n https:\/\/doi.org\/10.1007\/978-3-319-33951-1_1"},{"key":"17_CR5","unstructured":"Braband, J.: Towards an IT Security Framework for Railway Automation. Toulouse, February 2014"},{"key":"17_CR6","unstructured":"CENELEC: EN 50159:2010: Railway applications - communication, signalling and processing systems - safety-related communication in transmission systems"},{"key":"17_CR7","unstructured":"CENELEC, European Committee for Electrotechnical Standardization: EN 50128 Railway applications - Communication, signalling and processing systems - Software for railway control and protection systems (2011)"},{"key":"17_CR8","unstructured":"DKE Deutsche Kommission Elektrotechnik Elektronik Informationstechnik: Electric signalling systems for railways \u2013 Part 104: IT Security Guideline based on IEC 62443 (2014)"},{"key":"17_CR9","unstructured":"European Committee for Standardization: EN 50126\u20131 Railway applications - The specification and demonstration of Reliability, Availability, Maintainability and Safety (RAMS) - Part 1: Basic requirements and generic process (2010)"},{"key":"17_CR10","unstructured":"European Committee for Standardization: EN 50129, Railway applications - Communication, signalling and processing systems - Safety related electronic systems for signalling (2010)"},{"issue":"3","key":"17_CR11","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MVT.2016.2564446","volume":"11","author":"Ruisi He","year":"2016","unstructured":"He, R., et al.: High-speed railway communications: from GSM-R to LTE-R. IEEE Veh. Technol. Mag. 11(3) (2016). \n https:\/\/doi.org\/10.1109\/MVT.2016.2564446\n \n . \n http:\/\/ieeexplore.ieee.org\/document\/7553613\/","journal-title":"IEEE Vehicular Technology Magazine"},{"key":"17_CR12","volume-title":"The Security Development Lifecycle","author":"M Howard","year":"2006","unstructured":"Howard, M., Lipner, S.: The Security Development Lifecycle, vol. 8. Microsoft Press, Redmond (2006)"},{"key":"17_CR13","unstructured":"International Electrotechnical Commission: IEC 62443: Industrial communication networks - Network and system security"},{"key":"17_CR14","unstructured":"Karahasanovic, A., Kleberger, P., Almgren, M.: Adapting Threat Modeling Methods for the Automotive Industry, p. 11 (2017)"},{"key":"17_CR15","unstructured":"Koramis, Sophos: Whitepaper Project HoneyTrain. Technical report, September 2015"},{"issue":"10","key":"17_CR16","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/MCOM.2015.7295471","volume":"53","author":"I Lopez","year":"2015","unstructured":"Lopez, I., Aguado, M.: Cyber security analysis of the European train controlsystem. IEEE Commun. Mag. 53(10), 110\u2013116 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"17_CR17","doi-asserted-by":"publisher","first-page":"333","DOI":"10.14257\/astl.2016.139.68","volume":"139","author":"Z Ma","year":"2016","unstructured":"Ma, Z., Schmittner, C.: Threat modeling for automotive security analysis. Adv. Sci. Technol. Lett. 139, 333\u2013339 (2016)","journal-title":"Adv. Sci. Technol. Lett."},{"key":"17_CR18","unstructured":"Microsoft: Microsoft Threat Modeling Tool (2016). \n https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=49168"},{"key":"17_CR19","unstructured":"Microsoft - SDL Team: Introducing Microsoft Threat Modeling Tool 2014 (2014). \n https:\/\/www.microsoft.com\/security\/blog\/2014\/04\/15\/introducing-microsoft-threat-modeling-tool-2014\/"},{"key":"17_CR20","unstructured":"Meland, P.H., Spampinato, D.G., Hagen, E., Baadshaug, E.T.: SeaMonster: providing tool support for security modeling, p. 10 (2008)"},{"issue":"18","key":"17_CR21","first-page":"7","volume":"55","author":"H Rong","year":"2017","unstructured":"Rong, H., Liu, W.: Development and research of train operation control system and safety computer platform based on COTS. Bolet\u00edn T\u00e9cnico 55(18), 7 (2017)","journal-title":"Bolet\u00edn T\u00e9cnico"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Strobl, S., Hofbauer, D., Schmittner, C., Maksuti, S., Tauber, M., Delsing, J.: Connected cars\u2014threats, vulnerabilities and their impact. In: 2018 IEEE Industrial Cyber-Physical Systems (ICPS), pp. 375\u2013380. IEEE (2018)","DOI":"10.1109\/ICPHYS.2018.8387687"},{"key":"17_CR23","unstructured":"unife: From Trucks to Trains - How ERTMS Helps Making Rail Freight More Competitive (2018)"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/3-540-45416-0_2","volume-title":"Computer Safety, Reliability and Security","author":"R Winther","year":"2001","unstructured":"Winther, R., Johnsen, O.-A., Gran, B.A.: Security assessments of safety critical systems using HAZOPs. In: Voges, U. (ed.) SAFECOMP 2001. LNCS, vol. 2187, pp. 14\u201324. Springer, Heidelberg (2001). \n https:\/\/doi.org\/10.1007\/3-540-45416-0_2"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Yi, S., Wang, H., Ma, Y., Xie, F., Zhang, P., Di, L.: A safety-security assessment approach for communication-based train control (CBTC) systems based on the extended fault tree. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/ICCCN.2018.8487464"}],"container-title":["Lecture Notes in Computer Science","Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-18744-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T19:05:02Z","timestamp":1558983902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-18744-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030187439","9783030187446"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-18744-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RSSRail","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Reliability, Safety, and Security of Railway Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lille","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rssrail2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conferences.ncl.ac.uk\/rssrail2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"38","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}