-
1
-
-
84969813662
-
-
“CBTC Communication Based Train Control”
-
Ansaldo STS, “CBTC Communication Based Train Control”. http://www. ansaldo-sts.com/sites/ansaldosts.message-asp.com/files/imce/cbtc.pdf
-
-
-
Ansaldo, S.T.S.1
-
2
-
-
84969819756
-
-
Trainguard sirius CBTC (2013)
-
Siemens, A.G.: Trainguard sirius CBTC (2013). http://www.mobility.siemens.com/mobility/global/SiteCollectionDocuments/en/rail-solutions/rail-automation/train-control-systems/trainguard-sirius-cbtc-en.pdf
-
-
-
Siemens, A.G.1
-
3
-
-
84969884110
-
-
SG App
-
MyTransport.SG App. http://www.mytransport.sg/mobile/mytransport mobile.Html
-
-
-
-
4
-
-
84969884108
-
-
Massachusetts Bay Transportation Authority Apps. http://www.mbta.com/ridertools/
-
-
-
-
5
-
-
84907085611
-
Security application of failuremode and effect analysis (FMEA)
-
Bondavalli, A., DiGiandomenico, F. (eds.), Springer, Heidelberg
-
Schmittner, C., Gruber, T., Puschner, P., Schoitsch, E.: Security application of failuremode and effect analysis (FMEA). In: Bondavalli, A., DiGiandomenico, F. (eds.) SAFECOMP 2014. LNCS, vol. 8666, pp. 310–325. Springer, Heidelberg (2014)
-
(2014)
SAFECOMP 2014. LNCS
, vol.8666
, pp. 310-325
-
-
Schmittner, C.1
Gruber, T.2
Puschner, P.3
Schoitsch, E.4
-
6
-
-
0002670359
-
Attack trees: Modeling security threats
-
Schneier, B.: Attack trees: modeling security threats. Dr. Dobb’s J. 24(12), 21–29 (1999)
-
(1999)
Dr. Dobb’s J
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
7
-
-
84969814369
-
-
“IEEE Standard for Communications-Based Train Control (CBTC) Performance and Functional Requirements (1474.1-2004)
-
IEEE Vehicular Technology Society, “IEEE Standard for Communications-Based Train Control (CBTC) Performance and Functional Requirements (1474.1-2004)” (2004)
-
(2004)
-
-
-
8
-
-
84969782725
-
-
“Secur-ed cyber-security roadmap for ptos”
-
Thales, INOV, “Secur-ed cyber-security roadmap for ptos”. http://www.secur-ed.eu/wp-content/uploads/2014/11/SECUR-ED Cyber security roadmapv3.pdf
-
-
-
Thales, I.N.O.V.1
-
11
-
-
84969782723
-
-
Analysis techniques for system reliability - procedure for failure mode and effects analysis (FMEA)
-
IEC 60812, Analysis techniques for system reliability - procedure for failure mode and effects analysis (FMEA) (2006)
-
(2006)
-
-
-
12
-
-
84957036337
-
Security assessments of safety critical systems using HAZOPs
-
Voges, U. (ed.), Springer, Heidelberg
-
Winther, R., Johnsen, O.-A., Gran, B.A.: Security assessments of safety critical systems using HAZOPs. In: Voges, U. (ed.) SAFECOMP 2001. LNCS, vol. 2187, p. 14. Springer, Heidelberg (2001)
-
(2001)
SAFECOMP 2001. LNCS
, vol.2187
, pp. 14
-
-
Winther, R.1
Johnsen, O.-A.2
Gran, B.A.3
-
13
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.: Automated generation and analysis of attack graphs. In: Proceedings of the IEEE Symposium on Security and Privacy (2002)
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
15
-
-
80055043688
-
Model-based security metrics using ADversary VIew Security Evaluation (ADVISE)
-
LeMay, E., Ford, M., Keefe, K., Sanders, W.H., Muehrke, C.: Model-based security metrics using ADversary VIew Security Evaluation (ADVISE). In: Proceedings of the Conference on Quantitative Evaluation of SysTems (QEST) (2011)
-
(2011)
Proceedings of the Conference on Quantitative Evaluation of Systems (QEST)
-
-
Lemay, E.1
Ford, M.2
Keefe, K.3
Sanders, W.H.4
Muehrke, C.5
-
16
-
-
84919473849
-
Go with the flow: Toward workflow-oriented security assessment
-
Chen, B., Kalbarczyk, Z., Nicol, D.M., Sanders, W.H., Tan, R., Temple, W.G., Tippenhauer, N.O., Vu, A.H., Yau, D.K.: Go with the flow: toward workflow-oriented security assessment. In: Proceedings of the New Security Paradigms Workshop (NSPW) (2013)
-
(2013)
Proceedings of the New Security Paradigms Workshop (NSPW)
-
-
Chen, B.1
Kalbarczyk, Z.2
Nicol, D.M.3
Sanders, W.H.4
Tan, R.5
Temple, W.G.6
Tippenhauer, N.O.7
Vu, A.H.8
Yau, D.K.9
-
17
-
-
84969808704
-
-
Securing Control and Communications Systems in Rail Transit Environments: Part IIIa (2014)
-
APTA Standards Development Program, Securing Control and Communications Systems in Rail Transit Environments: Part IIIa (2014). http://www.apta.com/resources/standards/public-comment/Documents/APTASS CCWPSecuringCandCSystemsinRailTransitEnvironmentsPartIIIaPC4Q2014.doc
-
-
-
-
18
-
-
84907333136
-
CyberSAGE: A tool for automatic security assessment of cyber-physical systems
-
Norman, G., Sanders,W. (eds.), Springer, Heidelberg
-
Vu, A.H., Tippenhauer, N.O., Chen, B., Nicol, D.M., Kalbarczyk, Z.: CyberSAGE: a tool for automatic security assessment of cyber-physical systems. In: Norman, G., Sanders,W. (eds.) QEST 2014. LNCS, vol. 8657, pp. 384–387. Springer, Heidelberg (2014)
-
(2014)
QEST 2014. LNCS
, vol.8657
, pp. 384-387
-
-
Vu, A.H.1
Tippenhauer, N.O.2
Chen, B.3
Nicol, D.M.4
Kalbarczyk, Z.5
-
19
-
-
79952577498
-
Foundations of attack– defense trees
-
Degano, P., Etalle, S., Guttman, J. (eds.), Springer, Heidelberg
-
Kordy, B., Mauw, S., Radomirović, S., Schweitzer, P.: Foundations of attack– defense trees. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 80–95. Springer, Heidelberg (2011)
-
(2011)
FAST 2010. LNCS
, vol.6561
, pp. 80-95
-
-
Kordy, B.1
Mauw, S.2
Radomirović, S.3
Schweitzer, P.4
-
20
-
-
84969832429
-
-
ISO 26262, Road vehicles - Functional safety (2011)
-
ISO 26262, Road vehicles - Functional safety (2011)
-
-
-
-
21
-
-
84969864485
-
-
Bowtie Method. http://www.caa.co.uk/bowtie
-
-
-
-
22
-
-
84897535953
-
Critical capacity, travel time delays and travel time distribution of rapid mass transit systems
-
Legara, E.F., Monterola, C., Lee, K.K., Hung, G.G.: Critical capacity, travel time delays and travel time distribution of rapid mass transit systems. Physica A Stat. Mech. Appl. 406, 100–106 (2014)
-
(2014)
Physica a Stat. Mech. Appl
, vol.406
, pp. 100-106
-
-
Legara, E.F.1
Monterola, C.2
Lee, K.K.3
Hung, G.G.4
|