“…Keeping in mind the SIS approach mentioned above, the analysed references were subdivided into the following: - the references describing stages of the Modified Cybersecurity Kill Chain for AI-powered attacks [ 5 , 6 ];
- the references addressing AI-powered attacks utilised against various components of the ATS infrastructure [ 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 ];
- the references presenting ATSs cybersecurity assessment and assurance techniques, including decisions based on the application of AI and AI platform (AIP) [ 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 ];
- the references highlighting ATS safety issues in the context of the ATS cybersecurity assessment [ 35 , 36 , 37 , 38 ].
…”