<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Application of deep learning methods to ensure the information security of the MSAB digital system in the railway transport of the Republic of Kazakhstan</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Malika Sagitzhanova</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kanibek Sansyzbay</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yelena Bakhtiyarova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Teodor Iliev</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>International Information Technology University</institution>
          ,
          <addr-line>Mans St. 34/1, Almaty, 050040</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Mukhametzhan Tynyshbayev ALT university</institution>
          ,
          <addr-line>Almaty, 050000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Ruse</institution>
          ,
          <addr-line>Ruse</addr-line>
          ,
          <country country="BG">Bulgaria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <abstract>
        <p>Digitalization of railway traf ic control systems requires the use of modern approaches to information security (IS). One of the promising technologies is the use of Deep Learning methods, which automatically detect anomalies and potential attacks in complex automated control systems. Attention is given to choosing the most suitable models for detecting attacks in the KZ-MSAB-MA digital semi-automatic blocking system under development.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;information security</kwd>
        <kwd>deep learning</kwd>
        <kwd>neural network models</kwd>
        <kwd>national digital MSAB system 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The railway infrastructure is characterized by a high degree of distribution, the presence of long
stretches, as well as a significant number of autonomous technical devices located on open sections of
track. These features create unique challenges for information security, especially in the context of
the transition from isolated relay systems to digital architectures with the possibility of remote
control and monitoring [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Key elements susceptible to cyber threats include alarm, centralization, and lockdown systems
that control the safe movement of trains. Despite the fact that such systems have traditionally
operated in closed networks, there is a tendency to integrate them into corporate IP infrastructures.
This expands the capabilities of dispatch control, but also increases the attack surface [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        An additional risk is created by the use of wireless communication channels (TETRA, GSM-R,
LTE-R, Wi-Fi), which are used for communication between the train and the infrastructure, as well as
between automation devices. Such channels are vulnerable to interception, data substitution, and
man-in-the-middle (MITM) attacks, which makes the task of detecting attacks especially important
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>In general, threats can be divided into several key categories:
attacks on data integrity — changing control commands or state parameters (for example,
false signals about the release of a path);
Attacks on accessibility — blocking of communication channels (DoS/DDoS), disabling
control nodes;</p>
      <p>Privacy attacks — interception of control commands or route data;
1CISN 2025: Workshop on Cybersecurity, Infocommunication Systems and Networks, November 19-20, 2025, Almaty,
Kazakhstan
* Corresponding author.
† These authors contributed equally.</p>
      <p>mzhandosovna77@gmail.com (M. Sagitzhanova); k.sansyzbai@iitu.edu.kz (K. Sansyzbay); y.bakhtiyarova@iitu.edu.kz
(Y. Bakhtiyarova); tiliev@uni-ruse.bg (T. Iliev)
0000-0002-3333-5830 (K. Sansyzbay); 0000-0001-8735-7683 (Y. Bakhtiyarova); 0000-0003-2214-8092 (T. Iliev)
© 2025 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).</p>
      <p>Gradual, subtle attacks that simulate the "normal" behavior of the equipment pose a separate
danger. They cannot be detected by simple filtering and threshold control methods.</p>
      <p>
        Under these conditions, the use of intelligent analysis technologies, in particular deep learning
methods, can provide preliminary protection and timely detection of anomalies in the operation of
key components of the railway IT infrastructure. These systems are capable of processing large
amounts of data about the operation of equipment and network traffic, identifying unusual or
suspicious patterns that are not detected by traditional security methods. This is especially important
for automated railway systems, where rapid response and accurate threat detection are critical [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. The architecture of the MSAB digital system with the integration of the DL module</title>
      <p>
        The national digital MSAB system being developed is designed to automate traffic control on straight
sections of the crossing. Its use makes it possible to increase the speed of trains to 200 km/h with good
track condition. The system is based on two half-sets, each of which includes a KZ-MSAB-MA
controller and expansion modules (DI/DO) located at the stations [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        The controllers interact with external control panel devices (rail circuits, axle counting devices,
switches, etc.) and control the alarm based on data received through digital inputs. Control
commands are transmitted through digital outputs to the relay. A data exchange channel using the
SIL4 security level protocol is used for communication between the controllers. The channel can be
built on the basis of copper lines, Fiber-Optic Communication Lines or a radio channel, depending on
the infrastructure conditions. Figure 1 presents the schematic diagram of the integrated system
KZМSАB-МА under development, featuring intelligent control functions within a distributed
architecture [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Results</title>
      <p>The description of the algorithm of the MPAB system for railway transportation (from the departure
signal to the entrance signal) is presented in the article using the programming languages FBD
(Function Block Diagram) and ST (Structured Text).</p>
      <p>The exterior of the MPAB modular architecture cabinet is shown in Figure 2.</p>
      <p>The SILworX environment (HIMA, Germany) was chosen to develop an algorithmic framework
for modular hardware and software locking (MPAB). The choice of this environment is determined
by its compliance with the Safety Integrity Level (SIL) T3 according to the international standard IEC
61508-3. This, in turn, ensures compliance with the strict safety requirements established by the
European standards CENELEC and the Russian technical regulation TR/TC 003/2011 "On the safety
of railway transport infrastructure".</p>
      <p>The highly reliable HiMatrix F3 DIO 20/8 and HiMatrix F3 DIO 8/8 relay blocks belonging to the
1st reliability class are used as actuators.</p>
      <p>Safety conditions and input/output commands for managing key railway infrastructure facilities
(routes, traffic lights, arrows) are conveniently formalized as one-dimensional arrays [20]. In the
context of security, the logical '0' is accepted as an indicator of the safe state of the system.</p>
      <p>The software architecture is based on an object-oriented approach: each physical object of the
station (traffic light, arrow, or track section, as shown in Figure 3) is implemented as a separate
Functional Block or function. Each of these blocks corresponds to a graphic designation adopted in
the development of functional circuits of electronic devices.</p>
      <p>Figure 3 shows the algorithm for setting the route to the first path at the signal of traffic light H.
The process consists of two main sequential actions:</p>
      <p>Verification of the route installation conditions: assessment of the possibility of forming a
route without directly switching the permitting traffic light reading;</p>
      <p>Route locking: fixing the selected route in the centralization system.</p>
      <p>Traffic lights are among the key floor-mounted devices of railway automation that ensure safe and
regulated train movement.</p>
      <p>
        As an illustration of the software implementation of the control, the algorithm for turning on the
traffic light H, implemented in the Structured Text (ST) programming language, is presented. This
program code, labeled as (Function to set input signal H), is integrated and used inside the LIGHT_H
function block.:
IF AND (H_SIG_IN[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ],H_SIG_IN[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], NOT(H_SIG_IN[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]),NOT(H_SIG_IN[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]),NOT(H_SIG_IN[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]))
THEN (*Processing set two yellow signal command*)
H_SIG_OUT[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] := TRUE; (*YellowUp*)
H_SIG_OUT[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] := FALSE; (*Green*)
H_SIG_OUT[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] := FALSE; (*Red*)
H_SIG_OUT[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] := TRUE; (*YellowDown*)
H_SIG_OUT[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] := FALSE; (*White*)
ELSIF AND (H_SIG_IN[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ],
NOT(H_SIG_IN[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]),NOT(H_SIG_IN[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]),NOT(H_SIG_IN[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]),NOT(H_SIG_IN[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ])) THEN
(*Processing set green signal command*)
H_SIG_OUT[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] := FALSE; (*YellowUp*)
H_SIG_OUT[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] := TRUE; (*Green*)
H_SIG_OUT[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] := FALSE; (*Red*)
H_SIG_OUT[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] := FALSE; (*YellowDown*)
H_SIG_OUT[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] := FALSE; (*White*)
ELSE
H_SIG_OUT[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] := FALSE; (*YellowUp*)
H_SIG_OUT[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] := FALSE; (*Green*)
H_SIG_OUT[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] := TRUE; (*Red*)
H_SIG_OUT[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] := FALSE; (*YellowDown*)
H_SIG_OUT[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] := FALSE; (*White*)
END_IF;
      </p>
      <p>
        To monitor the status and detect attacks, it is proposed to integrate the DL module into the system
architecture. DL is implemented as a passive intrusion detection system (IDS), which is located at the
server level of the automated workstation of the duty officer or as an intermediate element on a
network node between stations. The security module receives copies of network traffic between
controllers and analyzes the following parameters: time characteristics of packets, DI/DO command
sequences, the status of axis counting devices and responses from rail circuits [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Figure 4 shows a
system with a built-in DL-based information security module.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. An overview of deep learning techniques for attack detection</title>
      <sec id="sec-4-1">
        <title>4.1. Autoencoders</title>
        <p>Automatic encoders are effectively used in information security systems of the railway industry,
especially in anomaly detection and attack tasks. The main idea is the ability of the AE to learn from
normal data, identifying deviations from typical behavior.</p>
        <p>One of the key uses is to detect anomalies in telemetry and network data coming from trains,
signalling devices, routing systems, and other infrastructure components. The AE is trained on
correct (normal) data, and when anomalies occur — for example, as a result of an attack or technical
failure — the model detects a significant discrepancy between the input and output, which allows a
quick response to the accident.</p>
        <p>In addition, automatic encoders help reduce dimensionality and clear data from noise, which is
especially important when analyzing large streams of information in real time. In particular,
noisecanceling systems increase the resistance of systems to distortions that occur, for example, due to
interference in data transmission channels.</p>
        <p>
          AE is also used in network traffic monitoring systems between trains and control centers.
Deviations in the traffic structure may indicate intrusion attempts, such as the introduction of
malicious code, interception, or substitution of control commands [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Recurrent neural networks (RNN)</title>
        <p>Recurrent neural networks are particularly useful in analyzing sequential data, which makes them
effective in monitoring and detecting anomalies in time series typical of railway systems. Such data
may include telemetry from rolling stock, traffic control system logs, and safety events.</p>
        <p>RNNs are able to take into account the temporal context, which makes it possible to identify
hidden patterns and anomalies that do not occur simultaneously, but as a result of gradual changes in
the behavior of the system. This is critical, for example, when detecting prolonged attacks or
degradation of system components.</p>
        <p>
          Due to the ability to predict future conditions based on history, RNNs are used for early warning
of potential incidents, including cyber attacks, instability of communication channels and failures in
alarm systems [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Convolutional neural networks (CNN)</title>
        <p>Convolutional neural networks are traditionally used for image processing, but they are also
successfully used in data analytics and cybersecurity, especially when working with the
representation of network or temporal data in the form of matrices or "maps".</p>
        <p>In the railway industry, convolutional neural networks (CNNs) are used to analyze network
traffic, video streams from surveillance cameras, and event logs transformed into visual
representations. They allow you to detect anomalies, unauthorized access, and other threats with
high accuracy, including those that are difficult to detect using traditional methods.</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Hybrid models</title>
        <p>Hybrid neural network models combine the capabilities of various architectures, such as CNN, RNN,
and autoencoders, providing comprehensive threat analysis. CNNs extract spatial features, RNNs
process temporal dependencies, and autoencoders detect anomalies.</p>
        <p>
          In the railway sector, they are used to monitor IT infrastructure, predict attacks, and intelligently
filter events. Such models are particularly effective at detecting complex threats, including APT
attacks, due to their high accuracy and adaptability to diverse data sources [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. Self-supervised models</title>
        <p>Self-supervised learning models make it possible to identify threats without the need for manual data
markup, which is especially important in conditions of limited information about cyber attacks.</p>
        <p>They effectively analyze logs, telemetry, and network traffic, identifying hidden patterns of
behavior and adapting to new threats. Such models can be continuously updated and can be easily
integrated into hybrid solutions, enhancing the protection of cyber-physical systems of the railway
infrastructure.</p>
        <p>A comparison of the models showed that the best results are achieved using hybrid neural
network architectures that combine the capabilities of various approaches (for example,
convolutional and recurrent networks). Such models allow comprehensive analysis of both spatial
and temporal characteristics of data, providing high accuracy and stability when dealing with diverse
threats. Next, we will consider convolutional and recurrent neural networks as key deep learning
architectures used to analyze complex data in information security tasks.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. CNN+RNN model</title>
      <p>The integration of artificial intelligence (AI) and deep learning methods, such as convolutional neural
networks (CNN) and recurrent neural networks (RNN), has become widespread in almost all areas of
modern life. These technologies are used to optimize medical care, diagnose diseases and predict their
development, as well as to improve financial analysis and decision support.</p>
      <p>
        AI-based approaches demonstrate high versatility and effectiveness, which has led to their
application in such diverse fields as agriculture, finance, and healthcare. The CNN-RNN model aims
to increase security by implementing reliable mechanisms for detecting and preventing emerging
threats in real time. The CNN-RNN architecture combines the advantages of both networks: CNN
efficiently extracts spatial features, whereas RNN specializes in analyzing time dependencies in data
sequences. The processing process includes two main stages. At the first stage, time series of input
data, designated as (x0, ..., x(t - 2), x(t − 1)), are fed into the CNN convolutional layer to extract spatial
features. Then, at the second stage, the obtained features are transmitted to the recurrent RNN
network, which predicts the sequence of future values (θx(t) , θx(t + 1), . . . , θx(t + m)) m steps ahead
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>Thus, the proposed hybrid model is a promising tool for data mining, capable of providing
sustainable protection against threats through a combination of spatial and temporal modeling.</p>
      <p>In particular, the CNN-RNN model consists of two stages:</p>
      <p>Stage 1: The processed data is entered into the CNN structure, which consists of three levels: i)
The convolutional layer uses filters to create a feature matrix; ii) The combining layer, which reduces
the size of the matrix generated in the previous layer, and iii) The Smoothed layer smooths the output
of the previous layer.</p>
      <p>Stage 2: The objects extracted by CNN are introduced into the RNN model. It is noteworthy that
the RNN network uses a gating mechanism that allows you to selectively save or forget information
about previous time steps, effectively fixing long-term dependencies in the input sequence. Finally,
the RNN network output is transmitted to a fully connected layer to create dynamic forecasts based
on time series data.</p>
      <sec id="sec-5-1">
        <title>5.1. Convolutional neural networks</title>
        <p>Convolutional Neural Networks (CNN) represent one of the most sought-after deep learning
architectures and have demonstrated outstanding results in tasks such as image processing,
computer vision, and pattern recognition [11]. Their effectiveness is due to the use of a key
mathematical operation — convolution, which underlies the extraction of features from the input
data.</p>
        <p>From a mathematical point of view, convolution (within the framework of functional analysis) is
an operation on two functions, as a result of which a third function is formed, describing how one of
the original functions changes the shape of the other. This operation can be implemented either as an
integration or as a discrete summation, depending on the nature of the data being processed.
Convolution has a wide range of applications, from statistics and digital signal processing to
numerical solution of differential equations, computer vision, engineering modeling and, of course,
machine learning [11].</p>
        <p>In the context of neural networks, the convolution operation makes it possible to effectively
identify local patterns and spatial dependencies, which makes CNNs especially useful in analyzing
structured data, including images, video streams, and even representations of network traffii c in
information security tasks.</p>
        <p>Mathematically, convolution is defiined as follows (one-dimensional example):
Let's defiine a continuous function y(t) given by the formula:</p>
        <p>y (t )=∫ x ( a ) ω( t −a ) da,
where x(a) represents the so-called input data, and ω(t - a) is usually called the weight function or
kernel.</p>
        <p>The above integral is written in a more compact form as:</p>
        <sec id="sec-5-1-1">
          <title>The discretized version says:</title>
          <p>y (t )=( x ∙ ω )( t ),</p>
          <p>a=∞
y (t )= ∑ x ( a ) ω( t −a ).</p>
          <p>a=−∞</p>
          <p>
            The calculation that is the reverse of the convolution operations described above is known as
deconvolution. It is used to reconstruct the original input signal x(a) from the known output signal
y(t) and the impulse response of the system ω(t). In other words, deconvolution allows you to restore
the original signal, distorted when passing through a system with a known or unknown impulse
response. In cases where several signals overlap, deconvolution helps to separate them for later
analysis [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ].
          </p>
          <p>Thus, deconvolution is a powerful tool in various scientifiic and engineering fiields, allowing the
recovery and analysis of signals and images distorted during transmission or recording [12].</p>
        </sec>
      </sec>
      <sec id="sec-5-2">
        <title>5.2. Recurrent neural networks</title>
        <p>Recurrent Neural Networks (RNN) play a key role in sequential information processing and are
widely used in time series forecasting, speech recognition, and machine translation. Unlike direct
(1)
(2)
(3)
ht=f (W h ht−1+W x xt +b ) ,</p>
        <p>
          yt=g (W y ht + c ) ,
propagation neural networks, where data is transmitted only in one direction – from input to output,
RNNs have internal feedbacks, which allows them to take into account the context of previous states
[
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>Due to their architecture, RNNs are capable of processing arbitrary-length inputs, including text
sequences, audio signals, and time series. This makes them particularly effective in tasks where time
dependencies need to be taken into account. Their ability to remember information about previous
steps and update the hidden state using nonlinear dynamics provides high flexibility and
expressiveness when modeling complex processes.</p>
        <p>The standard RNN processes sequential data by maintaining the hidden state ht at each time step t
based on the input data xt and the previous hidden state ht − 1. The latent state update equation has
the form:
where, W h∈ Rn×nis the weight matrix, W x∈ Rn×m is the input weight matrix, b∈ Rn is the offset,
and f is the nonlinear activation function.</p>
        <p>The output of yt at each time step is calculated by applying a linear transformation to ht:
(4)
(5)
where, W y−¿is the matrix of output weights, c is the output offset, and g is the softmax function for
classifiication tasks.</p>
        <p>This formula describes the last step of direct propagation in the model: the transformation of the
latent state ht into the output vector yt, where each element represents the probability that the input
example belongs to a certain class.</p>
        <p>In tasks such as text tonality analysis or document classifiication, the hidden states of recurrent
neural networks (RNNs) are transformed into class probabilities using this formula. This formula is
used on the last layer to predict the probabilities of an image belonging to different classes, and in
speech recognition systems, the output of the model is transformed using softmax to determine the
probability of each possible word or sound [13].</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>The conducted research was aimed at verifying and evaluating the effectiveness of the signal
indicator control algorithm. The analysis showed that the algorithm proposed by the authors
provides a clear and deterministic logic for processing input control signals and generating the
corresponding output signal state.</p>
      <p>The developed algorithm is a fundamental and verifiiable component of the signal indicator
control system that meets high requirements for safety and determinism and demonstrates an
example of effective programming of fiinite automata for railway signaling systems. It confiirms the
possibility of implementing complex logical dependencies using standard boolean operations, which
simplifiies verifiication, increases system reliability, and facilitates further certifiication.</p>
      <p>The conducted research has confiirmed the relevance and effectiveness of using deep learning
methods, in particular convolutional (CNN) and recurrent (RNN) neural networks, to increase
information security in the context of digitalization of railway infrastructure. These architectures
allow you to take into account both spatial and temporal characteristics of data, ensuring high
accuracy in detecting information threats.</p>
      <p>Self-learning models should also be highlighted as a promising tool for analyzing unlabeled data.
Their key advantage lies in their ability to adapt to previously unknown attacks without the need for
constant manual marking or specialist intervention. This is especially true in the context of a rapidly
evolving cyber threat in critical infrastructure.</p>
      <p>Automatic encoders, recurrent and convolutional neural networks remain relevant and can be
effectively used as independent solutions for individual tasks (for example, anomaly detection or
video stream analysis), as well as as parts of more complex hybrid systems.</p>
      <p>Thus, deep learning is a powerful tool in the arsenal of information security tools for railway
transport, which can signifiicantly increase the industry's resilience to modern threats.</p>
      <p>Further work will focus on refiining the CNN-RNN model, exploring hybrid artifiicial intelligence
approaches, and conducting pilot implementations to test its applicability in the railway industry.
This will make it possible to create a more stable, intellectually secure information security system at
railway infrastructure facilities.</p>
      <p>This work is the result solely of the intellectual activity of the authors. Generative AI was not
involved in the development of methodology, data collection or analysis, as well as in the formation
of scientifiic conclusions.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <sec id="sec-7-1">
        <title>The authors have not employed any Generative AI tools.</title>
        <p>[11] K. Oh, M.Yoo, N. Jin, J. Ko, J. Seo, H. Joo, M. Ko, A Review of Deep Learning Applications for</p>
        <p>Railway Safety, Appl. Sci. 12, (2022) 10572. doi: 10.3390/app122010572.
[12] M. Di Summa, M. Elena Griseta, N. Mosca, C. Patruno, M. Nitti, V. Renò, E. Stella A Review on
Deep Learning Techniques for Railway Infrastructure Monitoring, IEEE Access, vol. 11, (2023)
114638-114661. doi: 10.1109/ACCESS.2023.3309814.
[13] P. López-Aguilar, E. Batista, A. Martínez-Ballesté, A. Solanas Information Security and Privacy
in Railway Transportation: A Systematic Review, Sensors 22, (2022) 7698. doi:
10.3390/s22207698.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sansyzbay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bakhtiyarova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Iliev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Tasbolatova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Sagmedinov</surname>
          </string-name>
          ,
          <article-title>Method of Evaluation of the TETRA Standard Data Transmission Channel for Ensuring Information Security of the Railway Transport System</article-title>
          .
          <source>TEM Journal</source>
          ,
          <volume>13</volume>
          (
          <issue>3</issue>
          ), (
          <year>2024</year>
          )
          <fpage>2512</fpage>
          -
          <lpage>2521</lpage>
          . doi:
          <volume>10</volume>
          .18421/TEM133-77.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>K. M. Sansyzbay</surname>
            ,
            <given-names>A. A.</given-names>
          </string-name>
          <string-name>
            <surname>Kuandykov</surname>
            ,
            <given-names>Ye. A.</given-names>
          </string-name>
          <string-name>
            <surname>Bakhtiyarova</surname>
            ,
            <given-names>S. V.</given-names>
          </string-name>
          <string-name>
            <surname>Vlasenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Zh</surname>
          </string-name>
          . Mamyrbaev,
          <article-title>Radio communication channel interaction method, maintaining train performance information security</article-title>
          .
          <source>Journal of Theoretical and Applied Information Technology</source>
          ,
          <volume>98</volume>
          (
          <issue>06</issue>
          ), (
          <year>2020</year>
          )
          <fpage>957</fpage>
          -
          <lpage>969</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>L.</given-names>
            <surname>Tasbolatova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Sansyzbay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Orynbet</surname>
          </string-name>
          , U. Maschek, Ye. Bakhtiyarova,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>Turayeva Development of a Radio Data Transmission Channel Model to Ensure Train Safety</article-title>
          ,
          <source>Journal of Internet Services and Information Security (JISIS)</source>
          ,
          <volume>15</volume>
          (
          <issue>2</issue>
          ), (
          <year>2025</year>
          )
          <fpage>622</fpage>
          -
          <lpage>640</lpage>
          . doi:
          <volume>10</volume>
          .58346/JISIS.
          <year>2025</year>
          .I2.043.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>P. D.</given-names>
            <surname>Mylnikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. A.</given-names>
            <surname>Popov</surname>
          </string-name>
          ,
          <source>Information Security in European Train Control Systems for Railway Transport. Intellectual Technologies on Transport</source>
          ,
          <volume>3</volume>
          , (
          <year>2016</year>
          )
          <fpage>50</fpage>
          -
          <lpage>55</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sansyzbay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bakhtiyarova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Iliev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Patokin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Tasbolatova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Sagmedinov</surname>
          </string-name>
          ,
          <article-title>Development of an Algorithm for a National Microprocessor-Based Centralization System With a Modular Architecture KZ-MPC-MA Featuring Advanced Intelligent Control Functions</article-title>
          .
          <source>IEEE Access</source>
          ,
          <volume>12</volume>
          , (
          <year>2024</year>
          )
          <fpage>193229</fpage>
          -
          <lpage>193240</lpage>
          , doi:10.1109/ACCESS.
          <year>2024</year>
          .
          <volume>3521219</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sansyzbay</surname>
          </string-name>
          , Е. Bakhtiyarova, Т. Chigambaev,
          <string-name>
            <given-names>O.</given-names>
            <surname>Abdirashev</surname>
          </string-name>
          ,
          <string-name>
            <surname>Z. Badanbekkyzy</surname>
          </string-name>
          <article-title>Digital national microprocessor-based semi-automatic interlocking system to increase railroad capacity in Kazakhstan</article-title>
          . Bulletin of L.N. Gumilyov Eurasian National University Technical Science and Technology Series,
          <volume>150</volume>
          (
          <issue>1</issue>
          ), (
          <year>2025</year>
          )
          <fpage>148</fpage>
          -
          <lpage>161</lpage>
          . doi:
          <volume>10</volume>
          .32523/
          <fpage>2616</fpage>
          -7263-2025-150-1-
          <fpage>148</fpage>
          -161.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>K. M. Sansyzbay</surname>
            ,
            <given-names>G. S.</given-names>
          </string-name>
          <string-name>
            <surname>Patokin</surname>
            ,
            <given-names>M. S.</given-names>
          </string-name>
          <string-name>
            <surname>Batyrhanov</surname>
            ,
            <given-names>Y. A.</given-names>
          </string-name>
          <string-name>
            <surname>Bakhtiyarova</surname>
          </string-name>
          , D. B.
          <article-title>Sagedinov National microprocessor centralization system with modular architecture KZ-MPC-</article-title>
          <string-name>
            <surname>MA</surname>
          </string-name>
          ,'' Patent Republic Kazakhstan,
          <volume>36</volume>
          <fpage>788</fpage>
          , Jun.
          <volume>14</volume>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>C.</given-names>
            <surname>Livier</surname>
          </string-name>
          Recio-Colmenares,
          <string-name>
            <given-names>R.</given-names>
            <surname>Berenice</surname>
          </string-name>
          Recio-Colmenares,
          <string-name>
            <given-names>R.</given-names>
            <surname>Fernando</surname>
          </string-name>
          Conchas-Cedano,
          <string-name>
            <given-names>I.</given-names>
            <surname>Pilatowsky-Figueroa</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Alejandro García García, Data-Driven Hybrid CNN-LSTM Neural Networks for Predicting Drying Kinetics of Green Tomatoes (Physalis ixocarpa) Integrating Mathematical Models</article-title>
          , IEEE Access, vol.
          <volume>13</volume>
          , (
          <year>2025</year>
          )
          <fpage>57413</fpage>
          -
          <lpage>57425</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2025</year>
          .
          <volume>3554492</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Weiqi</given-names>
            <surname>Yan</surname>
          </string-name>
          <article-title>Convolutional Neural Networks and Recurrent Neural Networks, In book: Computational Methods for Deep Learning, (</article-title>
          <year>2023</year>
          )
          <fpage>69</fpage>
          -
          <lpage>124</lpage>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-99-4823-
          <issue>9</issue>
          _
          <fpage>3</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>M. Noguer I Alonso</surname>
          </string-name>
          <article-title>The Mathematics of Recurrent Neural Networks</article-title>
          , (
          <year>October 27</year>
          ,
          <year>2024</year>
          ). Available at SSRN: http://dx.doi.org/10.2139/ssrn.5001243.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>