Literature review of maritime cyber security: The first decade

Authors

  • Avanthika Vineetha Harish University of Plymouth, Drake Circus, Plymouth PL4 8AA, United Kingdom
  • Kimberly Tam University of Plymouth, Drake Circus, Plymouth PL4 8AA, United Kingdom
  • Kevin Jones University of Plymouth, Drake Circus, Plymouth PL4 8AA, United Kingdom

DOI:

https://doi.org/10.33175/mtr.2025.273805

Keywords:

Comprehensive review; Maritime cyber security; Cyber-physical security

Abstract

This is a comprehensive review of the current body of work for cyber security in the marine and maritime sectors. Reviews are useful as a field develops, both for those new to the field, and those contributing to a section of the existing body of work. This looks at the phases of research, from exploratory and positional papers in the early 2010s, to the more recent experimental research, and how “maritime cyber security” has branched into subtopics addressing human factors, policy, law, cyber-physical security, and more. In addition to different topics of research, this comprehensive review summaries the focus of those papers, whether they are intended for crewed vessels, uncrewed vessels (above and below the surface), offshore structures (e.g., oil, renewable wind energy), and infrastructure like ports. As a newly developing field, compared to general cyber security or naval engineering, this review also examines the ratio of positional papers, papers that generate knowledge, and papers that summarize existing works to gauge the maturity of the field. This type of review relies on an expert understanding of the existing body of academic literature and its impact on industry and government, instead of applying prescribed systematic review methodology. This review of over three hundred articles concludes with overall findings and suggestions for future research to continue maturing and growing maritime cyber security research.

Highlights

  • Instead of using a systematic review to answer a research question, this paper does a comprehensive review of the existing literature to understand the growth of the field.
  • As the first maritime cyber security specific papers were published circa 2013, this is the first review to consider the first decade of maritime cyber research (2013 - 2023) and how the field of research, including its sub-topics, has developed over those years.
  • While not every one of the 300+ found papers were referenced, this is one of largest the most comprehensive reviews, and highlights some of the limitations to the large number of systematic reviews in the field.

References

Al Ali, N. A. R., Chebotareva, A. A., & Chebotarev, V. E. (2021). Cyber security in marine transport: Opportunities and legal challenges. Scientific Journal of Maritime Research, 35(2), 248-255. https://doi.org/10.31217/p.35.2.7

Amor, A., & Gkioulos, V. 2021. Communication and cybersecurity testbed for autonomous passenger ship (pp. 5-22). European Symposium on Research in Computer Security. Springer. https://doi.org/10.1007/978-3-030-95484-0_1.

AP Moller - Maersk. (2017). The Annual Report for 2017 of A.P. Moller - Maesk A/S. Retrieved from https://investor.maersk.com/system/files-encrypted/nasdaq_kms/assets/2018/04/25/13-00-21/A.P._Moller_-_Maersk_Annual_Report_2017.pdf

Aptive. (2024). Maritime penetration testing services. Retrieved from https://www.aptive.co.uk/penetration-testing/maritime

Arghire, I. (2023). Ransomware gang publishes data allegedly stolen from maritime firm Royal Dirkzwager – Security Week. Security Week. Retrieved from https://www.securityweek.com/ransomware-gang-publishes-data-allegedly-stolen-from-maritime-firm-royal-dirkzwager

Awan, M. S. K., & Al Ghamdi, M. A. (2019). Understanding the vulnerabilities in digital components of an integrated bridge system (IBS). Journal of Marine Science and Engineering, 7(10), 350. https://doi.org/10.3390/jmse7100350

Aziz, A., Tedeschi, P., Sciancalepore, S., & Pietro, R. D. (2020). SecureAIS - Securing Pairwise Vessels Communications (pp. 1-9). In Proceedings of the 2020 IEEE Conference on Communications and Network Security. Avignon, France. https://doi.org/10.1109/CNS48642.2020.9162320

Balduzzi, M., & Wilhoit, K. (2014). A security evaluation of AIS automated identification system (pp. 436-445). In Proceedings of the 30th Annual Computer Security Applications Conference. New York, USA. http://dx.doi.org/10.1145/2664243.2664257

BIMCO. (2021). The guidelines on cyber security onboard ships. International Chamber of Shipping, 4, 1-53. https://www.bimco.org/about-us-and-our-members/publications/the-guidelines-on-cyber-security-onboard-ships

Bolbot, V., Kulkarni, K., Brunou, P., Banda, O. V., & Musharraf, M. (2022). Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis. International Journal of Critical Infrastructure Protection. 39, 100571. https://doi.org/10.1016/j.ijcip.2022.100571

Botunac, I., & Grzan, M. (2017). Analysis of software threats to the automatic identification system. Shipbuilding: Theory and Practice of Naval Architecture, Marine Engineering and Ocean Engineering, 68, 97-105. https://doi.org/ 10.21278/brod68106

Chambers, S. (2022). Voyager worldwide hit by cyber attack. Splash. Retrieved from https://splash247.com/voyager-worldwide-hit-by-cyber-attack

Chang, C. H., Kontovas, C., Yu, Q., & Yang, Z. (2021). Risk assessment of the operations of maritime autonomous surface ships. Reliability Engineering & System Safety, 207, 107324. https://doi.org/10.1016/j.ress.2020.107324

Chia, R. Y. (2019). The need for ethical hacking in the maritime industry (pp. 108-121). Time for a New Maritime Era - Society of Naval Architects and Marine Engineers Singapore.

Cho, S., Orye, E., Visky, G., & Prates, V. (2022). Cybersecurity considerations in autonomous ships. Retrieved from https://ccdcoe.org/uploads/2022/09/Cybersecurity_Considerations_in_Autonomous_Ships.pdf

CyberMAR. (2024). About - Cybermar. Retrieved from https://www.cyber-mar.eu/about

Eichenhofer, J. O., Heymann, E., Miller, B. P., & Kang, A. (2020). An in-depth security assessment of maritime container terminal software systems. IEEE Access, 8, 128050-128067. https://doi.org/10.1109/ACCESS.2020.3008395

Enoch, S. Y., Lee, J. S., & Kim, D. S. (2021). Novel security models, metrics and security assessment for maritime vessel networks. Computer Networks, 189, 107934. https://doi.org/10.1016/j.comnet.2021.107934

Erstad, E., Hopcraft, R., Harish, A. V., & Tam, K. (2023). A human-centred design approach for the development and conducting of maritime cyber resilience training. WMU Journal of Maritime Affairs, 22, 241-266. https://doi.org/10.1007/s13437-023-00304-7

ESC Global Security. (2015). Maritime cyber security white paper: Safeguarding data through increased awareness. Retrieved from https://allaboutshipping.co.uk/wp-content/uploads/2015/11/ESCGS-Cyber-Security-WP-2015.pdf

Fenton, A. J. (2024). Preventing catastrophic cyber-physical attacks on the global maritime transportation system: A case study of hybrid maritime security in the straits of Malacca and Singapore. Journal of Marine Science and Engineering, 12(3), 510. https://doi.org/10.3390/jmse12030510

Firesand. (2024). Maritime cyber security services: Penetration testing. Retrieved from https://www.firesand.co.uk/sectors/maritime-cyber-security-services

Glover, C. (2022). Port of London authority cyberattack ‘politically motivated’. Tech Monitor. Retrieved from https://techmonitor.ai/technology/cybersecurity/port-of-london-authority-cyberattack.

Goudossis, A., & Katsikas, S. K. (2019). Towards a secure automatic identification system (AIS). Journal of Marine Science and Technology, 24, 410-423. https://doi.org/10.1007/s00773-018-0561-3

Greig, J. (2022). Shell forced to reroute supplies after cyberattack on two German oil companies-ZDNet. Retrieved from https://www.zdnet.com/article/shell-forced-re-route-oil-supplies-after-cyberattack-on-german-companies

Gurren, J., Harish, A. V., Tam, K., & Jones, K. (2023). Security implications of a satellite communication device on wireless networks using pentesting (pp. 292-298). In Proceedings of the International Conference on Wireless and Mobile Computing, Networking and Communications. Montreal, Canada. https://doi.org/10.1109/WIMOB58348.2023.10187791

Gyamfi, E., Ansere, J. A., Kamal, M., Tariq, M., & Jurcut, A. (2023). An adaptive network security system for iot-enabled maritime transportation. IEEE Transactions on Intelligent Transportation Systems, 24(2), 2538-2547. https://doi.org/10.1109/TITS.2022.3159450

Harreveld, M. V. (2023). Russians may hack Zeeland ports. Retrieved from https://www.bnr.nl/nieuws/binnenland/10516325/russische-hackers-vallen-zeeuwse-havens-aan

Hemminghaus, C., Bauer, J., & Padilla, E. (2021a). Brat: A bridge attack tool for cyber security assessments of maritime systems. International Journal on Marine Navigation and Safety of Sea Transportation, 15, 35-44. https://doi.org/10.12716/1001.15.01.02.

Hemminghaus, C., Bauer, J., & Wolsing, K. (2021b). Sigmar: Ensuring integrity and authenticity of maritime systems using digital signatures (pp. 1-6). In Proceedings of the 2021 International Symposium on Networks, Computers and Communications. Dubai, United Arab Emirates. https://doi.org/10.1109/ISNCC52172.2021.9615738

Hopcraft, R., & Martin, K. (2018). Effective maritime cybersecurity regulation: The case for a cyber code. Journal of the Indian Ocean Region, 14, 1-13. https://doi.org/10.1080/19480881.2018.1519056

Hopcraft, R., Harish, A. V., Tam, K., & Jones, K. (2023). Raising the standard of maritime voyage data recorder security. Journal of Marine Science and Engineering, 11, 267. https://doi.org/10.3390/jmse11020267

International Maritime Organization. (2017). Resolution MSC.428(98) Maritime Cyber Risk Management in Safety Management Systems. Retrieved from https://wwwcdn.imo.org/localresources/en/OurWork/Security/Documents/ResolutionMSC.428(98).pdf

International Maritime Organization. (2022). Msc-fal.1/circ.3/rev.2 - guidelines on maritime cyber risk management. International Maritime Organization. Retrieved from https://www.liscr.com/sites/default/files/liscr_imo_resolutions/MSC-FAL.1-Circ.3-Rev.2.pdf

Jacq, O., Boudvin, X., Brosset, D., Kermarrec, Y., & Simonin, J. (2018). Detecting and hunting cyberthreats in a maritime environment: Specification and experimentation of a maritime cybersecurity operations centre (pp. 1-8). In Proceedings of the 2nd Cyber Security in Networking Conference. Paris, France. https://doi.org/10.1109/CSNET.2018.8602669

Jo, Y., Choi, O., You, J., Cha, Y., & Lee, D. H. (2022). Cyberattack models for ship equipment based on the MITRE ATT&CK framework. Sensors, 22(5), 1860. https://doi.org/10.3390/s22051860

Jones, K. D., Tam, K., & Papadaki, M. (2015). Threats and impacts in maritime cyber security. Engineering & Technology Reference, 2016, 123. https://doi.org/10.1049/ETR.2015.0123

Kalogeraki, E. M., Papastergiou, S., Mouratidis, H., & Polemi, N. (2018). A novel risk assessment methodology for scada maritime logistics environments. Applied Sciences, 8(9), 1477. https://doi.org/10.3390/app8091477

Karim, M. S. (2022). Maritime cybersecurity and the imo legal instruments: Sluggish response to an escalating threat? Marine Policy, 143, 105138. https://doi.org/10.1016/j.marpol.2022.105138

Kayisoglu, G., Bolat, P., & Tam, K. (2022). Determining maritime cyber security dynamics and development of maritime cyber risk check list for ships (pp. 22-27). In Proceedings of the 22nd Annual General Assembly International Association of Maritime Universities. Batumi, Geogia.

Kayisoglu, G., Bolat, P., & Tam, K. (2024). A novel application of the coras framework for ensuring cyber hygiene on shipboard radar. Journal of Marine Engineering & Technology, 23(2), 67-81. https://doi.org/10.1080/20464177.2023.2292782

Kessler, G. C. (2021). The can bus in the maritime environment: Technical overview and cybersecurity vulnerabilities. International Journal on Marine Navigation and Safety of Sea Transportation, 15(3), 531-540. https://doi.org/10.12716/1001.15.03.05

Khandker, S., Turtiainen, H., Costin, A., & Hamalainen, T. (2022). Cybersecurity attacks on software logic and error handling within ais implementations: A systematic testing of resilience. IEEE Access, 10, 29493-29505. https://doi.org/10.1109/ACCESS.2022.3158943

Kretschmann, L., Zacharias, M., Klover, S., & Hensel, T. (2020). Machine learning in maritime logistics. Retrieved from https://shipzero.com/wp-content/uploads/2022/12/10015_compressed.pdf

Liu, W., Xu, X., Wu, L., Qi, L., Jolfaei, A., Ding, W., & Khosravi, M. R. (2023). Intrusion detection for maritime transportation systems with batch federated aggregation. IEEE Transactions on Intelligent Transportation Systems, 24(2), 2503-2514. https://doi.org/10.1109/TITS.2022.3181436

Longo, G., Orlich, A., Musante, S., Merlo, A., & Russo, E. (2023). MaCySTe: A virtual testbed for maritime cybersecurity. SoftwareX, 23, 101426. https://doi.org/10.1016/j.softx.2023.101426

Lund, M. S., Gulland, J., Hareide, O. S., Jøsok, Ø., & Weum, K. (2018a). Integrity of integrated navigation systems (pp. 1-5). In Proceedings of the Conference on Communications and Network Security. Beijing, China. https://doi.org/10.1109/CNS.2018.8433151

Lund, M. S., Hareide, O. S., & Jøsok, Ø. (2018b). An attack on an integrated navigation system. Necesse, 3(2), 149-163. https://doi.org/10.21339/2464-353x.3.2.149

Maritime Executive. (2023). Tokyo mou reports previously-undisclosed cyberattack in 2022. Retrieved from https://maritime-executive.com/article/tokyo-mou-reports-previously-undisclosed-cyberattack-in-2022

Melnik, O., Onyshchenko, S., Onishchenko, O., Lohinov, O., & Ocheretna, V. (2023). Integral approach to vulnerability assessment of ship’s critical equipment and systems. Transactions on Maritime Science, 12(1), 002. https://doi.org/10.7225/toms.v12.n01.002

Merino, L. P., Salmon, L., Bozhilova, M., Ivanov, I., Stoianov, N., Velev, G., Claramunt, C., & Yanakiev, Y. (2022). Isola: An innovative approach to cyber threat detection in cruise shipping (pp. 71-81). Springer. https://doi.org/10.1007/ 978-981-16-4884-7_7

Misas, J. D. P., Hopcraft, R., Tam, K., & Jones, K. (2024). Future of maritime autonomy: Cybersecurity, trust and mariner’s situational awareness. Journal of Marine Engineering & Technology, 23(3), 224-235. https://doi.org/10.1080/20464177.2024.2330176

Morrissette-Beaulieu, F. (2023). Canadian ports victims of cyberattacks by a pro-Russian group. Radio-Canada. Retrieved from https://ici.radio-canada.ca/nouvelle/1971087/noname057-site-web-ports-canadiennes-pirates-informatiques-prorusses

Mrakovic, I., & Vojinovic, R. (2019). Maritime cyber security análisis: How to reduce threats? Transactions on Maritime Science, 8, 132-139. https://doi.org/10.7225/toms.v08.n01.013

Munim, Z. H., Dushenko, M., Jimenez, V. J., Shakil, M. H., & Imset, M. (2020). Big data and artificial intelligence in the maritime industry: A bibliometric review and future research directions. Maritime Policy & Management, 47(5), 577-597. https://doi.org/10.1080/03088839.2020.1788731

NCSC. (2022). Penetration testing. Retrieved from https://www.ncsc.gov.uk/guidance/penetration-testing

NL Times. (2023). Dutch ports’ websites offline for hours, days due to pro-Russian cyber attacks: NL times. Retrieved from https://nltimes.nl/2023/06/14/ dutch-ports-websites-offline-hours-days-due-pro-russian-cyber-attacks

Page, C. (2023). Maritime giant DNV says 1,000 ships affected by ransomware attack. TechCrunch. Retrieved from https://techcrunch.com/2023/01/18/dnv-norway-shipping-ransomware

Pavur, J., Moser, D., Strohmeier, M., Lenders, V., & Martinovic, I. (2020). A tale of sea and sky on the security of maritime vsat communications (pp. 1384-1400). In Proceedings of the 2020 IEEE Symposium on Security and Privacy. San Francisco, USA. https://doi.org/10.1109/SP40000.2020.00056

Pen Test Partners. (2024). Maritime cyber security testing. Retrieved from https://www.pentestpartners.com/penetration-testing-services/maritime-cyber-security-testing

Pitropakis, N., Logothetis, M., Andrienko, G., Stefanatos, J., Karapistoli, E., & Lambrinoudakis, C. (2020). Towards the creation of a threat intelligence framework for maritime infrastructures. Lecture Notes in Computer Science, 11980, 53-68. https://doi.org/10.1007/978-3-030-42048-2_4.

Polatidis, N., Pavlidis, M., & Mouratidis, H. (2018). Cyber-attack path discovery in a dynamic supply chain maritime risk management system. Computer Standards & Interfaces, 56, 74-82. https://doi.org/10.1016/j.csi.2017.09.006

Polemi, N., & Papastergiou, S. (2015). Current efforts in ports and supply chains risk assessment (pp. 349-354). In Proceedings of the 10th International Conference for Internet Technology and Secured Transactions. London, UK. https://doi.org/10.1109/ICITST.2015.7412119

Potamos, G., Peratikou, A., & Stavrou, S. (2021). Towards a maritime cyber range training environment (pp. 180-185). In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR). https://doi.org/10.1109/CSR51186.2021.9527904

Pyykko, H., Kuusijarvi, J., Noponen, S., Toivonen, S., & Hinkka, V. (2020). Building a virtual maritime logistics cybersecurity training platform (pp. 223-246). In Proceedings of the Hamburg International Conference of Logistics. Hamburg, Germany. https://doi.org/10.15480/882.3130

Rahman, R. (2023). Cyber-attack threatens release of port of Lisbon data. Port Technology International. Retrieved from https://www.porttechnology.org/news/cyber-attack-threatens-release-of-port-of-lisbon-data

Robinson, T. (2023). Lockbit 3.0 claims credit for ransomware attack on Japanese port - security boulevard. Retrieved from https://securityboulevard.com/2023/07/lockbit-3-0-claims-credit-for-ransomware-attack-on-japanese-port

Santamarta, R. (2015). Maritime security: Hacking into a voyage data recorder (vdr). Retrieved from https://ioactive.com/maritime-security-hacking-into-a-voyage-data-recorder-vdr

Seong, K. T., Kim, G. H. (2019). Implementation of voyage data recording device using a digital forensics-based hash algorithm. International Journal of Electrical and Computer Engineering, 9, 5412-5419. https://doi.org/10.11591/ijece.v9i6.pp5412-5419

SHIP IP. (2024). Maritime vulnerability and penetration testing. Retrieved from https://shipip.com/maritime-vulnerability-and-penetration-testing

Sicard, F., Hotellier, E., & Francq, J. (2022). An industrial control system physical testbed for naval defense cybersecurity research (pp. 413-422). In Proceedings of the IEEE European Symposium on Security and Privacy Workshops. Genoa, Italy. https://doi.org/10.1109/EuroSPW55150.2022.00049

Silgado, D. M. (2018). Cyber-attacks: A digital threat reality affecting the maritime industry. Retrieved from https://commons.wmu.se/cgi/viewcontent.cgi?article=1662&context=all_dissertations.

Soner, O., Kayisoglu, G., Bolat, P., & Tam, K. (2023). Cybersecurity risk assessment of VDR. Journal of Navigation, 76(1), 20-37. https://doi.org/10.1017/S0373463322000595

Soner, O., Kayisoglu, G., Bolat, P., & Tam, K. (2024). Risk sensitivity analysis of ais cyber security through maritime cyber regulatory frameworks. Applied Ocean Research, 142, 103855. https://doi.org/10.1016/j.apor.2023.103855

Spivey, M. D. (2021). Vulnerability scanning. Practical Hacking Techniques and Countermeasures, 2021, 369-522. https://doi.org/10.1201/9781420013382-10

Svilicic, B., Kamahara, J., Celic, J., & Bolmsten, J. (2019a). Assessing ship cyber risks: A framework and case study of ecdis security. WMU Journal of Maritime Affairs, 18, 509-520. https://doi.org/10.1007/s13437-019-00183-x

Svilicic, B., Kristic, M., Zuskin, S., & Brcic, D. (2020a). Paperless ship navigation: Cyber se-curity weaknesses. Journal of Transportation Security, 13, 203-214. https://doi.org/10.1007/s12198-020-00222-2.

Svilicic, B., Rudan, I., Francic, V., & Doricic, M. (2019b). Shipboard ECDIS cyber security: Third-party component threats. Pomorstvo, 33(2), 176-180. https://doi.org/10.31217/p.33.2.7

Svilicic, B., Rudan, I., Francic, V. F., & Mohovic, D. M. (2020b). Towards a cyber secure shipboard radar. Journal of Navigation, 73(3), 547-558. https://doi.org/10.1017/S0373463319000808

Svilicic, B., Rudan, I., Jugovic, A. J., & Zec, D. (2019c). A study on cyber security threats in a shipboard integrated navigational system. Journal of Marine Science and Engineering, 7(10), 364. https://doi.org/10.3390/jmse7100364

Tabish, N., & Chaur-Luh, T. (2024). Maritime autonomous surface ships: A review of cybersecurity challenges, countermeasures, and future perspectives. IEEE Access, 12, 17114-17136. https://doi.org/10.1109/ACCESS.2024.3357082

Tam, K., Forshaw, K., & Jones, K. (2019). Cyber-ship: Developing next generation maritime cyber research capabilities (pp. 1-10). In Proceedings of the International Conference on Marine Engineering and Technology. Oman. https://doi.org/10.24868/icmet.oman.2019.005

Tam, K., Hopcraft, R., Moara-Nkwe, K., Misas, J. P., Andrews, W., Harish A. V., Gimenez, P., Crichton, T., & Jones, K. (2021a). Case study of a cyber-physical attack affecting port and ship operational safety. Journal of Transportation Technologies, 12(1), 1-27. https://doi.org/10.4236/jtts.2022.121001

Tam, K., & Jones, K. (2019). Macra: A model-based framework for maritime cyber-risk assessment. WMU Journal of Maritime Affairs, 18, 129-163. https://doi.org/10.1007/S13437-019-00162-2

Tam, K., & Jones, K. D. (2018). Maritime cybersecurity policy: The scope and impact of evolving technology on international shipping. Jornal of Cyber Policy, 3(2), 147-164. https://doi.org/10.1080/23738871.2018.1513053

Tam, K., Moara-Nkwe, K., & Jones, K. (2021b). A conceptual cyber-risk assessment of port infrastructure. In Proceedings of the 2021 World of Shipping Portugal International Research Conference on Maritime Affairs, Portugal. Retrieved from https://api.semanticscholar.org/CorpusID:229406582

Tam, K., Moara-Nkwe, K., & Jones, K. D. (2021c). The use of cyber ranges in the maritime context: Assessing maritime-cyber risks, raising awareness, and providing training. Maritime Technology and Research, 3(1), 16-30. https://doi.org/10.33175/mtr.2021.241410

The Times of Israel. (2023). Websites of Israeli port hacked; Sudanese group said to claim responsibility - the Times of Israel. Retrieved from https://www.timesofisrael.com/websites-of-israeli-port-hacked-sudanese-group-said-to-claim-responsibility

UNCTAD. (2022). Review of maritime transport 2022. Retrieved from https://unctad.org/system/files/official-document/rmt2022_en.pdf

US Coast Guard. (2022). 2021 cyber trends and insights in the marine environment. Retrieved from https://www.dco.uscg.mil/Portals/9/2021CyberTrendsInsightsMarineEnvironmentReport.pdf

US Coast Guard. (2024). 2023 cyber trends and insights in the marine environment. Retrieved from https://www.uscg.mil/Portals/0/Images/cyber/CTIME_2023_FINAL.pdf

Vineetha, H. A., Tam, K., & Jones, K. (2022). Investigating the security and accessibility of voyage data recorder data using a usb attack. Retrieved from https://www.researchgate.net/publication/365365607_Investigating_the_Security_and_Accessibility_of_Voyage_Data_Recorder_Data_using_a_USB_attack

Vineetha, H. A., Tam, K., & Jones, K. (2024). Bridgeinsight: An asset profiler for penetration testing in a heterogeneous maritime bridge environment. Maritime Technology and Research, 6(1), 266818. https://doi.org/10.33175/MTR.2024.266818

Walter, M. J., Barrett, A., & Tam, K. (2024). A red teaming framework for securing AI in maritime autonomous systems. Applied Artificial Intelligence, 38(1), 2395750.

Walter, M. J., Barrett, A., Walker, D. J., & Tam, K. (2023). Adversarial AI testcases for maritime autonomous systems. AI, Computer Science and Robotics Technology, 2023(2), 1-29. https://doi.org/10.5772/ACRT.15

Wolsing, K., Saillard, A., Bauer, J., Wagner, E., van Sloun, C., Fink, I. B., Schmidt, M., Henze, M., & Wehrle, K. (2022). radarsec-lab. Retrieved from https://doi.org/10.5281/zenodo.7188549

Yi, C. G., & Kim, Y. G. (2021). Security testing for naval ship combat system software. IEEE Access, 9, 66839-66851. https://doi.org/10.1109/ACCESS.2021.3076918

Yoo, Y., & Park, H. S. (2021). Qualitative risk assessment of cybersecurity and development of vulnerability enhancement plans in consideration of digitalized ship. Journal of Marine Science and Engineering, 9(6), 565. https://doi.org/10.3390/jmse9060565

Yousaf, A., Amor, A., Kwa, P. T. H., Li, M., & Zhou, J. (2024). Cyber risk assessment of cyber-enabled autonomous cargo vessel. International Journal of Critical Infrastructure Protection, 46, 100695. https://doi.org/10.1016/j.ijcip.2024.100695

Zagan, R., Raicu, G., & Sabau, A. (2022). Studies and research regarding vulnerabilities of marine autonomous surface systems (mass) and remotely operated vessels (rovs) from point of view of cybersecurity. International Journal of Modern Manufacturing Technologies, XIV, 2067-3604. https://doi.org/10.54684/ijmmt.2022.14.3.310

Downloads

Published

2024-10-10