Literature review of maritime cyber security: The first decade
DOI:
https://doi.org/10.33175/mtr.2025.273805Keywords:
Comprehensive review; Maritime cyber security; Cyber-physical securityAbstract
This is a comprehensive review of the current body of work for cyber security in the marine and maritime sectors. Reviews are useful as a field develops, both for those new to the field, and those contributing to a section of the existing body of work. This looks at the phases of research, from exploratory and positional papers in the early 2010s, to the more recent experimental research, and how “maritime cyber security” has branched into subtopics addressing human factors, policy, law, cyber-physical security, and more. In addition to different topics of research, this comprehensive review summaries the focus of those papers, whether they are intended for crewed vessels, uncrewed vessels (above and below the surface), offshore structures (e.g., oil, renewable wind energy), and infrastructure like ports. As a newly developing field, compared to general cyber security or naval engineering, this review also examines the ratio of positional papers, papers that generate knowledge, and papers that summarize existing works to gauge the maturity of the field. This type of review relies on an expert understanding of the existing body of academic literature and its impact on industry and government, instead of applying prescribed systematic review methodology. This review of over three hundred articles concludes with overall findings and suggestions for future research to continue maturing and growing maritime cyber security research.
Highlights
- Instead of using a systematic review to answer a research question, this paper does a comprehensive review of the existing literature to understand the growth of the field.
- As the first maritime cyber security specific papers were published circa 2013, this is the first review to consider the first decade of maritime cyber research (2013 - 2023) and how the field of research, including its sub-topics, has developed over those years.
- While not every one of the 300+ found papers were referenced, this is one of largest the most comprehensive reviews, and highlights some of the limitations to the large number of systematic reviews in the field.
References
Al Ali, N. A. R., Chebotareva, A. A., & Chebotarev, V. E. (2021). Cyber security in marine transport: Opportunities and legal challenges. Scientific Journal of Maritime Research, 35(2), 248-255. https://doi.org/10.31217/p.35.2.7
Amor, A., & Gkioulos, V. 2021. Communication and cybersecurity testbed for autonomous passenger ship (pp. 5-22). European Symposium on Research in Computer Security. Springer. https://doi.org/10.1007/978-3-030-95484-0_1.
AP Moller - Maersk. (2017). The Annual Report for 2017 of A.P. Moller - Maesk A/S. Retrieved from https://investor.maersk.com/system/files-encrypted/nasdaq_kms/assets/2018/04/25/13-00-21/A.P._Moller_-_Maersk_Annual_Report_2017.pdf
Aptive. (2024). Maritime penetration testing services. Retrieved from https://www.aptive.co.uk/penetration-testing/maritime
Arghire, I. (2023). Ransomware gang publishes data allegedly stolen from maritime firm Royal Dirkzwager – Security Week. Security Week. Retrieved from https://www.securityweek.com/ransomware-gang-publishes-data-allegedly-stolen-from-maritime-firm-royal-dirkzwager
Awan, M. S. K., & Al Ghamdi, M. A. (2019). Understanding the vulnerabilities in digital components of an integrated bridge system (IBS). Journal of Marine Science and Engineering, 7(10), 350. https://doi.org/10.3390/jmse7100350
Aziz, A., Tedeschi, P., Sciancalepore, S., & Pietro, R. D. (2020). SecureAIS - Securing Pairwise Vessels Communications (pp. 1-9). In Proceedings of the 2020 IEEE Conference on Communications and Network Security. Avignon, France. https://doi.org/10.1109/CNS48642.2020.9162320
Balduzzi, M., & Wilhoit, K. (2014). A security evaluation of AIS automated identification system (pp. 436-445). In Proceedings of the 30th Annual Computer Security Applications Conference. New York, USA. http://dx.doi.org/10.1145/2664243.2664257
BIMCO. (2021). The guidelines on cyber security onboard ships. International Chamber of Shipping, 4, 1-53. https://www.bimco.org/about-us-and-our-members/publications/the-guidelines-on-cyber-security-onboard-ships
Bolbot, V., Kulkarni, K., Brunou, P., Banda, O. V., & Musharraf, M. (2022). Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis. International Journal of Critical Infrastructure Protection. 39, 100571. https://doi.org/10.1016/j.ijcip.2022.100571
Botunac, I., & Grzan, M. (2017). Analysis of software threats to the automatic identification system. Shipbuilding: Theory and Practice of Naval Architecture, Marine Engineering and Ocean Engineering, 68, 97-105. https://doi.org/ 10.21278/brod68106
Chambers, S. (2022). Voyager worldwide hit by cyber attack. Splash. Retrieved from https://splash247.com/voyager-worldwide-hit-by-cyber-attack
Chang, C. H., Kontovas, C., Yu, Q., & Yang, Z. (2021). Risk assessment of the operations of maritime autonomous surface ships. Reliability Engineering & System Safety, 207, 107324. https://doi.org/10.1016/j.ress.2020.107324
Chia, R. Y. (2019). The need for ethical hacking in the maritime industry (pp. 108-121). Time for a New Maritime Era - Society of Naval Architects and Marine Engineers Singapore.
Cho, S., Orye, E., Visky, G., & Prates, V. (2022). Cybersecurity considerations in autonomous ships. Retrieved from https://ccdcoe.org/uploads/2022/09/Cybersecurity_Considerations_in_Autonomous_Ships.pdf
CyberMAR. (2024). About - Cybermar. Retrieved from https://www.cyber-mar.eu/about
Eichenhofer, J. O., Heymann, E., Miller, B. P., & Kang, A. (2020). An in-depth security assessment of maritime container terminal software systems. IEEE Access, 8, 128050-128067. https://doi.org/10.1109/ACCESS.2020.3008395
Enoch, S. Y., Lee, J. S., & Kim, D. S. (2021). Novel security models, metrics and security assessment for maritime vessel networks. Computer Networks, 189, 107934. https://doi.org/10.1016/j.comnet.2021.107934
Erstad, E., Hopcraft, R., Harish, A. V., & Tam, K. (2023). A human-centred design approach for the development and conducting of maritime cyber resilience training. WMU Journal of Maritime Affairs, 22, 241-266. https://doi.org/10.1007/s13437-023-00304-7
ESC Global Security. (2015). Maritime cyber security white paper: Safeguarding data through increased awareness. Retrieved from https://allaboutshipping.co.uk/wp-content/uploads/2015/11/ESCGS-Cyber-Security-WP-2015.pdf
Fenton, A. J. (2024). Preventing catastrophic cyber-physical attacks on the global maritime transportation system: A case study of hybrid maritime security in the straits of Malacca and Singapore. Journal of Marine Science and Engineering, 12(3), 510. https://doi.org/10.3390/jmse12030510
Firesand. (2024). Maritime cyber security services: Penetration testing. Retrieved from https://www.firesand.co.uk/sectors/maritime-cyber-security-services
Glover, C. (2022). Port of London authority cyberattack ‘politically motivated’. Tech Monitor. Retrieved from https://techmonitor.ai/technology/cybersecurity/port-of-london-authority-cyberattack.
Goudossis, A., & Katsikas, S. K. (2019). Towards a secure automatic identification system (AIS). Journal of Marine Science and Technology, 24, 410-423. https://doi.org/10.1007/s00773-018-0561-3
Greig, J. (2022). Shell forced to reroute supplies after cyberattack on two German oil companies-ZDNet. Retrieved from https://www.zdnet.com/article/shell-forced-re-route-oil-supplies-after-cyberattack-on-german-companies
Gurren, J., Harish, A. V., Tam, K., & Jones, K. (2023). Security implications of a satellite communication device on wireless networks using pentesting (pp. 292-298). In Proceedings of the International Conference on Wireless and Mobile Computing, Networking and Communications. Montreal, Canada. https://doi.org/10.1109/WIMOB58348.2023.10187791
Gyamfi, E., Ansere, J. A., Kamal, M., Tariq, M., & Jurcut, A. (2023). An adaptive network security system for iot-enabled maritime transportation. IEEE Transactions on Intelligent Transportation Systems, 24(2), 2538-2547. https://doi.org/10.1109/TITS.2022.3159450
Harreveld, M. V. (2023). Russians may hack Zeeland ports. Retrieved from https://www.bnr.nl/nieuws/binnenland/10516325/russische-hackers-vallen-zeeuwse-havens-aan
Hemminghaus, C., Bauer, J., & Padilla, E. (2021a). Brat: A bridge attack tool for cyber security assessments of maritime systems. International Journal on Marine Navigation and Safety of Sea Transportation, 15, 35-44. https://doi.org/10.12716/1001.15.01.02.
Hemminghaus, C., Bauer, J., & Wolsing, K. (2021b). Sigmar: Ensuring integrity and authenticity of maritime systems using digital signatures (pp. 1-6). In Proceedings of the 2021 International Symposium on Networks, Computers and Communications. Dubai, United Arab Emirates. https://doi.org/10.1109/ISNCC52172.2021.9615738
Hopcraft, R., & Martin, K. (2018). Effective maritime cybersecurity regulation: The case for a cyber code. Journal of the Indian Ocean Region, 14, 1-13. https://doi.org/10.1080/19480881.2018.1519056
Hopcraft, R., Harish, A. V., Tam, K., & Jones, K. (2023). Raising the standard of maritime voyage data recorder security. Journal of Marine Science and Engineering, 11, 267. https://doi.org/10.3390/jmse11020267
International Maritime Organization. (2017). Resolution MSC.428(98) Maritime Cyber Risk Management in Safety Management Systems. Retrieved from https://wwwcdn.imo.org/localresources/en/OurWork/Security/Documents/ResolutionMSC.428(98).pdf
International Maritime Organization. (2022). Msc-fal.1/circ.3/rev.2 - guidelines on maritime cyber risk management. International Maritime Organization. Retrieved from https://www.liscr.com/sites/default/files/liscr_imo_resolutions/MSC-FAL.1-Circ.3-Rev.2.pdf
Jacq, O., Boudvin, X., Brosset, D., Kermarrec, Y., & Simonin, J. (2018). Detecting and hunting cyberthreats in a maritime environment: Specification and experimentation of a maritime cybersecurity operations centre (pp. 1-8). In Proceedings of the 2nd Cyber Security in Networking Conference. Paris, France. https://doi.org/10.1109/CSNET.2018.8602669
Jo, Y., Choi, O., You, J., Cha, Y., & Lee, D. H. (2022). Cyberattack models for ship equipment based on the MITRE ATT&CK framework. Sensors, 22(5), 1860. https://doi.org/10.3390/s22051860
Jones, K. D., Tam, K., & Papadaki, M. (2015). Threats and impacts in maritime cyber security. Engineering & Technology Reference, 2016, 123. https://doi.org/10.1049/ETR.2015.0123
Kalogeraki, E. M., Papastergiou, S., Mouratidis, H., & Polemi, N. (2018). A novel risk assessment methodology for scada maritime logistics environments. Applied Sciences, 8(9), 1477. https://doi.org/10.3390/app8091477
Karim, M. S. (2022). Maritime cybersecurity and the imo legal instruments: Sluggish response to an escalating threat? Marine Policy, 143, 105138. https://doi.org/10.1016/j.marpol.2022.105138
Kayisoglu, G., Bolat, P., & Tam, K. (2022). Determining maritime cyber security dynamics and development of maritime cyber risk check list for ships (pp. 22-27). In Proceedings of the 22nd Annual General Assembly International Association of Maritime Universities. Batumi, Geogia.
Kayisoglu, G., Bolat, P., & Tam, K. (2024). A novel application of the coras framework for ensuring cyber hygiene on shipboard radar. Journal of Marine Engineering & Technology, 23(2), 67-81. https://doi.org/10.1080/20464177.2023.2292782
Kessler, G. C. (2021). The can bus in the maritime environment: Technical overview and cybersecurity vulnerabilities. International Journal on Marine Navigation and Safety of Sea Transportation, 15(3), 531-540. https://doi.org/10.12716/1001.15.03.05
Khandker, S., Turtiainen, H., Costin, A., & Hamalainen, T. (2022). Cybersecurity attacks on software logic and error handling within ais implementations: A systematic testing of resilience. IEEE Access, 10, 29493-29505. https://doi.org/10.1109/ACCESS.2022.3158943
Kretschmann, L., Zacharias, M., Klover, S., & Hensel, T. (2020). Machine learning in maritime logistics. Retrieved from https://shipzero.com/wp-content/uploads/2022/12/10015_compressed.pdf
Liu, W., Xu, X., Wu, L., Qi, L., Jolfaei, A., Ding, W., & Khosravi, M. R. (2023). Intrusion detection for maritime transportation systems with batch federated aggregation. IEEE Transactions on Intelligent Transportation Systems, 24(2), 2503-2514. https://doi.org/10.1109/TITS.2022.3181436
Longo, G., Orlich, A., Musante, S., Merlo, A., & Russo, E. (2023). MaCySTe: A virtual testbed for maritime cybersecurity. SoftwareX, 23, 101426. https://doi.org/10.1016/j.softx.2023.101426
Lund, M. S., Gulland, J., Hareide, O. S., Jøsok, Ø., & Weum, K. (2018a). Integrity of integrated navigation systems (pp. 1-5). In Proceedings of the Conference on Communications and Network Security. Beijing, China. https://doi.org/10.1109/CNS.2018.8433151
Lund, M. S., Hareide, O. S., & Jøsok, Ø. (2018b). An attack on an integrated navigation system. Necesse, 3(2), 149-163. https://doi.org/10.21339/2464-353x.3.2.149
Maritime Executive. (2023). Tokyo mou reports previously-undisclosed cyberattack in 2022. Retrieved from https://maritime-executive.com/article/tokyo-mou-reports-previously-undisclosed-cyberattack-in-2022
Melnik, O., Onyshchenko, S., Onishchenko, O., Lohinov, O., & Ocheretna, V. (2023). Integral approach to vulnerability assessment of ship’s critical equipment and systems. Transactions on Maritime Science, 12(1), 002. https://doi.org/10.7225/toms.v12.n01.002
Merino, L. P., Salmon, L., Bozhilova, M., Ivanov, I., Stoianov, N., Velev, G., Claramunt, C., & Yanakiev, Y. (2022). Isola: An innovative approach to cyber threat detection in cruise shipping (pp. 71-81). Springer. https://doi.org/10.1007/ 978-981-16-4884-7_7
Misas, J. D. P., Hopcraft, R., Tam, K., & Jones, K. (2024). Future of maritime autonomy: Cybersecurity, trust and mariner’s situational awareness. Journal of Marine Engineering & Technology, 23(3), 224-235. https://doi.org/10.1080/20464177.2024.2330176
Morrissette-Beaulieu, F. (2023). Canadian ports victims of cyberattacks by a pro-Russian group. Radio-Canada. Retrieved from https://ici.radio-canada.ca/nouvelle/1971087/noname057-site-web-ports-canadiennes-pirates-informatiques-prorusses
Mrakovic, I., & Vojinovic, R. (2019). Maritime cyber security análisis: How to reduce threats? Transactions on Maritime Science, 8, 132-139. https://doi.org/10.7225/toms.v08.n01.013
Munim, Z. H., Dushenko, M., Jimenez, V. J., Shakil, M. H., & Imset, M. (2020). Big data and artificial intelligence in the maritime industry: A bibliometric review and future research directions. Maritime Policy & Management, 47(5), 577-597. https://doi.org/10.1080/03088839.2020.1788731
NCSC. (2022). Penetration testing. Retrieved from https://www.ncsc.gov.uk/guidance/penetration-testing
NL Times. (2023). Dutch ports’ websites offline for hours, days due to pro-Russian cyber attacks: NL times. Retrieved from https://nltimes.nl/2023/06/14/ dutch-ports-websites-offline-hours-days-due-pro-russian-cyber-attacks
Page, C. (2023). Maritime giant DNV says 1,000 ships affected by ransomware attack. TechCrunch. Retrieved from https://techcrunch.com/2023/01/18/dnv-norway-shipping-ransomware
Pavur, J., Moser, D., Strohmeier, M., Lenders, V., & Martinovic, I. (2020). A tale of sea and sky on the security of maritime vsat communications (pp. 1384-1400). In Proceedings of the 2020 IEEE Symposium on Security and Privacy. San Francisco, USA. https://doi.org/10.1109/SP40000.2020.00056
Pen Test Partners. (2024). Maritime cyber security testing. Retrieved from https://www.pentestpartners.com/penetration-testing-services/maritime-cyber-security-testing
Pitropakis, N., Logothetis, M., Andrienko, G., Stefanatos, J., Karapistoli, E., & Lambrinoudakis, C. (2020). Towards the creation of a threat intelligence framework for maritime infrastructures. Lecture Notes in Computer Science, 11980, 53-68. https://doi.org/10.1007/978-3-030-42048-2_4.
Polatidis, N., Pavlidis, M., & Mouratidis, H. (2018). Cyber-attack path discovery in a dynamic supply chain maritime risk management system. Computer Standards & Interfaces, 56, 74-82. https://doi.org/10.1016/j.csi.2017.09.006
Polemi, N., & Papastergiou, S. (2015). Current efforts in ports and supply chains risk assessment (pp. 349-354). In Proceedings of the 10th International Conference for Internet Technology and Secured Transactions. London, UK. https://doi.org/10.1109/ICITST.2015.7412119
Potamos, G., Peratikou, A., & Stavrou, S. (2021). Towards a maritime cyber range training environment (pp. 180-185). In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR). https://doi.org/10.1109/CSR51186.2021.9527904
Pyykko, H., Kuusijarvi, J., Noponen, S., Toivonen, S., & Hinkka, V. (2020). Building a virtual maritime logistics cybersecurity training platform (pp. 223-246). In Proceedings of the Hamburg International Conference of Logistics. Hamburg, Germany. https://doi.org/10.15480/882.3130
Rahman, R. (2023). Cyber-attack threatens release of port of Lisbon data. Port Technology International. Retrieved from https://www.porttechnology.org/news/cyber-attack-threatens-release-of-port-of-lisbon-data
Robinson, T. (2023). Lockbit 3.0 claims credit for ransomware attack on Japanese port - security boulevard. Retrieved from https://securityboulevard.com/2023/07/lockbit-3-0-claims-credit-for-ransomware-attack-on-japanese-port
Santamarta, R. (2015). Maritime security: Hacking into a voyage data recorder (vdr). Retrieved from https://ioactive.com/maritime-security-hacking-into-a-voyage-data-recorder-vdr
Seong, K. T., Kim, G. H. (2019). Implementation of voyage data recording device using a digital forensics-based hash algorithm. International Journal of Electrical and Computer Engineering, 9, 5412-5419. https://doi.org/10.11591/ijece.v9i6.pp5412-5419
SHIP IP. (2024). Maritime vulnerability and penetration testing. Retrieved from https://shipip.com/maritime-vulnerability-and-penetration-testing
Sicard, F., Hotellier, E., & Francq, J. (2022). An industrial control system physical testbed for naval defense cybersecurity research (pp. 413-422). In Proceedings of the IEEE European Symposium on Security and Privacy Workshops. Genoa, Italy. https://doi.org/10.1109/EuroSPW55150.2022.00049
Silgado, D. M. (2018). Cyber-attacks: A digital threat reality affecting the maritime industry. Retrieved from https://commons.wmu.se/cgi/viewcontent.cgi?article=1662&context=all_dissertations.
Soner, O., Kayisoglu, G., Bolat, P., & Tam, K. (2023). Cybersecurity risk assessment of VDR. Journal of Navigation, 76(1), 20-37. https://doi.org/10.1017/S0373463322000595
Soner, O., Kayisoglu, G., Bolat, P., & Tam, K. (2024). Risk sensitivity analysis of ais cyber security through maritime cyber regulatory frameworks. Applied Ocean Research, 142, 103855. https://doi.org/10.1016/j.apor.2023.103855
Spivey, M. D. (2021). Vulnerability scanning. Practical Hacking Techniques and Countermeasures, 2021, 369-522. https://doi.org/10.1201/9781420013382-10
Svilicic, B., Kamahara, J., Celic, J., & Bolmsten, J. (2019a). Assessing ship cyber risks: A framework and case study of ecdis security. WMU Journal of Maritime Affairs, 18, 509-520. https://doi.org/10.1007/s13437-019-00183-x
Svilicic, B., Kristic, M., Zuskin, S., & Brcic, D. (2020a). Paperless ship navigation: Cyber se-curity weaknesses. Journal of Transportation Security, 13, 203-214. https://doi.org/10.1007/s12198-020-00222-2.
Svilicic, B., Rudan, I., Francic, V., & Doricic, M. (2019b). Shipboard ECDIS cyber security: Third-party component threats. Pomorstvo, 33(2), 176-180. https://doi.org/10.31217/p.33.2.7
Svilicic, B., Rudan, I., Francic, V. F., & Mohovic, D. M. (2020b). Towards a cyber secure shipboard radar. Journal of Navigation, 73(3), 547-558. https://doi.org/10.1017/S0373463319000808
Svilicic, B., Rudan, I., Jugovic, A. J., & Zec, D. (2019c). A study on cyber security threats in a shipboard integrated navigational system. Journal of Marine Science and Engineering, 7(10), 364. https://doi.org/10.3390/jmse7100364
Tabish, N., & Chaur-Luh, T. (2024). Maritime autonomous surface ships: A review of cybersecurity challenges, countermeasures, and future perspectives. IEEE Access, 12, 17114-17136. https://doi.org/10.1109/ACCESS.2024.3357082
Tam, K., Forshaw, K., & Jones, K. (2019). Cyber-ship: Developing next generation maritime cyber research capabilities (pp. 1-10). In Proceedings of the International Conference on Marine Engineering and Technology. Oman. https://doi.org/10.24868/icmet.oman.2019.005
Tam, K., Hopcraft, R., Moara-Nkwe, K., Misas, J. P., Andrews, W., Harish A. V., Gimenez, P., Crichton, T., & Jones, K. (2021a). Case study of a cyber-physical attack affecting port and ship operational safety. Journal of Transportation Technologies, 12(1), 1-27. https://doi.org/10.4236/jtts.2022.121001
Tam, K., & Jones, K. (2019). Macra: A model-based framework for maritime cyber-risk assessment. WMU Journal of Maritime Affairs, 18, 129-163. https://doi.org/10.1007/S13437-019-00162-2
Tam, K., & Jones, K. D. (2018). Maritime cybersecurity policy: The scope and impact of evolving technology on international shipping. Jornal of Cyber Policy, 3(2), 147-164. https://doi.org/10.1080/23738871.2018.1513053
Tam, K., Moara-Nkwe, K., & Jones, K. (2021b). A conceptual cyber-risk assessment of port infrastructure. In Proceedings of the 2021 World of Shipping Portugal International Research Conference on Maritime Affairs, Portugal. Retrieved from https://api.semanticscholar.org/CorpusID:229406582
Tam, K., Moara-Nkwe, K., & Jones, K. D. (2021c). The use of cyber ranges in the maritime context: Assessing maritime-cyber risks, raising awareness, and providing training. Maritime Technology and Research, 3(1), 16-30. https://doi.org/10.33175/mtr.2021.241410
The Times of Israel. (2023). Websites of Israeli port hacked; Sudanese group said to claim responsibility - the Times of Israel. Retrieved from https://www.timesofisrael.com/websites-of-israeli-port-hacked-sudanese-group-said-to-claim-responsibility
UNCTAD. (2022). Review of maritime transport 2022. Retrieved from https://unctad.org/system/files/official-document/rmt2022_en.pdf
US Coast Guard. (2022). 2021 cyber trends and insights in the marine environment. Retrieved from https://www.dco.uscg.mil/Portals/9/2021CyberTrendsInsightsMarineEnvironmentReport.pdf
US Coast Guard. (2024). 2023 cyber trends and insights in the marine environment. Retrieved from https://www.uscg.mil/Portals/0/Images/cyber/CTIME_2023_FINAL.pdf
Vineetha, H. A., Tam, K., & Jones, K. (2022). Investigating the security and accessibility of voyage data recorder data using a usb attack. Retrieved from https://www.researchgate.net/publication/365365607_Investigating_the_Security_and_Accessibility_of_Voyage_Data_Recorder_Data_using_a_USB_attack
Vineetha, H. A., Tam, K., & Jones, K. (2024). Bridgeinsight: An asset profiler for penetration testing in a heterogeneous maritime bridge environment. Maritime Technology and Research, 6(1), 266818. https://doi.org/10.33175/MTR.2024.266818
Walter, M. J., Barrett, A., & Tam, K. (2024). A red teaming framework for securing AI in maritime autonomous systems. Applied Artificial Intelligence, 38(1), 2395750.
Walter, M. J., Barrett, A., Walker, D. J., & Tam, K. (2023). Adversarial AI testcases for maritime autonomous systems. AI, Computer Science and Robotics Technology, 2023(2), 1-29. https://doi.org/10.5772/ACRT.15
Wolsing, K., Saillard, A., Bauer, J., Wagner, E., van Sloun, C., Fink, I. B., Schmidt, M., Henze, M., & Wehrle, K. (2022). radarsec-lab. Retrieved from https://doi.org/10.5281/zenodo.7188549
Yi, C. G., & Kim, Y. G. (2021). Security testing for naval ship combat system software. IEEE Access, 9, 66839-66851. https://doi.org/10.1109/ACCESS.2021.3076918
Yoo, Y., & Park, H. S. (2021). Qualitative risk assessment of cybersecurity and development of vulnerability enhancement plans in consideration of digitalized ship. Journal of Marine Science and Engineering, 9(6), 565. https://doi.org/10.3390/jmse9060565
Yousaf, A., Amor, A., Kwa, P. T. H., Li, M., & Zhou, J. (2024). Cyber risk assessment of cyber-enabled autonomous cargo vessel. International Journal of Critical Infrastructure Protection, 46, 100695. https://doi.org/10.1016/j.ijcip.2024.100695
Zagan, R., Raicu, G., & Sabau, A. (2022). Studies and research regarding vulnerabilities of marine autonomous surface systems (mass) and remotely operated vessels (rovs) from point of view of cybersecurity. International Journal of Modern Manufacturing Technologies, XIV, 2067-3604. https://doi.org/10.54684/ijmmt.2022.14.3.310
Downloads
Published
Issue
Section
Categories
License
Copyright (c) 2024 Maritime Technology and Research
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright: CC BY-NC-ND 4.0