{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:19:31Z","timestamp":1771467571782,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030420475","type":"print"},{"value":"9783030420482","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-42048-2_4","type":"book-chapter","created":{"date-parts":[[2020,2,21]],"date-time":"2020-02-21T05:18:51Z","timestamp":1582262331000},"page":"53-68","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures"],"prefix":"10.1007","author":[{"given":"Nikolaos","family":"Pitropakis","sequence":"first","affiliation":[]},{"given":"Marios","family":"Logothetis","sequence":"additional","affiliation":[]},{"given":"Gennady","family":"Andrienko","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Stefanatos","sequence":"additional","affiliation":[]},{"given":"Eirini","family":"Karapistoli","sequence":"additional","affiliation":[]},{"given":"Costas","family":"Lambrinoudakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,22]]},"reference":[{"key":"4_CR1","unstructured":"Greenberg, A.: The untold story of NotPetya, the most devastating cyberattack in history. Wired, August 2018"},{"issue":"7701","key":"4_CR2","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1038\/d41586-018-04602-6","volume":"556","author":"M Taddeo","year":"2018","unstructured":"Taddeo, M., Floridi, L.: Regulate artificial intelligence to avert cyber arms race. Nature 556(7701), 296\u2013298 (2018)","journal-title":"Nature"},{"key":"4_CR3","unstructured":"Apostolou, B., Apostolou, N., Schaupp, L.C.: Assessing and responding to cyber risk: the energy industry as example. J. Forensic Investig. Account. 10(1) (2018)"},{"key":"4_CR4","unstructured":"DNVGL: Veracity. https:\/\/www.dnvgl.com\/data-platform\/index.html\/. Accessed 09 Feb 2019"},{"issue":"11","key":"4_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1361-3723(16)30089-6","volume":"2016","author":"S Mansfield-Devine","year":"2016","unstructured":"Mansfield-Devine, S.: The imitation game: how business email compromise scams are robbing organisations. Comput. Fraud Secur. 2016(11), 5\u201310 (2016)","journal-title":"Comput. Fraud Secur."},{"key":"4_CR6","unstructured":"O\u2019Donnell, L.: Gold galleon hacking group plunders shipping industry. https:\/\/threatpost.com\/gold-galleon-hacking-group-plunders-shippingindustry\/131203\/. Accessed 09 Feb 2019"},{"issue":"4","key":"4_CR7","first-page":"1","volume":"2","author":"V Shapo","year":"2018","unstructured":"Shapo, V.: Cybersecurity implementation aspects at shipping 4.0 and industry 4.0 concepts realization. J. Sci. Perspect. 2(4), 1\u201312 (2018)","journal-title":"J. Sci. Perspect."},{"key":"4_CR8","unstructured":"Johnson, B., Caban, D., Krotofil, M., Scali, D., Brubaker, N., Glyer, C.: Attackers deploy new ICS attack framework \u201cTRITON\u201d and cause operational disruption to critical infrastructure. Threat Research Blog (2017)"},{"key":"4_CR9","unstructured":"Marks, P.: Why the Stuxnet worm is like nothing seen before. News Science (2010)"},{"key":"4_CR10","unstructured":"Cachin, C.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, vol. 310 (2016)"},{"key":"4_CR11","unstructured":"OSSEC: Ossec. https:\/\/www.ossec.net\/. Accessed 09 Feb 2019"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-319-22906-5_11","volume-title":"Trust, Privacy and Security in Digital Business","author":"N Pitropakis","year":"2015","unstructured":"Pitropakis, N., Lambrinoudakis, C., Geneiatakis, D.: Till all are one: towards a unified cloud IDS. In: Fischer-H\u00fcbner, S., Lambrinoudakis, C., Lopez, J. (eds.) TrustBus 2015. LNCS, vol. 9264, pp. 136\u2013149. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22906-5_11"},{"key":"4_CR13","unstructured":"IBM: Artificial intelligence for a smarter kind of cybersecurity. https:\/\/www.ibm.com\/security\/artificial-intelligence\/. Accessed 09 Feb 2019"},{"key":"4_CR14","volume-title":"Exploring Splunk","author":"D Carasso","year":"2012","unstructured":"Carasso, D.: Exploring Splunk. CITO Research, New York (2012)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Wei, J., Mendis, G.J.: A deep learning-based cyber-physical strategy to mitigate false data injection attack in smart grids. In: Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/CPSRSG.2016.7684102"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Bezemskij, A., Loukas, G., Gan, D., Anthony, R.: Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian networks, pp. 98\u2013103 (2017)","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.20"},{"key":"4_CR17","unstructured":"IBM: Honeything. https:\/\/www.ibm.com\/security\/artificial-intelligence\/. Accessed 09 Feb 2019"},{"key":"4_CR18","unstructured":"Conpot: Conpot. http:\/\/conpot.org\/. Accessed 09 Feb 2019"},{"key":"4_CR19","unstructured":"BruteForce Lab: HoneyDrive. https:\/\/bruteforcelab.com\/honeydrive\/. Accessed 09 Feb 2019"},{"key":"4_CR20","unstructured":"Jasek, R., Kolarik, M., Vymola, T.: APT detection system using honeypots. In: Proceedings of the 13th International Conference on Applied Informatics and Communications (AIC 2013), pp. 25\u201329. WSEAS Press (2013)"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-319-98385-1_15","volume-title":"Trust, Privacy and Security in Digital Business","author":"N Pitropakis","year":"2018","unstructured":"Pitropakis, N., Panaousis, E., Giannakoulias, A., Kalpakis, G., Rodriguez, R.D., Sarigiannidis, P.: An enhanced cyber attack attribution framework. In: Furnell, S., Mouratidis, H., Pernul, G. (eds.) TrustBus 2018. LNCS, vol. 11033, pp. 213\u2013228. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98385-1_15"},{"issue":"4","key":"4_CR22","first-page":"87","volume":"66","author":"JF Solomon","year":"2013","unstructured":"Solomon, J.F.: Maritime deception and concealment: concepts for defeating wide-area oceanic surveillance-reconnaissance-strike networks. Naval War Coll. Rev. 66(4), 87 (2013)","journal-title":"Naval War Coll. Rev."},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Bou-Harb, E., Kaisar, E.I., Austin, M.: On the impact of empirical attack models targeting marine transportation. In: 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS), pp. 200\u2013205. IEEE (2017)","DOI":"10.1109\/MTITS.2017.8005665"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-540-74320-0_11","volume-title":"Recent Advances in Intrusion Detection","author":"X Jiang","year":"2007","unstructured":"Jiang, X., Wang, X.: \u201cOut-of-the-Box\u201d monitoring of VM-based high-interaction honeypots. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 198\u2013218. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74320-0_11"},{"key":"4_CR25","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151, 1\u201332 (2014)","journal-title":"Ethereum Proj. Yellow Pap."},{"key":"4_CR26","unstructured":"Keim, E.D., Kohlhammer, J., Ellis, G.: Mastering the information age: solving problems with visual analytics. Eurographics Association (2010)"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Andrienko, N., et al.: Viewing visual analytics as model building. In: Computer Graphics Forum. Wiley Online Library (2018)","DOI":"10.1111\/cgf.13324"},{"issue":"1","key":"4_CR28","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1080\/17489725.2016.1169322","volume":"10","author":"G Andrienko","year":"2016","unstructured":"Andrienko, G., Andrienko, N., Fuchs, G.: Understanding movement data quality. J. Locat. Based Serv. 10(1), 31\u201346 (2016)","journal-title":"J. Locat. Based Serv."},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Endert, A., et al.: The state of the art in integrating machine learning into visual analytics. In: Computer Graphics Forum, vol. 36, pp. 458\u2013486. Wiley Online Library (2017)","DOI":"10.1111\/cgf.13092"},{"issue":"8","key":"4_CR30","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1109\/TVCG.2011.144","volume":"18","author":"H Shiravi","year":"2012","unstructured":"Shiravi, H., Shiravi, A., Ghorbani, A.A.: A survey of visualization systems for network security. IEEE Trans. Vis. Comput. Graph. 18(8), 1313\u20131329 (2012)","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Fischer, F., Keim, D.A.: NStreamAware: real-time visual analytics for data streams to enhance situational awareness. In: Proceedings of the Eleventh Workshop on Visualization for Cyber Security, pp.65\u201372. ACM (2014)","DOI":"10.1145\/2671491.2671495"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Chen, S., Guo, C., Yuan, X., Merkle, F., Schaefer, H., Ertl, T.: OCEANS: online collaborative explorative analysis on network security. In: Proceedings of the Eleventh Workshop on Visualization for Cyber Security, pp. 1\u20138. ACM (2014)","DOI":"10.1145\/2671491.2671493"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Chen, S., et al.: User behavior map: visual exploration for cyber security session data (2018)","DOI":"10.1109\/VIZSEC.2018.8709223"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-42048-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T23:02:23Z","timestamp":1740092543000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-42048-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030420475","9783030420482"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-42048-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CyberICPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cyberics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ds.unipi.gr\/cybericps2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}