{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:56:12Z","timestamp":1774162572803,"version":"3.50.1"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031083327","type":"print"},{"value":"9783031083334","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08333-4_12","type":"book-chapter","created":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T15:52:13Z","timestamp":1655394733000},"page":"145-156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Semantic Modeling and Simulation of Cybersecurity on the Internet of Underwater Things"],"prefix":"10.1007","author":[{"given":"Stavros","family":"Stavrinos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7838-9691","authenticated-orcid":false,"given":"Konstantinos","family":"Kotis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8844-2596","authenticated-orcid":false,"given":"Christos","family":"Kalloniatis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,10]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1007\/978-3-030-22277-2_39","volume-title":"Handbook of Computer Networks and Cyber Security","author":"P Aggarwal","year":"2020","unstructured":"Aggarwal, P., Gonzalez, C., Dutt, V.: HackIt: a real-time simulation tool for studying real-world cyberattacks in the laboratory. In: Gupta, B.B., Perez, G.M., Agrawal, D.P., Gupta, D. (eds.) Handbook of Computer Networks and Cyber Security, pp. 949\u2013959. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-22277-2_39"},{"key":"12_CR2","doi-asserted-by":"publisher","unstructured":"Ahmad, I., et al.: Analysis of security attacks and taxonomy in underwater wireless sensor networks. Wirel. Commun. Mob. Comput. 2021 (2021). https:\/\/doi.org\/10.1155\/2021\/1444024","DOI":"10.1155\/2021\/1444024"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"57144","DOI":"10.1109\/ACCESS.2018.2872775","volume":"6","author":"G Bagyalakshmi","year":"2018","unstructured":"Bagyalakshmi, G., et al.: Network vulnerability analysis on brain signal\/image databases using Nmap and Wireshark tools. IEEE Access 6, 57144\u201357151 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2872775","journal-title":"IEEE Access"},{"key":"12_CR4","doi-asserted-by":"publisher","unstructured":"Barbie, A., et al.: Developing an underwater network of ocean observation systems with digital twin prototypes - a field report from Baltic sea. IEEE Internet Comput. (2021). https:\/\/doi.org\/10.1109\/MIC.2021.3065245","DOI":"10.1109\/MIC.2021.3065245"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"102304","DOI":"10.1016\/j.simpat.2021.102304","volume":"109","author":"K Bhattacharjya","year":"2021","unstructured":"Bhattacharjya, K., De, D.: IoUT: modelling and simulation of edge-drone-based software-defined smart internet of underwater things. Simul. Model. Pract. Theory 109, 102304 (2021). https:\/\/doi.org\/10.1016\/j.simpat.2021.102304","journal-title":"Simul. Model. Pract. Theory"},{"key":"12_CR6","unstructured":"Bouter, C., Kruiger, H., Verhoosel, J.: Domain-Independent Data Processing in an Ontology Based Data Access Environment Using the SOSA Ontology (2021). http:\/\/ceur-ws.org"},{"key":"12_CR7","unstructured":"Caldera Description page. https:\/\/www.pwc.co.uk\/issues\/imitation-game-attacker-emulation.html. Accessed 06 Mar 2022"},{"issue":"17","key":"12_CR8","doi-asserted-by":"publisher","first-page":"3526","DOI":"10.3390\/app9173526","volume":"9","author":"D Centelles","year":"2019","unstructured":"Centelles, D., Soriano-Asensi, A., Mart\u00ed, J.V., Mar\u00edn, R., Sanz, P.J.: Underwater wireless communications for cooperative robotics with UWSim-NET. Appl. Sci. 9(17), 3526 (2019). https:\/\/doi.org\/10.3390\/app9173526","journal-title":"Appl. Sci."},{"key":"12_CR9","unstructured":"Chhokra, A., Barreto, C., Dubey, A., Karsai, G., Koutsoukos, X.: Power-attack: a comprehensive tool-chain for modeling and simulating attacks in power systems (n.d.)"},{"issue":"4","key":"12_CR10","doi-asserted-by":"publisher","first-page":"125","DOI":"10.3390\/robotics10040125","volume":"10","author":"MA Cornejo-Lupa","year":"2021","unstructured":"Cornejo-Lupa, M.A., Cardinale, Y., Ticona-Herrera, R., Barrios-Aranibar, D., Andrade, M., Diaz-Amado, J.: OntoSLAM: an ontology for representing location and simultaneous mapping information for autonomous robots. Robotics 10(4), 125 (2021). https:\/\/doi.org\/10.3390\/robotics10040125","journal-title":"Robotics"},{"issue":"6","key":"12_CR11","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1016\/j.jnca.2012.07.012","volume":"35","author":"MC Domingo","year":"2012","unstructured":"Domingo, M.C.: An overview of the internet of underwater things. J. Netw. Comput. Appl. 35(6), 1879\u20131890 (2012). https:\/\/doi.org\/10.1016\/j.jnca.2012.07.012","journal-title":"J. Netw. Comput. Appl."},{"issue":"18","key":"12_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s20185393","volume":"20","author":"S Fattah","year":"2020","unstructured":"Fattah, S., Gani, A., Ahmedy, I., Idris, M.Y.I., Hashem, I.A.T.: A survey on underwater wireless sensor networks: requirements, taxonomy, recent advances, and open research challenges. Sensors 20(18), 1\u201330 (2020). https:\/\/doi.org\/10.3390\/s20185393","journal-title":"Sensors"},{"key":"12_CR13","unstructured":"Gazebo Github page. https:\/\/github.com\/osrf\/gazebo. Accessed 06 Mar 2022"},{"key":"12_CR14","unstructured":"Gazebo Homepage. http:\/\/gazebosim.org\/. Accessed 06 Mar 2022"},{"key":"12_CR15","unstructured":"Infection Monkey. https:\/\/github.com\/guardicore\/monkey. Accessed 06 Mar 2022"},{"key":"12_CR16","doi-asserted-by":"publisher","unstructured":"Braga, J., Martins, R., Petrioli, C., Petroccia, R., Picari, L.: Cooperation and networking in an underwater network composed by heterogeneous assets. In: OCEANS 2016 MTS\/IEEE Monterey, pp. 1\u20139 (2016). https:\/\/doi.org\/10.1109\/OCEANS.2016.7761219","DOI":"10.1109\/OCEANS.2016.7761219"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.websem.2018.06.003","volume":"56","author":"K Janowicz","year":"2019","unstructured":"Janowicz, K., Haller, A., Cox, S.J.D., le Phuoc, D., Lefran\u00e7ois, M.: SOSA: a lightweight ontology for sensors, observations, samples, and actuators. J. Web Semant. 56, 1\u201310 (2019). https:\/\/doi.org\/10.1016\/j.websem.2018.06.003","journal-title":"J. Web Semant."},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"102174","DOI":"10.1016\/j.rcim.2021.102174","volume":"71","author":"W Jurasky","year":"2021","unstructured":"Jurasky, W., Moder, P., Milde, M., Ehm, H., Reinhart, G.: Transformation of semantic knowledge into simulation-based decision support. Robot. Comput.-Integr. Manuf. 71, 102174 (2021). https:\/\/doi.org\/10.1016\/j.rcim.2021.102174","journal-title":"Robot. Comput.-Integr. Manuf."},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1016\/j.procs.2021.08.085","volume":"192","author":"F Kamoun-Abid","year":"2021","unstructured":"Kamoun-Abid, F., Rekik, M., Meddeb-Makhlouf, A., Zarai, F.: Secure architecture for Cloud\/Fog computing based on firewalls and controllers. Procedia Comput. Sci. 192, 822\u2013833 (2021). https:\/\/doi.org\/10.1016\/j.procs.2021.08.085","journal-title":"Procedia Comput. Sci."},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"108629","DOI":"10.1016\/j.oceaneng.2021.108629","volume":"223","author":"DT Kutzke","year":"2021","unstructured":"Kutzke, D.T., Carter, J.B., Hartman, B.T.: Subsystem selection for digital twin development: a case study on an unmanned underwater vehicle. Ocean Eng. 223, 108629 (2021). https:\/\/doi.org\/10.1016\/j.oceaneng.2021.108629","journal-title":"Ocean Eng."},{"key":"12_CR21","unstructured":"LHN Infection Monkey page. https:\/\/latesthackingnews.com\/2022\/02\/24\/__trashed-4\/. Accessed 06 Mar 2022"},{"key":"12_CR22","unstructured":"LinkedIn page. https:\/\/www.linkedin.com\/pulse\/auv-deepwater-search-rescue-arnt-helge-olsen\/. Accessed 06 Mar 2022"},{"issue":"2","key":"12_CR23","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1177\/1548512916628335","volume":"16","author":"BB Madan","year":"2019","unstructured":"Madan, B.B., Banik, M., Bein, D.: Securing unmanned autonomous systems from cyber threats. J. Defense Model. Simul. 16(2), 119\u2013136 (2019). https:\/\/doi.org\/10.1177\/1548512916628335","journal-title":"J. Defense Model. Simul."},{"issue":"24","key":"12_CR24","doi-asserted-by":"publisher","first-page":"8262","DOI":"10.3390\/s21248262","volume":"21","author":"DRK Mary","year":"2021","unstructured":"Mary, D.R.K., Ko, E., Kim, S.-G., Yum, S.-H., Shin, S.-Y., Park, S.-H.: A systematic review on recent trends, challenges, privacy and security issues of underwater internet of things. Sensors 21(24), 8262 (2021). https:\/\/doi.org\/10.3390\/s21248262","journal-title":"Sensors"},{"key":"12_CR25","doi-asserted-by":"publisher","unstructured":"Menaka, D., Gauni, S., Manimegalai, C.T., Kalimuthu, K.: Vision of IoUT: advances and future trends in optical wireless communication. J. Opt. 50 (n.d.). https:\/\/doi.org\/10.1007\/s12596","DOI":"10.1007\/s12596"},{"issue":"5","key":"12_CR26","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1109\/TKDE.2010.46","volume":"23","author":"E Miguel\u00e1\u00f1ez","year":"2011","unstructured":"Miguel\u00e1\u00f1ez, E., Patr\u00f3n, P., Brown, K.E., Petillot, Y.R., Lane, D.M.: Semantic knowledge-based framework to improve the situation awareness of autonomous underwater vehicles. IEEE Trans. Knowl. Data Eng. 23(5), 759\u2013773 (2011). https:\/\/doi.org\/10.1109\/TKDE.2010.46","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"12_CR27","unstructured":"MITRE ATT&CK Description page for Caldera. https:\/\/www.mitre.org\/research\/technology-transfer\/open-source-software\/caldera%E2%84%A2. Accessed 06 Mar 2022"},{"key":"12_CR28","unstructured":"MITRE ATT&CK Homepage. https:\/\/attack.mitre.org\/. Accessed 06 Mar 2022"},{"key":"12_CR29","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-981-13-2324-9_17","volume-title":"International Conference on Innovative Computing and Communications","author":"A Nayyar","year":"2019","unstructured":"Nayyar, A., Balas, V.E.: Analysis of simulation tools for underwater sensor networks (UWSNs). In: Bhattacharyya, S., Hassanien, A.E., Gupta, D., Khanna, A., Pan, I. (eds.) International Conference on Innovative Computing and Communications. LNNS, vol. 55, pp. 165\u2013180. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-2324-9_17"},{"key":"12_CR30","unstructured":"NS-3 Introduction page. https:\/\/www.nsnam.org\/docs\/release\/3.21\/tutorial\/ html\/introduction.html. Accessed 06 Mar 2022"},{"key":"12_CR31","unstructured":"Oceanic Engineering Society (U.S.): Autonomous Underwater Vehicles 2016: AUV 2016: 6\u20139 November 2016, IIS, the University of Tokyo, Tokyo, Japan (n.d.)"},{"key":"12_CR32","doi-asserted-by":"publisher","unstructured":"Potter, J., Alves, J., Green, D., Zappa, G., McCoy, K., Nissen, I.: The JANUS underwater communications standard. In: 2014 Underwater Communications and Networking, UComms 2014 (2014). https:\/\/doi.org\/10.1109\/UComms.2014.7017134","DOI":"10.1109\/UComms.2014.7017134"},{"key":"12_CR33","doi-asserted-by":"publisher","unstructured":"Prats, M., Perez, J., Fernandez, J.J., Sanz, P.J.: An open-source tool for simulation and supervision of underwater intervention missions. In: IEEE International Conference on Intelligent Robots and Systems, pp. 2577\u20132582 (2012). https:\/\/doi.org\/10.1109\/IROS.2012.6385788","DOI":"10.1109\/IROS.2012.6385788"},{"key":"12_CR34","unstructured":"Public Affairs Office: NATO STO-CMRE Science and Technology Organization Centre for Maritime Research and Experimentation (2020)"},{"issue":"6","key":"12_CR35","doi-asserted-by":"publisher","first-page":"103334","DOI":"10.1016\/j.im.2020.103334","volume":"57","author":"R Syed","year":"2020","unstructured":"Syed, R.: Cybersecurity vulnerability management: a conceptual ontology and cyber intelligence alert system. Inf. Manag. 57(6), 103334 (2020). https:\/\/doi.org\/10.1016\/j.im.2020.103334","journal-title":"Inf. Manag."},{"key":"12_CR36","unstructured":"Syed, Z., Padia, A., Finin, T., Mathews, L., Joshi, A.: UCO: A Unified Cybersecurity Ontology (n.d.). http:\/\/tinyurl.com\/ptqkzpq"},{"key":"12_CR37","doi-asserted-by":"publisher","unstructured":"Velu, A., Thangavelu, M.: Ontology based ocean knowledge representation for semantic information retrieval. Comput. Mater. Contin. 70(3), 4707\u20134724 (2022). https:\/\/doi.org\/10.32604\/cmc.2022.020095","DOI":"10.32604\/cmc.2022.020095"},{"key":"12_CR38","unstructured":"Wikipedia page. https:\/\/en.wikipedia.org\/wiki\/Air_France_Flight_447#Underwater_search. Accessed 06 Mar 2022"},{"key":"12_CR39","unstructured":"Wikipedia page for ARP spoofing. https:\/\/en.wikipedia.org\/wiki\/ARP_spoofing. Accessed 06 Mar 2022"},{"key":"12_CR40","unstructured":"Wireshark Home page. https:\/\/www.wireshark.org\/docs\/. Accessed 06 Mar 2022"},{"key":"12_CR41","doi-asserted-by":"publisher","unstructured":"Wu, J., Yang, Y., Cheng, X.U.N., Zuo, H., Cheng, Z.: The development of digital twin technology review. In: Proceedings - 2020 Chinese Automation Congress, CAC 2020, pp. 4901\u20134906 (2020). https:\/\/doi.org\/10.1109\/CAC51589.2020.9327756.","DOI":"10.1109\/CAC51589.2020.9327756"},{"issue":"4","key":"12_CR42","doi-asserted-by":"publisher","first-page":"741","DOI":"10.3390\/iot2040037","volume":"2","author":"K Zachila","year":"2021","unstructured":"Zachila, K., Kotis, K., Paparidis, E., Ladikou, S., Spiliotopoulos, D.: Facilitating semantic interoperability of trustworthy IoT entities in cultural spaces: the smart museum ontology. IoT 2(4), 741\u2013760 (2021). https:\/\/doi.org\/10.3390\/iot2040037","journal-title":"IoT"},{"key":"12_CR43","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Wang, Y., Zhang, H., Zhang, C., Yang, C.: Agent-based Network Security Simulator Nessi2 (2015)","DOI":"10.2991\/icmmita-15.2015.302"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08333-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T16:02:52Z","timestamp":1655395372000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08333-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031083327","9783031083334"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08333-4_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Artificial Intelligence Applications and Innovations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hersonissos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aiai2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifipaiai.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}