{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T01:00:31Z","timestamp":1760576431906,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":45,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531813","type":"print"},{"value":"9789819531820","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3182-0_11","type":"book-chapter","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:18:14Z","timestamp":1760555894000},"page":"176-195","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Blockchain-Enabled Cybersecurity Risk Assessment for\u00a0Cyber-Ship Systems"],"prefix":"10.1007","author":[{"given":"Md Amin","family":"Azad","sequence":"first","affiliation":[]},{"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"11_CR1","unstructured":"Tradelens blockchain-enabled digital shipping platform continues expansion with addition of major ocean carriers hapag-lloyd and ocean network express (2019). https:\/\/www.maersk.com\/news\/articles\/2019\/07\/02\/hapag-lloyd-and-ocean-network-express-join-tradelens. Accessed 27 Dec 2024"},{"key":"11_CR2","unstructured":"Cybersecurity framework 2.0. NIST Cybersecurity Publications (2022). https:\/\/nvlpubs.nist.gov\/nistpubs\/CSWP\/NIST.CSWP.29.pdf. Accessed 01 Feb 2025"},{"key":"11_CR3","unstructured":"Admiral, M.C.: Cybersecurity incident report: Maritime industry trends 2017-2023. Maritime Cybersecur. Bull. (2023)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Bir\u00f3, V., Chiu, W., Meng, W.: Securing IoT firmware dispatch systems with blockchain. In: IEEE International Conference on Blockchain, Blockchain 2023, Danzhou, China, 17\u201321 December 2023, pp. 229\u2013238. IEEE (2023)","DOI":"10.1109\/Blockchain60715.2023.00046"},{"key":"11_CR5","first-page":"103466","volume":"74","author":"Y Chang","year":"2023","unstructured":"Chang, Y., Li, J., Li, W.: 2D2PS: a demand-driven privacy-preserving scheme for anonymous data sharing in smart grids. J. Inf. Secur. Appl. 74, 103466 (2023)","journal-title":"J. Inf. Secur. Appl."},{"issue":"5","key":"11_CR6","doi-asserted-by":"publisher","first-page":"4773","DOI":"10.1109\/JIOT.2024.3492074","volume":"12","author":"X Chen","year":"2025","unstructured":"Chen, X., Meng, W., Huang, H.: Blockchain-driven distributed edge intelligence for enhanced internet of vehicles. IEEE Internet Things J. 12(5), 4773\u20134782 (2025)","journal-title":"IEEE Internet Things J."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Chiu, W., Meng, W., Ge, C.: NoSneaky: a blockchain-based execution integrity protection scheme in industry 4.0. IEEE Trans. Ind. Inform. 19(7), 7957\u20137965 (2023)","DOI":"10.1109\/TII.2022.3215606"},{"key":"11_CR8","unstructured":"Co., M..: The rise of smart ports and IoT-enabled maritime infrastructure. McKinsey Insights (2021)"},{"key":"11_CR9","unstructured":"Committee, I.: Information security management systems (ISMS) for maritime operations. ISO Publications (2022)"},{"key":"11_CR10","unstructured":"Force, N.M.C.T.: Risk assessment of autonomous and AI-driven shipping systems. NATO Cybersecurity Reports (2022)"},{"key":"11_CR11","unstructured":"GL, D.: Blockchain for maritime cybersecurity: risk management and implementation. DNV Maritime Cybersecurity Research (2022)"},{"key":"11_CR12","doi-asserted-by":"publisher","unstructured":"Gleerup, T., Li, W., Tan, J., Wang, Y.: ZoomPass: a zoom-based android unlock scheme on smart devices. In: Su, C., Sakurai, K., Liu, F. (eds.) SciSec 2022. LNCS, vol. 13580, pp. 245\u2013259. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17551-0_16","DOI":"10.1007\/978-3-031-17551-0_16"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"103264","DOI":"10.1016\/j.sysarc.2024.103264","volume":"155","author":"Y Han","year":"2024","unstructured":"Han, Y., Han, J., Meng, W., Lai, J., Wu, G.: Blockchain-based privacy-preserving public key searchable encryption with strong traceability. J. Syst. Archit. 155, 103264 (2024)","journal-title":"J. Syst. Archit."},{"issue":"2","key":"11_CR14","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/TSC.2025.3539202","volume":"18","author":"K Hayawi","year":"2025","unstructured":"Hayawi, K., Makhdoom, I., Khalid, S., Ikuesan, R.A., Kaosar, M., Ahmad, I.: A false positive resilient distributed trust management framework for collaborative intrusion detection systems. IEEE Trans. Serv. Comput. 18(2), 513\u2013526 (2025)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Holtgrave, J., et al.: Attributing open-source contributions is critical but difficult: a systematic analysis of github practices and their impact on software supply chain security. In: 32nd Annual Network and Distributed System Security Symposium, NDSS 2025, San Diego, California, USA, 24\u201328 February 2025. The Internet Society (2025)","DOI":"10.14722\/ndss.2025.240613"},{"key":"11_CR16","unstructured":"(IMO), I.M.O.: Guidelines on maritime cyber risk management (msc-fal.1\/circ.3). IMO Regulatory Guidelines (2021)"},{"key":"11_CR17","unstructured":"(IMO), I.M.O.: Guidelines on maritime cyber risk management (msc-fal.1\/circ.3\/rev.2). Technical report, International Maritime Organization (2021). https:\/\/www.imo.org\/en\/OurWork\/Security\/Pages\/Cyber-security.aspx"},{"key":"11_CR18","unstructured":"(IMO), I.M.O.: Cyber risk management in maritime industry. IMO Reports (2022)"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"104316","DOI":"10.1016\/j.cose.2025.104316","volume":"151","author":"YB Kurt","year":"2025","unstructured":"Kurt, Y.B., Uflaz, E., Akyuz, E., Kurt, R.E., Turan, O.: Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach. Comput. Secur. 151, 104316 (2025)","journal-title":"Comput. Secur."},{"issue":"1","key":"11_CR20","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/TDSC.2024.3392299","volume":"22","author":"J Li","year":"2025","unstructured":"Li, J., Su, Y., Lu, R., Su, Z., Meng, W., Shen, M.: StealthPath: privacy-preserving path validation in the data plane of path-aware networks. IEEE Trans. Dependable Secur. Comput. 22(1), 192\u2013204 (2025)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"13","key":"11_CR21","doi-asserted-by":"publisher","first-page":"11326","DOI":"10.1109\/JIOT.2023.3242464","volume":"10","author":"W Li","year":"2023","unstructured":"Li, W., Meng, W., Yeh, K., Cha, S.: Trusting computing as a service for blockchain applications. IEEE Internet Things J. 10(13), 11326\u201311342 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"11_CR22","doi-asserted-by":"publisher","first-page":"3985","DOI":"10.1109\/TCE.2023.3280064","volume":"70","author":"W Li","year":"2024","unstructured":"Li, W., Gleerup, T., Tan, J., Wang, Y.: A security enhanced android unlock scheme based on pinch-to-zoom for smart devices. IEEE Trans. Consumer Electron. 70(1), 3985\u20133993 (2024)","journal-title":"IEEE Trans. Consumer Electron."},{"issue":"4","key":"11_CR23","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/MNET.013.2100768","volume":"36","author":"W Li","year":"2022","unstructured":"Li, W., Meng, W.: BCTrustFrame: enhancing trust management via blockchain and IPFS in 6G era. IEEE Netw. 36(4), 120\u2013125 (2022)","journal-title":"IEEE Netw."},{"key":"11_CR24","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.patrec.2021.01.019","volume":"144","author":"W Li","year":"2021","unstructured":"Li, W., Meng, W., Furnell, S.: Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities. Pattern Recognit. Lett. 144, 35\u201341 (2021)","journal-title":"Pattern Recognit. Lett."},{"issue":"1","key":"11_CR25","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/COMST.2021.3139052","volume":"24","author":"W Li","year":"2022","unstructured":"Li, W., Meng, W., Kwok, L.F.: Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions. IEEE Commun. Surv. Tutor. 24(1), 280\u2013305 (2022)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Li, W., Meng, W., Parra-Arnau, J., Choo, K.R.: Enhancing challenge-based collaborative intrusion detection against insider attacks using spatial correlation. In: IEEE Conference on Dependable and Secure Computing, DSC 2021, Aizuwakamatsu, Japan, 30 January\u20132 February 2021, pp.\u00a01\u20138. IEEE (2021)","DOI":"10.1109\/DSC49826.2021.9346232"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Li, W., Meng, W., Yang, L.T.: Enhancing trust-based medical smartphone networks via blockchain-based traffic sampling. In: 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 122\u2013129. IEEE (2021)","DOI":"10.1109\/TrustCom53373.2021.00034"},{"key":"11_CR28","doi-asserted-by":"publisher","first-page":"103204","DOI":"10.1016\/j.cose.2023.103204","volume":"129","author":"W Li","year":"2023","unstructured":"Li, W., Tan, J., Zhu, N.: Design of double-cross-based smartphone unlock mechanism. Comput. Secur. 129, 103204 (2023)","journal-title":"Comput. Secur."},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Li, W., Wang, Y., Meng, W., Li, J., Su, C.: BlockCSDN: towards blockchain-based collaborative intrusion detection in software defined networking. IEICE Trans. Inf. Syst. 105-D(2), 272\u2013279 (2022)","DOI":"10.1587\/transinf.2021BCP0013"},{"key":"11_CR30","doi-asserted-by":"publisher","unstructured":"Li, Y., Zhang, J., Zhu, J., Li, W.: HBMD-FL: heterogeneous federated learning algorithm based on blockchain and model distillation. In: Chen, J., He, D., Lu, R. (eds.) EISA 2022. CCIS, vol.\u00a01641, pp. 145\u2013159. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-23098-1_9","DOI":"10.1007\/978-3-031-23098-1_9"},{"issue":"21","key":"11_CR31","doi-asserted-by":"publisher","first-page":"12901","DOI":"10.1007\/s00521-024-09715-w","volume":"36","author":"Y Li","year":"2024","unstructured":"Li, Y., Zhang, J., Zhu, J., Li, W.: BlocKFD: blockchain-based federated distillation against poisoning attacks. Neural Comput. Appl. 36(21), 12901\u201312916 (2024)","journal-title":"Neural Comput. Appl."},{"issue":"2","key":"11_CR32","doi-asserted-by":"publisher","first-page":"1856","DOI":"10.1109\/JIOT.2024.3465891","volume":"12","author":"W Meng","year":"2025","unstructured":"Meng, W., Li, W., Calugar, A.N.: BANN-TMGuard: toward touch-movement-based screen unlock patterns via blockchain-enabled artificial neural networks on iot devices. IEEE Internet Things J. 12(2), 1856\u20131866 (2025)","journal-title":"IEEE Internet Things J."},{"key":"11_CR33","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.inffus.2020.12.006","volume":"70","author":"W Meng","year":"2021","unstructured":"Meng, W., Li, W., Zhou, J.: Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration. Inf. Fusion 70, 60\u201371 (2021)","journal-title":"Inf. Fusion"},{"issue":"12","key":"11_CR34","doi-asserted-by":"publisher","first-page":"20473","DOI":"10.1109\/JIOT.2025.3547816","volume":"12","author":"X Qin","year":"2025","unstructured":"Qin, X., Li, W., Rosenberg, P.: RoundImage: toward secure graphical password authentication via rounded image selection in IoT. IEEE Internet Things J. 12(12), 20473\u201320483 (2025)","journal-title":"IEEE Internet Things J."},{"key":"11_CR35","doi-asserted-by":"publisher","first-page":"103179","DOI":"10.1016\/j.cose.2023.103179","volume":"128","author":"R Sahay","year":"2023","unstructured":"Sahay, R., Estay, D.A.S., Meng, W., Jensen, C.D., Barfod, M.B.: A comparative risk analysis on cybership system with STPA-sec. STRIDE and CORAS. Comput. Secur. 128, 103179 (2023)","journal-title":"STRIDE and CORAS. Comput. Secur."},{"key":"11_CR36","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1016\/j.future.2019.05.049","volume":"100","author":"R Sahay","year":"2019","unstructured":"Sahay, R., Meng, W., Estay, D.A.S., Jensen, C.D., Barfod, M.B.: Cybership-IoT: a dynamic and adaptive SDN-based security policy enforcement framework for ships. Future Gener. Comput. Syst. 100, 736\u2013750 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"11_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-030-03026-1_14","volume-title":"Science of Cyber Security","author":"R Sahay","year":"2018","unstructured":"Sahay, R., Sepulveda, D.A., Meng, W., Jensen, C.D., Barfod, M.B.: CyberShip: an SDN-based autonomic attack mitigation framework for ship systems. In: Liu, F., Xu, S., Yung, M. (eds.) SciSec 2018. LNCS, vol. 11287, pp. 191\u2013198. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03026-1_14"},{"issue":"1","key":"11_CR38","first-page":"250","volume":"12","author":"D She","year":"2025","unstructured":"She, D., Wang, W., Yin, Z., Wang, J., Shan, H.: GPS spoofing attack recognition for UAVs with limited samples. IEEE Internet Things J. 12(1), 250\u2013261 (2025)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"11_CR39","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.dcan.2020.10.002","volume":"7","author":"N Shi","year":"2021","unstructured":"Shi, N., Tan, L., Li, W., Qi, X., Yu, K.: A blockchain-empowered AAA scheme in the large-scale HetNet. Digit. Commun. Networks 7(3), 308\u2013316 (2021)","journal-title":"Digit. Commun. Networks"},{"issue":"6","key":"11_CR40","first-page":"62","volume":"68","author":"AK Sood","year":"2025","unstructured":"Sood, A.K., Zeadally, S.: Malicious AI models undermine software supply-chain security. Commun. ACM 68(6), 62\u201371 (2025)","journal-title":"Commun. ACM"},{"key":"11_CR41","unstructured":"Sotiria, G.: Cyber-physical systems in maritime operations. Maritime Cybersecur. J. (2022)"},{"key":"11_CR42","doi-asserted-by":"crossref","unstructured":"Tan, L., Xiao, H., Shang, X., Wang, Y., Ding, F., Li, W.: A blockchain-based trusted service mechanism for crowdsourcing system. In: 91st IEEE Vehicular Technology Conference, VTC Spring 2020, Antwerp, Belgium, 25\u201328 May 2020, pp.\u00a01\u20136. IEEE (2020)","DOI":"10.1109\/VTC2020-Spring48590.2020.9128425"},{"key":"11_CR43","doi-asserted-by":"publisher","first-page":"104015","DOI":"10.1016\/j.cose.2024.104015","volume":"145","author":"U Tatar","year":"2024","unstructured":"Tatar, U., Karabacak, B., Keskin, O.F., Foti, D.P.: Charting new waters with CRAMMTS: a survey-driven cybersecurity risk analysis method for maritime stakeholders. Comput. Secur. 145, 104015 (2024)","journal-title":"Comput. Secur."},{"key":"11_CR44","doi-asserted-by":"crossref","unstructured":"Tusk\u00f3, G., Meng, W., Lampe, B.: Look closer to touch behavior-enabled android pattern locks: a study in the wild. In: 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1196\u20131205. IEEE (2023)","DOI":"10.1109\/TrustCom60117.2023.00163"},{"key":"11_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-981-97-2458-1_9","volume-title":"Machine Learning for Cyber Security","author":"B Xue","year":"2023","unstructured":"Xue, B., Zhang, J., Chen, B., Li, W.: Tackling non-IID for federated learning with components alignment. In: Kim, D.D., Chen, C. (eds.) ML4CS 2023. LNCS, vol. 14541, pp. 131\u2013144. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-981-97-2458-1_9"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3182-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:18:20Z","timestamp":1760555900000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3182-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9789819531813","9789819531820"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3182-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}