{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:20:43Z","timestamp":1773325243225,"version":"3.50.1"},"reference-count":30,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018706","name":"HORIZON EUROPE Widening participation and spreading excellence","doi-asserted-by":"publisher","award":["952360"],"award-info":[{"award-number":["952360"]}],"id":[{"id":"10.13039\/100018706","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Critical Infrastructure Protection"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1016\/j.ijcip.2025.100810","type":"journal-article","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T01:01:39Z","timestamp":1760662899000},"page":"100810","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Identifying cyber attack vulnerabilities in the main lubricating oil system of marine propulsion units"],"prefix":"10.1016","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1955-6706","authenticated-orcid":false,"given":"Yigit","family":"G\u00fclmez","sequence":"first","affiliation":[]},{"given":"Olgun","family":"Konur","sequence":"additional","affiliation":[]},{"given":"Muhammed","family":"Erbas","sequence":"additional","affiliation":[]},{"given":"Sanja","family":"Bauk","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ijcip.2025.100810_bib0001","article-title":"Digital information in maritime supply chains with blockchain and cloud platforms: Supply chain capabilities, barriers, and research opportunities","volume":"173","author":"Surucu-Balci","year":"2023","journal-title":"Transp. Res. E"},{"key":"10.1016\/j.ijcip.2025.100810_bib0002","series-title":"Guidelines on Cyber Security Onboard Ships, Version 4","year":"2021"},{"key":"10.1016\/j.ijcip.2025.100810_bib0003","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.ress.2017.01.020","article-title":"Safety margin sensitivity analysis for model selection in nuclear power plant probabilistic safety assessment","volume":"162","author":"Di Maio","year":"2017","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.ijcip.2025.100810_bib0004","series-title":"Cybersecurity considerations in autonomous ships","author":"Cho","year":"2022"},{"key":"10.1016\/j.ijcip.2025.100810_bib0005","series-title":"An operational approach to maritime cyber resilience","author":"Erstad","year":"2021"},{"key":"10.1016\/j.ijcip.2025.100810_bib0006","doi-asserted-by":"crossref","DOI":"10.1016\/j.ssci.2020.104908","article-title":"A novel cyber-risk assessment method for ship systems","volume":"131","author":"Bolbot","year":"2020","journal-title":"Saf. Sci."},{"key":"10.1016\/j.ijcip.2025.100810_bib0007","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.csi.2017.09.006","article-title":"Cyber-attack path discovery in a dynamic supply chain maritime risk management system","volume":"56","author":"Polatidis","year":"2018","journal-title":"Comput. Stand. Interfaces."},{"issue":"2","key":"10.1016\/j.ijcip.2025.100810_bib0008","first-page":"261","article-title":"Cyber threats for present and future commercial shipping","volume":"17","author":"Pawelski","year":"2023","journal-title":"TransNav Int. J. Mar. Navig. Saf. Sea Transp."},{"key":"10.1016\/j.ijcip.2025.100810_bib0009","series-title":"10th Workshop on Modelling and Simulation of Cyber-Physical Energy Systems, MSCPES 2022s","article-title":"Quantitative risk assessment of cyber attacks on cyber-physical systems using attack graphs","author":"Semertzis","year":"2022"},{"issue":"3","key":"10.1016\/j.ijcip.2025.100810_bib0010","article-title":"Quantitative evaluation of cyber-attacks on a hypothetical school computer network","volume":"10","author":"Akinola","year":"2019","journal-title":"J. Inf. Secur."},{"key":"10.1016\/j.ijcip.2025.100810_bib0011","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.ress.2018.03.005","article-title":"A Monte Carlo-based exploration framework for identifying components vulnerable to cyber threats in nuclear power plants","volume":"175","author":"Wang","year":"2018","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.ijcip.2025.100810_bib0012","series-title":"Business Modeling and Software Design","first-page":"356","article-title":"Failure and change impact analysis for safety-critical systems","author":"Lohm\u00fcller","year":"2019"},{"key":"10.1016\/j.ijcip.2025.100810_bib0013","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/s11219-015-9302-6","article-title":"Quantitative risk analysis of safety\u2013critical embedded systems","volume":"25","author":"Liu","year":"2017","journal-title":"Softw. Qual. J."},{"key":"10.1016\/j.ijcip.2025.100810_bib0014","series-title":"2018 Annual Reliability and Maintainability Symposium (RAMS)","article-title":"A comparative safety assessment approach for safety critical systems","author":"Guo","year":"2018"},{"key":"10.1016\/j.ijcip.2025.100810_bib0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijcip.2024.100675","article-title":"Hardware-in-loop (HIL) testbed design of thermal power plant for threat modeling and attack vector analysis","volume":"45","author":"Mathew","year":"2024","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"8","key":"10.1016\/j.ijcip.2025.100810_bib0016","doi-asserted-by":"crossref","first-page":"76","DOI":"10.3390\/fi10080076","article-title":"SCADA system testbed for cybersecurity research using machine learning approach","volume":"10","author":"Teixeira","year":"2018","journal-title":"Future Internet."},{"key":"10.1016\/j.ijcip.2025.100810_bib0017","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.ijepes.2017.01.016","article-title":"Real-time cyber physical system testbed for power system security and control","volume":"90","author":"Poudel","year":"2017","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"10.1016\/j.ijcip.2025.100810_bib0018","series-title":"Experimental Impact Analysis of Cyberattacks in Power Systems using Digital Real-Time Testbeds","author":"Katuri","year":"2023"},{"key":"10.1016\/j.ijcip.2025.100810_bib0019","doi-asserted-by":"crossref","first-page":"8745","DOI":"10.3390\/s22228745","article-title":"Assessing Cyber risks of an INS using the MITRE ATT&CK framework","volume":"22","author":"Oruc","year":"2022","journal-title":"Sensors"},{"issue":"1","key":"10.1016\/j.ijcip.2025.100810_bib0020","doi-asserted-by":"crossref","DOI":"10.7225\/toms.v13.n01.w20","article-title":"Classification of cyber risks for sea vessel\u2019s voyage cycle","volume":"13","author":"Shumilova","year":"2024","journal-title":"Trans. Marit. Sci."},{"issue":"1","key":"10.1016\/j.ijcip.2025.100810_bib0021","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1017\/S0373463322000595","article-title":"Cybersecurity risk assessment of VDR","volume":"76","author":"S\u00f6ner","year":"2023","journal-title":"J. Navig."},{"issue":"1","key":"10.1016\/j.ijcip.2025.100810_bib0022","doi-asserted-by":"crossref","first-page":"20","DOI":"10.7225\/toms.v13.n01.w09","article-title":"ECDIS cyber security dynamics analysis based on the Fuzzy-FUCOM Method","volume":"13","author":"Kayi\u015fo\u011flu","year":"2024","journal-title":"Trans. Marit. Sci."},{"issue":"6","key":"10.1016\/j.ijcip.2025.100810_bib0023","first-page":"1006","article-title":"Simulating a cyber-attack on the mass thruster controller at low-speed motion","volume":"36","author":"Astrov","year":"2024","journal-title":"Promet \u2013 Traffic Transp."},{"issue":"1","key":"10.1016\/j.ijcip.2025.100810_bib0024","first-page":"115","article-title":"Cyber risk assessment for ships (CRASH). TransNav","volume":"18","author":"Oruc","year":"2024","journal-title":"Int. J. Mar. Navig. Saf. Sea Transp."},{"key":"10.1016\/j.ijcip.2025.100810_bib0025","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s13437-019-00162-2","article-title":"MaCRA: a model-based framework for maritime cyber-risk assessment","volume":"18","author":"Tam","year":"2019","journal-title":"WMU J. Marit. Aff."},{"key":"10.1016\/j.ijcip.2025.100810_bib0026","series-title":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","first-page":"1","article-title":"Cyber-Risk Assessment for Autonomous Ships","author":"Tam","year":"2018"},{"key":"10.1016\/j.ijcip.2025.100810_bib0027","article-title":"Physics-aware targeted attacks against maritime industrial control systems","volume":"82","author":"Longo","year":"2024","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.ijcip.2025.100810_bib0028","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.marstruc.2015.12.003","article-title":"Design safety margin of a 10,000 TEU container ship through ultimate hull girder load combination analysis","volume":"46","author":"Mohammed","year":"2016","journal-title":"Mar. Struct."},{"key":"10.1016\/j.ijcip.2025.100810_bib0029","doi-asserted-by":"crossref","DOI":"10.1016\/j.nucengdes.2021.111514","article-title":"An advanced probability safety margin analysis approach combined deterministic and probabilistic safety assessment","volume":"385","author":"Sun","year":"2021","journal-title":"Nucl. Eng. Des."},{"key":"10.1016\/j.ijcip.2025.100810_bib0030","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.ress.2015.08.016","article-title":"A dynamic probabilistic safety margin characterization approach in support of Integrated Deterministic and Probabilistic","volume":"145","author":"Di Maio","year":"2016","journal-title":"Saf. Anal., Reliab. Eng. Syst. Saf."}],"container-title":["International Journal of Critical Infrastructure Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S187454822500071X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S187454822500071X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:06:21Z","timestamp":1773273981000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S187454822500071X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":30,"alternative-id":["S187454822500071X"],"URL":"https:\/\/doi.org\/10.1016\/j.ijcip.2025.100810","relation":{},"ISSN":["1874-5482"],"issn-type":[{"value":"1874-5482","type":"print"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Identifying cyber attack vulnerabilities in the main lubricating oil system of marine propulsion units","name":"articletitle","label":"Article Title"},{"value":"International Journal of Critical Infrastructure Protection","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ijcip.2025.100810","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"100810"}}