{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T23:10:20Z","timestamp":1773961820320,"version":"3.50.1"},"reference-count":77,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2026.3673557","type":"journal-article","created":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:38:29Z","timestamp":1773347909000},"page":"39852-39872","source":"Crossref","is-referenced-by-count":0,"title":["A Proactive Defense: An Open-Source Intelligence (OSINT) Framework for Maritime Cybersecurity"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5799-5032","authenticated-orcid":false,"given":"Ahmed Nagi","family":"Nasr","sequence":"first","affiliation":[{"name":"Estonian Maritime Academy, Tallinn University of Technology, Tallinn, Estonia"}]},{"given":"Aybars","family":"Oru\u00e7","sequence":"additional","affiliation":[{"name":"Estonian Maritime Academy, Tallinn University of Technology, Tallinn, Estonia"}]},{"given":"Ricardo","family":"Lugo","sequence":"additional","affiliation":[{"name":"Estonian Maritime Academy, Tallinn University of Technology, Tallinn, Estonia"}]},{"given":"Inga","family":"Zaitseva-P\u00e4rnaste","sequence":"additional","affiliation":[{"name":"Kuressaare College, Tallinn University of Technology, Kuressaare, Estonia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2665-9957","authenticated-orcid":false,"given":"Pentti","family":"Kujala","sequence":"additional","affiliation":[{"name":"Estonian Maritime Academy, Tallinn University of Technology, Tallinn, Estonia"}]}],"member":"263","reference":[{"key":"ref1","first-page":"157","article-title":"Review of maritime transport 2023","volume-title":"Proc. United Nations Conf. Trade Develop.","author":"United Nations Conference on Trade"},{"key":"ref2","first-page":"1","article-title":"Raising the colors: Signaling for cooperation on maritime cybersecurity","volume-title":"Atlantic Council","author":"Loomis","year":"2021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/network2010009"},{"key":"ref4","volume-title":"NIS 2 Directive\u20132022\/2555\u2013EN\u2013EUR-Lex","year":"2025"},{"key":"ref5","volume-title":"Resolution MSC.428(98)\u2013Maritime Cyber Risk Management in Safety Management Systems","year":"2025"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.62454\/kd117e"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/jmse9121384"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.001.1900632"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3687300"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ie61493.2024.10599907"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2965257"},{"key":"ref12","volume-title":"MarineTraffic: Global Ship Tracking Intelligence | AIS Marine Traffic","year":"2025"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ict-dm47966.2019.9032900"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/access.2016.2616285"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/computers14100430"},{"key":"ref16","article-title":"Evaluating large language Models\u2019 capability to launch fully automated spear phishing campaigns: Validated on human subjects","author":"Heiding","year":"2024","journal-title":"arXiv:2412.00586"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.11105"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v10i1.14738"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3190009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00800-0"},{"key":"ref21","article-title":"Maritime cybersecurity: A comprehensive review","author":"Li","year":"2024","journal-title":"arXiv:2409.11417"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3233\/pmst240042"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.12716\/1001.19.04.11"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/jmse10101486"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.oceaneng.2024.119078"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664257"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.12716\/1001.17.03.24"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91293-2_10"},{"issue":"2","key":"ref29","first-page":"511","article-title":"Hacktivism: A new breed of protest in a networked world","volume":"35","author":"Hampson","year":"2012","journal-title":"Boston College Int. Comp. Law Rev."},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4324\/9780203490037"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55841-3_4"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2008.8"},{"key":"ref33","first-page":"1","volume-title":"Insider Threat Study: Illicit Cyber Activity in the Government Sector","author":"Kowalski","year":"2008"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1063\/5.0108887"},{"key":"ref35","volume-title":"Lab Dookhtegan Cyber Attack on Iranian Oil Tankers Disrupts Operations\u2013CYDOME","year":"2025"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.7225\/toms.v08.n01.013"},{"key":"ref37","volume-title":"1,000 Ships Impacted By a Ransomware Attack on DNV","author":"Paganini","year":"2025"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670390"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/sp40000.2020.00056"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1080\/19393550802623214"},{"key":"ref41","volume-title":"Multi-Year Spearphishing Campaign Targets the Maritime Industry Likely for Financial Gain","year":"2025"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_57"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/lcn58197.2023.10223402"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/milcom52596.2021.9652901"},{"key":"ref45","first-page":"164","article-title":"Cyber-attack impact estimation for a port","volume-title":"Proc. Hamburg Int. Conf. Logistics (HICL)","author":"K\u00f6nig"},{"key":"ref46","volume-title":"Port of Rotterdam Cyberattack: Security Breach Uncovered","year":"2026"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2311\/1\/012002"},{"key":"ref48","volume-title":"Israel Cyberattack Caused \u2019total Disarray\u2019 At Iran Port: Report","year":"2020"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30592-4_4"},{"issue":"1","key":"ref50","first-page":"12","article-title":"Privacy in open source intelligence and big data analytics: Case \u2019MARISA\u2019 for maritime surveillance","volume":"19","author":"Rajam\u00e4ki","year":"2020","journal-title":"J. Inf. Warfare"},{"key":"ref51","first-page":"34","article-title":"Exercise Neptune: Maritime cybersecurity training using the navigational simulators","volume-title":"Proc. 5th Interdiscipl. Cyber Res. Conf.","author":"Lovell"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2023.1185760"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.37458\/nstf.25.1.6"},{"key":"ref54","volume-title":"Shodan Search Engine","year":"2025"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ains.2018.8631403"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10454-y"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0028"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1365\/s43439-021-00042-7"},{"key":"ref59","volume-title":"Guidelines for SMEs on the Security of Personal Data Processing","year":"2025"},{"key":"ref60","first-page":"364","article-title":"How to apply privacy by design in OSINT and big data analytics?","volume-title":"Proc. 18th Eur. Conf. Cyber Warfare Secur. (ECCWS)","author":"Rajam\u00e4ki"},{"key":"ref61","first-page":"424","article-title":"Ethics of open source intelligence applied by maritime law enforcement authorities","volume-title":"Proc. 17th Eur. Conf. Cyber Warfare Secur. (ECCWS)","author":"Rajam\u00e4ki"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s00773-018-0561-3"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64330-0_6"},{"issue":"3","key":"ref64","article-title":"Cyber-physical tracking of IoT devices: A maritime use case","author":"Amro","year":"2025","journal-title":"NIKT"},{"key":"ref65","volume-title":"Ship & Container Tracking\u2014VesselFinder","year":"2025"},{"key":"ref66","volume-title":"Censys Search","year":"2025"},{"key":"ref67","volume-title":"Google Maps","year":"2025"},{"key":"ref68","volume-title":"OpenStreetMap","year":"2025"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.34190\/iccws.19.1.1977"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47671-1_14"},{"key":"ref71","volume-title":"A Threat-Driven Approach to Cyber Security Methodologies, Practices and Tools to Enable a Functionally Integrated Cyber Security Organization","author":"Muckin","year":"2019"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47671-1_4"},{"key":"ref73","volume-title":"NIS 2 Directive, Article 21: Cybersecurity Risk-Management Measures","year":"2025"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.4018\/jcit.368220"},{"key":"ref75","volume-title":"Have I Been Pwned: Check if Your Email Address Has Been Exposed in a Data Breach","year":"2025"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.3390\/jmse14010017"},{"key":"ref77","volume-title":"Ahmia\u2013Search Tor Hidden Services","year":"2025"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11432833.pdf?arnumber=11432833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:08:36Z","timestamp":1773950916000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11432833\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":77,"URL":"https:\/\/doi.org\/10.1109\/access.2026.3673557","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}