{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T00:24:12Z","timestamp":1774311852383,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/csnet.2018.8602669","type":"proceedings-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T01:10:27Z","timestamp":1546996227000},"page":"1-8","source":"Crossref","is-referenced-by-count":24,"title":["Detecting and Hunting Cyberthreats in a Maritime Environment: Specification and Experimentation of a Maritime Cybersecurity Operations Centre"],"prefix":"10.1109","author":[{"given":"Olivier","family":"Jacq","sequence":"first","affiliation":[]},{"given":"Xavier","family":"Boudvin","sequence":"additional","affiliation":[]},{"given":"David","family":"Brosset","sequence":"additional","affiliation":[]},{"given":"Yvon","family":"Kermarrec","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Simonin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Agence nationale de la s&#x00E9;curite des systemes d'information","year":"0","journal-title":"Security incident detection service providers-requirements reference document"},{"key":"ref38","article-title":"Ten strategies of a world-class cybersecurity operations center","author":"zimmerman","year":"2014","journal-title":"MITRE corporate communications and public affairs Appendices"},{"key":"ref33","article-title":"National Institute of Standards and Technology","year":"0","journal-title":"Framework for Improving Critical Infrastructure Cybersecurity"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/889"},{"key":"ref31","author":"hayes","year":"2016","journal-title":"Maritime cybersecurity the future of national security"},{"key":"ref30","article-title":"Analysis of cyber security aspects in the maritime sector","author":"cimpean","year":"2011","journal-title":"Technical Report EN"},{"key":"ref37","article-title":"Scalable multidimensionAl sitUation awaReness sOlution for protectiNg european ports","year":"0","journal-title":"Sauron project the concept"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32824-9_6"},{"key":"ref35","article-title":"International Maritime Electronics Alliance","year":"0","journal-title":"An ip\/ethernet interface standard for marine electronic devices"},{"key":"ref34","article-title":"Pen Test Partners","year":"0","journal-title":"Crashing ships by hacking nmea sentences"},{"key":"ref10","article-title":"Bullguard blog","year":"0","journal-title":"Cyber-attacks and underground activites in port of antwerp"},{"key":"ref40","first-page":"24","article-title":"Architecture syst&#x00E9;me securis&#x00E9;e de sonde de detection d'intrusion reseau","volume":"2014","author":"chifflier","year":"2014","journal-title":"C&ESAR France"},{"key":"ref11","first-page":"1","article-title":"The little-known challenge of maritime cyber security","author":"joseph","year":"2015","journal-title":"2015 6th International Conference on Information Intelligence Systems and Applications (IISA) IISA"},{"key":"ref12","article-title":"MAERSK","year":"0","journal-title":"Cyber-attack update"},{"key":"ref13","first-page":"22","article-title":"Pirates exploiting cybersecurity weaknesses in maritime industry","volume":"96","author":"frodl","year":"2012","journal-title":"National Defense Journal Of The American Deense Preparedness Association"},{"key":"ref14","first-page":"17","year":"0","journal-title":"Observatoire du monde cybernetique ler trimestre 2014"},{"key":"ref15","article-title":"Erwan Alincourt and Cyril Ray. M&#x00E9;thodologie d'extraction de signatures issues des signaux ais","year":"2016","journal-title":"Symposium sur la s&#x00E9;curit&#x00E9; des technologies de l'information et des communications"},{"key":"ref16","article-title":"MARSH","year":"0","journal-title":"The risk of cyber-attack to the maritime sector"},{"key":"ref17","year":"0","journal-title":"Ncc group-preparing for cyber battle ship"},{"key":"ref18","article-title":"Threats and impacts in maritime cyber security","author":"jones","year":"2016","journal-title":"Engineering & Technology Reference"},{"key":"ref19","author":"eichenhofer","year":"2017","journal-title":"In-depth software vulnerability assessment of container terminal systems"},{"key":"ref28","article-title":"International Maritime Organisation","year":"0","journal-title":"Guidelines on maritime cyber risk management"},{"key":"ref4","first-page":"70","volume":"67","year":"2014","journal-title":"Peter Dombrowski and Chris C Demchak Cyber war cybered conflict and the maritime domain Naval War College Review"},{"key":"ref27","article-title":"Agence nationale de la s&#x00E9;curit&#x00E9; des systemes d'information","year":"0","journal-title":"Best practices for cyber security on board ships"},{"key":"ref3","article-title":"Royal Caribbean Press Center","year":"0","journal-title":"Symphony of the seas fact sheet"},{"key":"ref6","article-title":"?rnulf Jan R?dseth and Kwangil Lee. Secure communication for e-navigation and remote control of unmanned ships","volume":"15","year":"2015","journal-title":"Proc of the 14th Conference on Computer and IT Applications in the Maritime Industries-COMPIT"},{"key":"ref29","year":"0","journal-title":"Guidelines on cyber-security onboard ships"},{"key":"ref5","author":"fitton","year":"2015","journal-title":"The future of maritime cyber security"},{"key":"ref8","author":"burton","year":"0","journal-title":"Cybers&#x00E9;curit&#x00E9; et mar&#x00E9;tique un enjeu europ&#x00E9;en? Centre d&#x2019;&#x00E9;tudes strat&#x00E9;giques de la marine"},{"key":"ref7","article-title":"Kimberly Tam and Kevin Jones","year":"2018","journal-title":"Cyber-risk assessment for autonomous ships"},{"key":"ref2","article-title":"Marine Insight","year":"0","journal-title":"10 world's biggest container ships in 2017"},{"key":"ref9","article-title":"Satellite Markets & Research","year":"0","journal-title":"Executive summaries of market trends and opportunities in key market segments and regions worldwide the maritime satellite market"},{"key":"ref1","article-title":"Internal Chamber of Shipping","year":"0","journal-title":"Ics-key facts"},{"key":"ref20","author":"beaumont","year":"2017","journal-title":"Cyber-risks in maritime container ports An analysis of threats and simulation of impacts"},{"key":"ref22","first-page":"19","article-title":"Maritime cyber defense","author":"\u0161krlec","year":"2014","journal-title":"6th International Maritime Science Conference"},{"key":"ref21","year":"0","journal-title":"The world's largest ship"},{"key":"ref24","year":"0","journal-title":"Fleetwide cyber awareness challenge training update"},{"key":"ref41","first-page":"24","article-title":"Detection d'intrusion dans les systemes industriels: Suricata et le cas de modbus","volume":"2014","author":"diallo","year":"2014","journal-title":"C&ESAR France"},{"key":"ref23","article-title":"Maritime cyber risk management in safety management systems","year":"2017","journal-title":"US Coast Guard The Maritime Safety Committee"},{"key":"ref26","year":"0","journal-title":"The french navy and maritime cyberdefense"},{"key":"ref25","article-title":"A platform for raising awareness on cyber security in a maritime context","author":"brosset","year":"2017","journal-title":"International Conference on Computer and Computational Intelligence"}],"event":{"name":"2018 2nd Cyber Security in Networking Conference (CSNet)","location":"Paris","start":{"date-parts":[[2018,10,24]]},"end":{"date-parts":[[2018,10,26]]}},"container-title":["2018 2nd Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8574117\/8602668\/08602669.pdf?arnumber=8602669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T23:56:47Z","timestamp":1643155007000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8602669\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/csnet.2018.8602669","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}