{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:10:15Z","timestamp":1756271415628,"version":"3.44.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130012","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"425-432","source":"Crossref","is-referenced-by-count":0,"title":["Mapping of Maritime Ecosystem Components in the Cybersecurity Landscape"],"prefix":"10.1109","author":[{"given":"Evita","family":"Roponena","sequence":"first","affiliation":[{"name":"Institute of Information Technology Riga Technical University,Riga,Latvia"}]},{"given":"Sandra","family":"Lielb\u0101rde","sequence":"additional","affiliation":[{"name":"Riga Technical University,Maritime Academy,Riga,Latvia"}]},{"given":"Elizabete","family":"Citskovska","sequence":"additional","affiliation":[{"name":"Institute of Information Technology Riga Technical University,Riga,Latvia"}]},{"given":"Agne","family":"Brilingaite","sequence":"additional","affiliation":[{"name":"Institute of Computer Science Vilnius University Vilnius,Lithuania"}]},{"given":"Linas","family":"Bukauskas","sequence":"additional","affiliation":[{"name":"Institute of Computer Science Vilnius University Vilnius,Lithuania"}]},{"given":"R\u016bta","family":"Pirta","sequence":"additional","affiliation":[{"name":"Institute of Information Technology Riga Technical University,Riga,Latvia"}]}],"member":"263","reference":[{"journal-title":"EMSA","article-title":"The EU maritime profile","year":"2025","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/23789689.2019.1600961"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2020.100173"},{"article-title":"Safety and shipping review 2024","year":"2024","author":"Commercial","key":"ref4"},{"key":"ref5","article-title":": Understanding the MTS","volume-title":"Raising the colors: Signaling for cooperation on maritime cybersecurity. Atlantic Council","author":"Loomis","year":"2021"},{"key":"ref6","article-title":"Prosecutors investigating cyberattacks affecting multiple Belgian and Dutch ports","author":"Greig","year":"2022","journal-title":"ZDNet. Last access"},{"year":"2023","key":"ref7","article-title":"Ransomware attack on maritime software impacts 1,000 ships. The Record from Recorded Future News. Last access"},{"key":"ref8","article-title":"EstLink 2 damage not considered an accident, Estonia\u2019s minister says as Navy protects sister link","author":"Skopljak","year":"2024","journal-title":"Offshore Energy. Last access"},{"journal-title":"ISC2","article-title":"ISC2 cybersecurity workforce study","year":"2024","key":"ref9"},{"journal-title":"ENISA","key":"ref10","article-title":"Port security: Good practices for cybersecurity in the maritime sector"},{"journal-title":"NIST","article-title":"The NIST cybersecurity framework (CSF) 2.0","year":"2024","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100571"},{"journal-title":"ENISA","key":"ref13","article-title":"ENISA foresight cybersecurity threats for 2030 update"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3219674"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.12716\/1001.15.03.04"},{"journal-title":"IMO","article-title":"Guidelines for setting up a maritime single window","year":"2025","key":"ref16"},{"year":"2022","key":"ref17","article-title":"Guidelines on maritime cyber risk management"},{"article-title":"Fourth report assessing the implementation of the directive on enhancing port security (covering the years 2019-2023)","year":"2025","author":"to","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/03088839.2022.2124464"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1017\/S0373463323000164"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.12716\/1001.18.04.02"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.marpol.2014.12.005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.marpol.2022.105138"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ocecoaman.2023.106493"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3164678"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/network2010009"},{"issue":"1","key":"ref28","first-page":"55","article-title":"A study about the role of the human factor in maritime cybersecurity","volume":"71","author":"Pseftelis","year":"2021"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3357082"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CSR57506.2023.10224972"},{"journal-title":"IMO","key":"ref31","article-title":"Guide to Maritime Security and the ISPS Code"},{"article-title":"BIMCO and other industry organisations","volume-title":"The Guidelines on Cyber Security Onboard Ships","year":"2025","key":"ref32"},{"journal-title":"ENISA","key":"ref33","article-title":"ENISA threat landscape: Transport sector"},{"issue":"4009","volume-title":"The Committee on National Security Systems (CNSS) Glossary, U.S. National Security Agency","key":"ref34"},{"journal-title":"ENISA","article-title":"ENISA overview of cybersecurity and related terminology","year":"2025","key":"ref35"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130012.pdf?arnumber=11130012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T04:52:31Z","timestamp":1756270351000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130012","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}