{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:25Z","timestamp":1756273225710,"version":"3.44.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130142","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"358-365","source":"Crossref","is-referenced-by-count":0,"title":["PASTA Threat Modeling for Cyber Resilience and COLREG Compliance in Autonomous Ship Systems"],"prefix":"10.1109","author":[{"given":"Muhammed","family":"Erbas","sequence":"first","affiliation":[{"name":"Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia"}]},{"given":"G\u00e1bor","family":"Visky","sequence":"additional","affiliation":[{"name":"Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia"}]},{"given":"Olaf","family":"Maennel","sequence":"additional","affiliation":[{"name":"University of Adelaide,School of Computer &#x0026; Mathematical Sciences,Adelaide,Australia"}]},{"given":"Leonidas","family":"Tsiopoulos","sequence":"additional","affiliation":[{"name":"Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia"}]},{"given":"Risto","family":"Vaarandi","sequence":"additional","affiliation":[{"name":"Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/su142315630"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s23115033"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2022.105778"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2018.8560690"},{"key":"ref5","article-title":"Catching up with time? Examining the STCW competence framework for autonomous shipping","author":"Sharma","year":"2019","journal-title":"Ergoship"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s13437-019-00162-2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12786-2_2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/jmse8100768"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2020.104908"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s22228745"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3571733"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1115\/OMAE2018-77672"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.12716\/1001.17.02.11"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2023.1151188"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1057\/s41278-022-00214-0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2020.02.019"},{"key":"ref17","article-title":"Cybersecurity considerations in autonomous ships","author":"Cho","year":"2022","journal-title":"NATO Cooperative Cyber Defence Centre of Excellence"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2976840"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/9781118988374"},{"article-title":"A critical analysis of security vulnerabilities and countermeasures in a smart ship system","volume-title":"15th Australian Information Security Management Conference","author":"Bothur","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.oceaneng.2022.110920"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1115\/1.4045372"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3357082"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2018.05.019"},{"article-title":"Physical Testbed for Highly Automated and Autonomous Vessels","volume-title":"16th International Conference on Computer and IT Applications in the Maritime Industries","author":"Brinkmann","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2019.106584"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/s19184055"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5772\/acrt.15"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.56345\/ijrdv10n210"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3158943"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.56345\/ijrdv10n210"},{"article-title":"The PASTA threat model implementation in the IoT development life cycle","volume-title":"presented at INFORMATIK 2020","author":"Wolf","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-023-09684-9"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2024.100695"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.oceaneng.2021.108569"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3337791"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.oceaneng.2024.117652"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101804"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.oceaneng.2024.118059"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130142.pdf?arnumber=11130142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:12:44Z","timestamp":1756271564000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130142\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130142","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}