{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T17:54:21Z","timestamp":1757613261184,"version":"3.44.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cybersa.2019.8899642","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T18:18:43Z","timestamp":1574705923000},"page":"1-4","source":"Crossref","is-referenced-by-count":7,"title":["Forensic Readiness within the Maritime Sector"],"prefix":"10.1109","author":[{"given":"Kimberly","family":"Tam","sequence":"first","affiliation":[{"name":"University of Plymouth"}]},{"given":"Kevin","family":"Jones","sequence":"additional","affiliation":[{"name":"University of Plymouth"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-30"},{"journal-title":"The Maritime Executive","article-title":"Nigerian navy: Crewmembers involved in pirate attacks","year":"2016","key":"ref31"},{"key":"ref30","article-title":"The maritime security cyber threat","author":"rider","year":"2015","journal-title":"Maritime Security Review [Online]"},{"key":"ref34","article-title":"Data breaches persuade companies to raise cyber security budgets","author":"ram","year":"2018","journal-title":"Financial Times"},{"key":"ref10","article-title":"Maritime critical infrastructure protection: Dhs needs to enhance efforts to address port cybersecurity","author":"wilshusen","year":"2015","journal-title":"GAO-16-116T"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2018.8560690"},{"journal-title":"Cybersecurity in finance getting the policy mix right","year":"2018","key":"ref12"},{"key":"ref13","article-title":"Assessing the risks of cyber terrorism, cyber war and other cyber threats","author":"lewis","year":"2002","journal-title":"Center for Strategic and International Studies"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"ref15","article-title":"A ten step process for forensic readiness","author":"rowlingson","year":"2004","journal-title":"IJDET"},{"journal-title":"Digital evidence and computer crime Forensic science computers and the Internet","year":"2011","author":"casey","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2018.1513053"},{"journal-title":"IHS Markit","article-title":"Maritime cyber survey 2018 - the results","year":"2018","key":"ref18"},{"journal-title":"Security risks and weaknesses in ecdis systems","year":"2014","key":"ref19"},{"key":"ref28","article-title":"Maritime security: Hacking into a voyage data recorder (VDR)","author":"santamarta","year":"2015","journal-title":"IOActive [Online]"},{"journal-title":"Safety and shipping review","year":"2018","author":"allianz","key":"ref4"},{"journal-title":"Solas chapter V annex 10 imo resolution msc 214(81)","year":"2006","key":"ref27"},{"journal-title":"United Nations Conference on Trade and Development (UNCTAD)","article-title":"Review of maritime transport","year":"0","key":"ref3"},{"key":"ref6","article-title":"Threats and impacts in maritime cyber security","author":"jones","year":"2016","journal-title":"IET Engineering & Technology Reference"},{"key":"ref29","article-title":"How hackers are targeting the shipping industry","author":"baraniuk","year":"2017","journal-title":"BBC News"},{"journal-title":"Workshop on Cyber Security Aspects in the Maritime Sector","year":"2011","key":"ref5"},{"key":"ref8","article-title":"Maritime cybersecurity: Cyber cases in the maritime enviroment","author":"belmont","year":"2016","journal-title":"American Association of Port Authorities"},{"journal-title":"BIMCO 2 0 ed Bagsvaerd","article-title":"Guidelines on cyber security onboard ships","year":"2017","key":"ref7"},{"journal-title":"Shipping and World Trade","year":"2018","key":"ref2"},{"journal-title":"Open Government License","article-title":"Maritime 2050 call for evidence","year":"2018","key":"ref9"},{"journal-title":"United Nations Conference on Trade and Development","article-title":"Review of maritime transport","year":"0","key":"ref1"},{"journal-title":"ECDIS Regulations","year":"2014","key":"ref20"},{"journal-title":"Maersk","article-title":"A. P. Moller Maersk improves underlying profit and grows revenue in first half of the year","year":"2017","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.009"},{"journal-title":"United Nations Office for Drugs and Crime","article-title":"World drug report","year":"2015","key":"ref24"},{"key":"ref23","article-title":"COSCO's cyber attack and the importance of maritime cybersecurity","author":"rajamanickam","year":"2018","journal-title":"FreightWaves"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s13437-019-00162-2"},{"journal-title":"Stockholm International Peace Research Institute","article-title":"A comprehensive approach to combating illicit trafficking","year":"2010","key":"ref25"}],"event":{"name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2019,6,3]]},"location":"Oxford, UK","end":{"date-parts":[[2019,6,4]]}},"container-title":["2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892713\/8899350\/08899642.pdf?arnumber=8899642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T18:20:13Z","timestamp":1757010013000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8899642\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2019.8899642","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}