{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T20:06:00Z","timestamp":1767211560506},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/iisa.2015.7388071","type":"proceedings-article","created":{"date-parts":[[2016,3,25]],"date-time":"2016-03-25T20:45:24Z","timestamp":1458938724000},"source":"Crossref","is-referenced-by-count":35,"title":["The little-known challenge of maritime cyber security"],"prefix":"10.1109","author":[{"given":"Joseph","family":"DiRenzo","sequence":"first","affiliation":[]},{"given":"Dana A.","family":"Goward","sequence":"additional","affiliation":[]},{"given":"Fred S.","family":"Roberts","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Hey Captain, where's your ship? Attacking vessel tracking systems for fun and profit","author":"balduzzi","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664257"},{"key":"ref12","article-title":"All at sea: Global shipping fleet exposed to hacking threat","author":"wagstaff","year":"0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1017\/S0373463308005213"},{"key":"ref14","article-title":"Malware offshore: Danger lurks where the chips fail","author":"shauk","year":"0"},{"key":"ref15","article-title":"Dynamic positioning","year":"0"},{"key":"ref16","article-title":"Cyber-attacks and underground activities in Port of Antwerp","author":"bell","year":"0","journal-title":"Bull Guard"},{"key":"ref17","article-title":"To move drugs, traffickers are hacking shipping containers","year":"0","journal-title":"Motherboards"},{"key":"ref18","article-title":"How hackers attacked the Port of Antwerp","author":"mulrenan","year":"0","journal-title":"Tradewind"},{"key":"ref19","article-title":"Cyber-attacks; a new tool for drug traffickers","year":"0","journal-title":"Woodland Group"},{"key":"ref4","article-title":"Covert control of surface vessels via counterfeit surface GPS signals","author":"bhatti","year":"0"},{"key":"ref3","article-title":"Spoofing a Superyacht at Sea","author":"zaragoza","year":"2014","journal-title":"University of Texas at Austin"},{"key":"ref6","article-title":"The biggest cruise ships in the world","year":"0","journal-title":"Cruise Critic"},{"key":"ref5","article-title":"Triple-E: The world's largest ship","year":"0"},{"key":"ref8","article-title":"Digital ship pirates: Researchers crack vessel tracking system","year":"0","journal-title":"Help Net Security"},{"key":"ref7","year":"0"},{"key":"ref2","article-title":"West Coast Port Congestion Could Cost Retailers $36.9 Billion in the Next 24 Months","year":"0","journal-title":"Business Wire"},{"key":"ref9","article-title":"Cyber resilience in the maritime and energy sectors","author":"mullin","year":"0","journal-title":"Templar Executives"},{"key":"ref1","year":"2014"},{"key":"ref20","article-title":"FBI Cyber Division Bulletin: Cargo thieves use GPS jammers to mask GPS trackers","year":"0"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1109\/THS.2010.5655048","article-title":"Protecting our nation's ports with the port security risk analysis and resource allocation system (PortSec 3.0)","author":"orsosz","year":"2010","journal-title":"Proceedings of the IEEE Conference on Technologies for Homeland Security (HST 2008)"},{"key":"ref21","article-title":"The critical infrastructure gap: U.S. port facilities and cyber vulnerabilities","author":"kramek","year":"2013","journal-title":"Federal Executive Series Policy Papers Brookings Institution"},{"key":"ref24","year":"2011"},{"key":"ref23","article-title":"GPS disruption halts ports, endangers ships - US Coast Guard","year":"0","journal-title":"Resilient Navigation and Timing Foundation"},{"key":"ref25","article-title":"US Government Accounting Office","year":"2014","journal-title":"Maritime Critical Infrastructure Protection DHS Needs to Better Address Cybersecurity GAO 14-459"}],"event":{"name":"2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA)","location":"Corfu, Greece","start":{"date-parts":[[2015,7,6]]},"end":{"date-parts":[[2015,7,8]]}},"container-title":["2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7376844\/7387951\/07388071.pdf?arnumber=7388071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:41:01Z","timestamp":1602690061000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7388071"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iisa.2015.7388071","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}