{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:43:07Z","timestamp":1740102187488,"version":"3.37.3"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1109\/lcn58197.2023.10223323","type":"proceedings-article","created":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T17:26:17Z","timestamp":1694021177000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Cyber Insurance in the Maritime Transportation System"],"prefix":"10.1109","author":[{"given":"Logan","family":"Drazovich","sequence":"first","affiliation":[{"name":"Stevens Institute of Technology,Department of Computer Science,Hoboken,USA,NJ 07030"}]},{"given":"Susanne","family":"Wetzel","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology,Department of Computer Science,Hoboken,USA,NJ 07030"}]}],"member":"263","reference":[{"year":"0","article-title":"The Problem of Cyber Attribution Between States","key":"ref13"},{"year":"0","article-title":"Mapping a Path to Cyber Attribution Consensus","key":"ref35"},{"year":"0","article-title":"Lloyd&#x2019;s of London to Exclude State-Backed Cyber-Attacks from Coverage","key":"ref12"},{"year":"0","article-title":"The Purposes of U.S. Government Public Cyber Attribution","key":"ref34"},{"year":"0","article-title":"Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy","key":"ref15"},{"year":"0","article-title":"U.S. Government to Explore Cyber Insurance Backstop","key":"ref37"},{"year":"0","article-title":"The Untold Story of the 2018 Olympics Cyberattack, the Most Deceptive Hack in History","key":"ref14"},{"year":"0","article-title":"Creating a Federally Sponsored Cyber Insurance Program","key":"ref36"},{"year":"0","article-title":"Declaration by the High Representative on Behalf of the European Union&#x2014;Call to Promote and Conduct Responsible Behaviour in Cyberspace","key":"ref31"},{"year":"0","article-title":"UK Condemns Russia&#x2019;s GRU over Georgia Cyber-attacks","key":"ref30"},{"year":"0","article-title":"Merck Entitled to $1.4B in Cyberattack Case after Court rejects Insurers&#x2019; &#x201D;Warlike Action&#x201D; Claim","key":"ref11"},{"year":"0","article-title":"China: Declaration by the High Representative on Behalf of the European Union urging Chinese Authorities to Take Action against Malicious Cyber Activities Undertaken from its Territory","key":"ref33"},{"year":"0","article-title":"United States of America Cyberspace Solarium Commission","key":"ref10"},{"year":"0","article-title":"Microsoft: China-based Hackers Found Bug to Target US Firms","key":"ref32"},{"year":"0","article-title":"Florida Water Treatment Facility Hack used a Dormant Remote Access Software, Sheriff Says","key":"ref2"},{"year":"0","article-title":"The Attack on Colonial Pipeline: What We&#x2019;ve Learned & What We&#x2019;ve Done Over the Past Two Years","key":"ref1"},{"year":"0","article-title":"U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage","key":"ref17"},{"year":"0","article-title":"Cybersecurity Insurance Has a Big Problem","key":"ref39"},{"year":"0","article-title":"Manhattan U.S. Attorney Announces Charges Against Seven Iranians For Conducting Coordinated Campaign Of Cyber Attacks Against U.S. Financial Sector On Behalf Of Islamic Revolutionary Guard Corps-Sponsored Entities","key":"ref16"},{"year":"0","article-title":"As Cyber Insurance Dries Up, Treasury Department Eyes a Backstop","key":"ref38"},{"year":"0","article-title":"United States District Court for the District of Columbia, Case 1:18-cr-00215-ABJ","key":"ref19"},{"year":"0","article-title":"United States District Court for the Central District of California, Case MJ 18-1479","key":"ref18"},{"year":"0","article-title":"Foreign Threats to the 2020 US Federal Elections","key":"ref24"},{"year":"0","article-title":"What Is the Point of These Nation-State Indictments?","key":"ref23"},{"year":"0","article-title":"UK and US Call out Russia for SolarWinds Compromise","key":"ref26"},{"year":"0","article-title":"NSA-CISA-FBI Joint Advisory on Russian SVR Targeting U.S. and Allied Networks","key":"ref25"},{"year":"0","article-title":"Three North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe","key":"ref20"},{"year":"0","article-title":"United States District Court for the Western District of Pennsylvania, Criminal No. 20-316","key":"ref22"},{"year":"0","article-title":"It&#x2019;s Official: North Korea Is Behind WannaCry","key":"ref21"},{"year":"0","article-title":"Inquiry into the Killing of Mr. Jamal Kashoggi","key":"ref28"},{"year":"0","article-title":"New Cyberattacks Targeting Sporting and Anti-doping Organizations","key":"ref27"},{"year":"0","article-title":"The United States Condemns Russian Cyber Attack Against the Country of Georgia","key":"ref29"},{"year":"0","article-title":"War, Terrorism, and Catastrophe in Cyber Insurance: Understanding and Reforming Exclusions","key":"ref8"},{"year":"0","article-title":"Cyber Insurance Market","key":"ref7"},{"year":"0","article-title":"What Is Cyber Insurance, and Why Is It In High Demand?","key":"ref9"},{"year":"0","article-title":"Failure Modes in the Maritime Transportation System&#x2014; A Functional Approach to Throughput Bulnerability","key":"ref4"},{"year":"0","article-title":"Critial Infrastructure Sectors","key":"ref3"},{"year":"0","article-title":"The Untold Story of NotPetya, the Most Devastating Cyberattack in History","key":"ref6"},{"year":"0","article-title":"How 2021 Showed the Importance of the Maritime Transportation System","key":"ref5"}],"event":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2023,10,2]]},"location":"Daytona Beach, FL, USA","end":{"date-parts":[[2023,10,5]]}},"container-title":["2023 IEEE 48th Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10223299\/10223313\/10223323.pdf?arnumber=10223323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T15:24:03Z","timestamp":1694791443000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10223323\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,2]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/lcn58197.2023.10223323","relation":{},"subject":[],"published":{"date-parts":[[2023,10,2]]}}}