{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:58:31Z","timestamp":1776783511852,"version":"3.51.2"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1109\/lcn58197.2023.10223402","type":"proceedings-article","created":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T13:26:17Z","timestamp":1694006777000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Penetrating the Silence: Data Exfiltration in Maritime and Underwater Scenarios"],"prefix":"10.1109","author":[{"given":"Alessandro","family":"Cantelli-Forti","sequence":"first","affiliation":[{"name":"Radar and Surveillance Systems National Laboratory, CNIT,Pisa,Italy"}]},{"given":"Michele","family":"Colajanni","sequence":"additional","affiliation":[{"name":"University of Bologna,Department of Computer Science and Engineering,Bologna,Italy"}]},{"given":"Silvio","family":"Russo","sequence":"additional","affiliation":[{"name":"University of Bologna,Department of Computer Science and Engineering,Bologna,Italy"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JISIC.2014.51"},{"key":"ref12","author":"longo","year":"2022","journal-title":"Attacking (and defending) the Maritime Radar System"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203227"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICMT52455.2021.9502768"},{"key":"ref11","year":"0","journal-title":"Why Supply Chain Woes Mean The Shipping Industry Needs Increased Cybersecurity"},{"key":"ref10","year":"0","journal-title":"The Vulnerable Maritime Supply Chain-a Threat to the Global Economy-SecurityWeek"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSR54599.2022.9850284"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22295-5_11"},{"key":"ref17","year":"0","journal-title":"Supply Chain Risk from Gigabyte App Center Backdoor-Eclypsium &#x2014; Supply Chain Security for the Modern Enterprise"},{"key":"ref16","year":"0","journal-title":"Supply Chain Compromise Technique T1195-Enterprise &#x2014; MITRE ATT&CK&#x00AE;"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref18","article-title":"MITRE ATT&CK: Design and Philosophy","author":"strom","year":"2020","journal-title":"Tech Rep"},{"key":"ref24","author":"fredriksson","year":"2022","journal-title":"Analysis of radio surveillance in search of missing persons-An empirical study of Bluetooth Low Energy and Wi-Fi characteristics"},{"key":"ref23","year":"0","journal-title":"GitHub-lucadentella\/esp32s2Stick"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2017.8249368"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/s22114144"},{"key":"ref20","author":"braccini","year":"2016","journal-title":"Tallinn 2016 Battlefield digital forensics Digital intelligence and evidence collection in special operations"},{"key":"ref22","author":"classen","year":"2022","journal-title":"Evil Never Sleeps When Wireless Malware Stays On After Turning Off iPhones"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72598-7_2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.06.003"},{"key":"ref8","author":"kessler","year":"2020","journal-title":"Maritime Cybersecurity A Guide for Leaders and Managers 2nd Edition"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45371-8_23"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MetroSea55331.2022.9950939"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228880"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC49498.2019.9108874"},{"key":"ref6","author":"br\u00e4unlein","year":"2021","journal-title":"Send My Arbitrary data transmission via Apple&#x2019;s Find My network &#x2014; Positive Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0045"}],"event":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","location":"Daytona Beach, FL, USA","start":{"date-parts":[[2023,10,2]]},"end":{"date-parts":[[2023,10,5]]}},"container-title":["2023 IEEE 48th Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10223299\/10223313\/10223402.pdf?arnumber=10223402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T11:42:03Z","timestamp":1694778123000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10223402\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,2]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/lcn58197.2023.10223402","relation":{"is-referenced-by":[{"id-type":"doi","id":"10.36227\/techrxiv.23643303","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.23643303.v2","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2023,10,2]]}}}