{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:10:01Z","timestamp":1772640601279,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T00:00:00Z","timestamp":1637884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,26]]},"DOI":"10.1145\/3503823.3503892","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T22:15:51Z","timestamp":1645568151000},"page":"375-380","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Modelling Human Tasks to Enhance Threat Identification in Critical Maritime Systems"],"prefix":"10.1145","author":[{"given":"C\u00e9lia","family":"Martinie","sequence":"first","affiliation":[{"name":"IRIT, Universit\u00e9 Paul Sabatier - Toulouse III, France"}]},{"given":"Christos","family":"Grigoriadis","sequence":"additional","affiliation":[{"name":"University of Piraeus, Greece"}]},{"given":"Eleni-Maria","family":"Kalogeraki","sequence":"additional","affiliation":[{"name":"University of Piraeus, Greece"}]},{"given":"Panayiotis","family":"Kotzanikolaou","sequence":"additional","affiliation":[{"name":"University of Piraeus, Greece"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2014.13"},{"key":"e_1_3_2_1_2_1","volume-title":"A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms. 12481","author":"Broders Nicolas","year":"2020","unstructured":"Nicolas Broders , C\u00e9lia Martinie , Philippe Palanque , Marco Winckler , and Kimmo Halunen . 2020. A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms. 12481 ( 2020 ), 61\u201383. Nicolas Broders, C\u00e9lia Martinie, Philippe Palanque, Marco Winckler, and Kimmo Halunen. 2020. A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms. 12481 (2020), 61\u201383."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2013.11.008"},{"key":"e_1_3_2_1_4_1","volume-title":"Analysis of marine casualties and incidents involving container vessels. V1.0. Safety analysis of EMCIP data. (September","author":"European Maritime Safety\u00a0Agency EMSA. 2020.","year":"2020","unstructured":"European Maritime Safety\u00a0Agency EMSA. 2020. Analysis of marine casualties and incidents involving container vessels. V1.0. Safety analysis of EMCIP data. (September 2020 ). European Maritime Safety\u00a0Agency EMSA. 2020. Analysis of marine casualties and incidents involving container vessels. V1.0. Safety analysis of EMCIP data. (September 2020)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.09.002"},{"key":"e_1_3_2_1_6_1","volume-title":"Vol.\u00a09299","author":"Fahssi Racim","unstructured":"Racim Fahssi , C\u00e9lia Martinie , and Philippe Palanque . 2015. Enhanced Task Modelling for Systematic Identification and Explicit Representation of Human Errors , Vol.\u00a09299 . Springer , Cham . Racim Fahssi, C\u00e9lia Martinie, and Philippe Palanque. 2015. Enhanced Task Modelling for Systematic Identification and Explicit Representation of Human Errors, Vol.\u00a09299. Springer, Cham."},{"key":"e_1_3_2_1_7_1","unstructured":"European Union\u00a0Agency for Cybersecurity\u00a0ENISA. 2016. Threat taxonomy. (2016). https:\/\/www.enisa.europa.eu\/topics\/threat-risk-management\/threats-and-trends\/enisa-threat-landscape\/threat-taxonomy\/view  European Union\u00a0Agency for Cybersecurity\u00a0ENISA. 2016. Threat taxonomy. (2016). https:\/\/www.enisa.europa.eu\/topics\/threat-risk-management\/threats-and-trends\/enisa-threat-landscape\/threat-taxonomy\/view"},{"key":"e_1_3_2_1_8_1","volume-title":"Guidelines on Maritime Cyber risk management. MSC-FAL.1\/Circ.3. (July","author":"International Maritime\u00a0Organization IMO. 2017.","year":"2017","unstructured":"12 . International Maritime\u00a0Organization IMO. 2017. Guidelines on Maritime Cyber risk management. MSC-FAL.1\/Circ.3. (July 2017 ). 12. International Maritime\u00a0Organization IMO. 2017. Guidelines on Maritime Cyber risk management. MSC-FAL.1\/Circ.3. (July 2017)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774225.2774845"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331154"},{"key":"e_1_3_2_1_11_1","unstructured":"NIST. 2021. National Vulnerability Database. https:\/\/nvd.nist.gov\/  NIST. 2021. National Vulnerability Database. https:\/\/nvd.nist.gov\/"},{"key":"e_1_3_2_1_12_1","unstructured":"University of Piraeus. 2021. MITIGATE. http:\/\/cs4e-mtra.cs.unipi.gr\/  University of Piraeus. 2021. MITIGATE. http:\/\/cs4e-mtra.cs.unipi.gr\/"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"James Reason. 1990. Human Error. Cambridge University Press.  James Reason. 1990. Human Error. Cambridge University Press.","DOI":"10.1017\/CBO9781139062367"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12198-018-0195-z"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajsl.2020.05.001"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2855563"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2010.09.019"}],"event":{"name":"PCI 2021: 25th Pan-Hellenic Conference on Informatics","location":"Volos Greece","acronym":"PCI 2021"},"container-title":["25th Pan-Hellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503823.3503892","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503823.3503892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:31Z","timestamp":1750188631000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503823.3503892"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,26]]},"references-count":17,"alternative-id":["10.1145\/3503823.3503892","10.1145\/3503823"],"URL":"https:\/\/doi.org\/10.1145\/3503823.3503892","relation":{},"subject":[],"published":{"date-parts":[[2021,11,26]]},"assertion":[{"value":"2022-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}