{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T21:00:01Z","timestamp":1768683601799,"version":"3.49.0"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T00:00:00Z","timestamp":1653955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T00:00:00Z","timestamp":1653955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,31]]},"DOI":"10.23919\/cycon55549.2022.9811049","type":"proceedings-article","created":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T16:09:32Z","timestamp":1656950972000},"page":"249-263","source":"Crossref","is-referenced-by-count":3,"title":["Maritime Hacking Using Land-Based Skills"],"prefix":"10.23919","author":[{"given":"Michael L.","family":"Thomas","sequence":"first","affiliation":[{"name":"United States Air Force Cyber College,Cyberwarfare Studies"}]}],"member":"263","reference":[{"key":"ref39","author":"villarreal","year":"2021","journal-title":"NSWC Corona Scientists Engineers Snag &#x2018;Hack the Machine' Win"},{"key":"ref38","author":"carnicelli","year":"2021","journal-title":"Warfare Center's Cyber Red Team Notches Another Win in National Hacking Event"},{"key":"ref33","year":"2021","journal-title":"The US Navy officially received the DARPA Sea Hunter"},{"key":"ref32","author":"beighton","year":"2021","journal-title":"World's first crewless zero emissions cargo ship will set sail in Norway"},{"key":"ref31","year":"2016","journal-title":"Autonomous ships for the high seas"},{"key":"ref30","author":"martin","year":"2021","journal-title":"Suez Canal blockage 4 of the biggest trade chokepoints"},{"key":"ref37","author":"heilweil","year":"2021","journal-title":"For hackers space is the final frontier"},{"key":"ref36","author":"santamarta","year":"2014","journal-title":"SATCOM terminals Hacking by air sea and land"},{"key":"ref35","article-title":"Spoofing a Superyacht at Sea","year":"2013"},{"key":"ref34","year":"2018","journal-title":"Hackers could monitor hijack steal and even sink ships by exploiting flaws and poor security"},{"key":"ref28","author":"duffy","year":"2021","journal-title":"Hackers have a devastating new target"},{"key":"ref27","author":"kumar","year":"2011","journal-title":"Iranian engineer hijack U S drone by GPS hack [Video Explanation]"},{"key":"ref29","author":"mateus","year":"2014","journal-title":"&#x2018;Worrying' rise in piracy attacks around Malacca Strait"},{"key":"ref2","article-title":"Raising the colors: Signaling for cooperation on maritime cybersecurity","author":"loomis","year":"2021","journal-title":"Scowcroft Center for Strategic and Security"},{"key":"ref1","year":"0","journal-title":"2020 National Maritime Cyber Security Plan"},{"key":"ref20","author":"kermenchikli","year":"2014","journal-title":"?????? &#x2018;??????' ????????????? ????? ??????? ????????? 10 ???????? ?? 61"},{"key":"ref22","author":"leggett","year":"2021","journal-title":"Egypt's Suez Canal blocked by huge container ship"},{"key":"ref21","author":"henley","year":"2021","journal-title":"How a full moon and a &#x2018;huge lever' helped free Ever Given from Suez canal"},{"key":"ref24","author":"weiss","year":"2021","journal-title":"Was the Ever Given hacked in the Suez Canal?"},{"key":"ref23","year":"2015","journal-title":"Egypt launches Suez Canal expansion"},{"key":"ref26","author":"trevithick","year":"2019","journal-title":"New Type Of GPS Spoofing Attack In China Creates &#x2018;Crop Circles' Of False Location Data"},{"key":"ref25","author":"edwards","year":"2019","journal-title":"The Russians are screwing with the GPS system to send bogus navigation data to thousands of ships"},{"key":"ref50","author":"chesaux","year":"2020","journal-title":"Cyber Attacks at Sea Blinding Warships"},{"key":"ref51","author":"sahay","year":"2021","journal-title":"Who Invented the Antivirus? A History of Antivirus Software"},{"key":"ref54","year":"2020","journal-title":"New Study Trade Supported Over 40 Million American Jobs"},{"key":"ref53","author":"kimball","year":"2019","journal-title":"How securing maritime commerce protects U S national security"},{"key":"ref52","author":"klein","year":"2021","journal-title":"Why maritime infrastructure is about more than the U S Navy"},{"key":"ref10","year":"2020","journal-title":"Maritime Industry Sees 400% Increase in Attempted Cyberattacks Since February 2020"},{"key":"ref11","author":"fickling","year":"2021","journal-title":"Giant Next-Gen Container Ships Will Make Ever Given Look Like Toy"},{"key":"ref40","author":"burgess","year":"2019","journal-title":"To protect Putin Russia is spoofing GPS signals on a massive scale"},{"key":"ref12","author":"veiga","year":"2021","journal-title":"Suez Canal blockage adds to pressure points in global trade"},{"key":"ref13","author":"bahti?","year":"2021","journal-title":"World's largest containership makes its first crossing through Suez Canal"},{"key":"ref14","author":"picheta","year":"2021","journal-title":"Why the Suez Canal is so important &#x2013; and why its blockage could be so damaging"},{"key":"ref15","author":"mcneice","year":"2021","journal-title":"All Hell Breaks Loose' &#x2013; What It's Like to Navigate Through the Suez Canal"},{"key":"ref16","author":"bernardy","year":"2019","journal-title":"Approximately how much travel time was saved by the opening of the Suez Canal in 1869?"},{"key":"ref17","author":"topham","year":"2021","journal-title":"How the Suez canal blockage can seriously dent world trade"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.7249\/MG520"},{"key":"ref19","year":"2021","journal-title":"What are Maritime Chokepoints?"},{"key":"ref4","article-title":"Hack in the Box: Researchers attack ship tracking systems for fun and profit","author":"storm","year":"2013","journal-title":"Computer World"},{"key":"ref3","author":"montalbano","year":"2018","journal-title":"Container ships easy to hack track send off course and even sink security experts say"},{"key":"ref6","author":"chaveriat","year":"2021","journal-title":"Hack a Boat [SEA-TF Maritime Hacking] Contest | DEF CON 29"},{"key":"ref5","year":"2021","journal-title":"DEFCON 29 Score Rankings"},{"key":"ref8","author":"munro","year":"2018","journal-title":"Hacking Serial Networks on Ships"},{"key":"ref7","author":"blake","year":"2017","journal-title":"Hackers took &#x2018;full control' of container ship's navigation systems for 10 hours"},{"key":"ref49","author":"whitney","year":"2020","journal-title":"Public-private partnership to launch eLORAN technology to back-up and accompany GPS"},{"key":"ref9","author":"vincent","year":"2016","journal-title":"The US Navy's new autonomous warship is called the Sea Hunter"},{"key":"ref46","author":"murphy","year":"2020","journal-title":"Small Boats Weak States Dirty Money"},{"key":"ref45","year":"2018","journal-title":"Liquefied Natural Gas (LNG) fire risk"},{"key":"ref48","year":"2021","journal-title":"Other Global Navigation Satellite Systems (GNSS)"},{"key":"ref47","author":"husick","year":"2005","journal-title":"Planning a Sea-borne Terrorist Attack"},{"key":"ref42","author":"haynes","year":"2021","journal-title":"Iran's Secret Cyber Files"},{"key":"ref41","author":"mcquade","year":"2018","journal-title":"The untold story of notpetya the most devastating cyberattack in history"},{"key":"ref44","author":"savage","year":"2004","journal-title":"Study spells out high toll on city in LNG attack"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.21236\/ADA477550"}],"event":{"name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","location":"Tallinn, Estonia","start":{"date-parts":[[2022,5,31]]},"end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9810978\/9810902\/09811049.pdf?arnumber=9811049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T17:49:46Z","timestamp":1661795386000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9811049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,31]]},"references-count":54,"URL":"https:\/\/doi.org\/10.23919\/cycon55549.2022.9811049","relation":{},"subject":[],"published":{"date-parts":[[2022,5,31]]}}}