{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T06:22:16Z","timestamp":1776320536397,"version":"3.50.1"},"reference-count":147,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T00:00:00Z","timestamp":1730851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>The maritime industry is constantly evolving and posing new challenges, especially with increasing digitalization, which has raised concerns about cyber-attacks on maritime supply chain agents. Although scholars have proposed various methods and classification models to counter these cyber threats, a comprehensive cyber-attack taxonomy for maritime supply chain actors based on a systematic literature review is still lacking. This review aims to provide a clear picture of common cyber-attacks and develop a taxonomy for their categorization. In addition, it outlines best practices derived from academic research in maritime cybersecurity using PRISMA principles for a systematic literature review, which identified 110 relevant journal papers. This study highlights that distributed denial of service (DDoS) attacks and malware are top concerns for all maritime supply chain stakeholders. In particular, shipping companies are urged to prioritize defenses against hijacking, spoofing, and jamming. The report identifies 18 practices to combat cyber-attacks, categorized into information security management solutions, information security policies, and cybersecurity awareness and training. Finally, this paper explores how emerging technologies can address cyber-attacks in the maritime supply chain network (MSCN). While Industry 4.0 technologies are highlighted as significant trends in the literature, this study aims to equip MSCN stakeholders with the knowledge to effectively leverage a broader range of emerging technologies. In doing so, it provides forward-looking solutions to prevent and mitigate cyber-attacks, emphasizing that Industry 4.0 is part of a larger landscape of technological innovation.<\/jats:p>","DOI":"10.3390\/info15110710","type":"journal-article","created":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T06:27:39Z","timestamp":1730874459000},"page":"710","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Cybersecurity at Sea: A Literature Review of Cyber-Attack Impacts and Defenses in Maritime Supply Chains"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6052-5771","authenticated-orcid":false,"given":"Maria Valentina","family":"Clavijo Mesa","sequence":"first","affiliation":[{"name":"Energy Department, Politecnico di Milano, 20156 Milan, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6040-4734","authenticated-orcid":false,"given":"Carmen Elena","family":"Patino-Rodriguez","sequence":"additional","affiliation":[{"name":"Industrial Engineering, Universidad de Antioquia, Medell\u00edn 050010, Colombia"}]},{"given":"Fernando Jesus","family":"Guevara Carazas","sequence":"additional","affiliation":[{"name":"Mechanical Engineering, Universidad Nacional, Medell\u00edn 050034, Colombia"}]}],"member":"1968","published-online":{"date-parts":[[2024,11,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"147","DOI":"10.7225\/toms.v10.n01.011","article-title":"CR CyberMar as a solution path towards Cybersecurity soundness in maritime logistics domain","volume":"10","author":"Canepa","year":"2021","journal-title":"Trans. Marit. Sci."},{"key":"ref_2","unstructured":"Valentin, L. (2022). What Is the Maritime Supply Chain?, SINAY Maritime Data Solution."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/j.ajsl.2021.10.002","article-title":"Cybersecurity knowledge and skills for port facility security officers of international seaports: Perspectives of IT and security personnel","volume":"37","author":"Senarak","year":"2021","journal-title":"Asian J. Shipp. Logist."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1080\/03088839.2022.2124464","article-title":"Maritime cybersecurity: Are onboard systems ready?","volume":"51","author":"Kanwal","year":"2024","journal-title":"Marit. Policy Manag."},{"key":"ref_5","first-page":"521","article-title":"The main challenges and barriers to the successful \u201csmart shipping\u201d","volume":"13","author":"Alop","year":"2019","journal-title":"TransNav Int. J. Mar. Navig. Saf. Sea Transp."},{"key":"ref_6","first-page":"35","article-title":"BRAT: A BRidge attack tool for cyber security assessments of maritime systems","volume":"15","author":"Hemminghaus","year":"2021","journal-title":"TransNav Int. J. Mar. Navig. Saf. Sea Transp."},{"key":"ref_7","first-page":"519","article-title":"A retrospective analysis of maritime cyber security incidents","volume":"15","author":"Meland","year":"2021","journal-title":"TransNav Int. J. Mar. Navig. Saf. Sea Transp."},{"key":"ref_8","unstructured":"Lloyd\u2019s Register (2018). Building Resilience Against New Risks\u2014Cyber Security for an Era of Innovation, Lloyd\u2019s Register."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"132","DOI":"10.7225\/toms.v08.n01.013","article-title":"Maritime cyber security analysis\u2014how to reduce threats?","volume":"8","year":"2019","journal-title":"Trans. Marit. Sci."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s13437-021-00240-4","article-title":"Cybersecurity in the European Union port sector in light of the digital transformation and the COVID-19 pandemic","volume":"20","author":"Bocayuva","year":"2021","journal-title":"WMU J. Marit. Aff."},{"key":"ref_11","unstructured":"British Ports Association (2020). Managing Ports\u2019 Cyber Risks\u2014White Paper, British Ports Association."},{"key":"ref_12","unstructured":"INMARSAT (2020). Cyber Security Requirements for IMO 2021\u2014White Paper, INMARSAT."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Xing, B., Jiang, Y., Liu, Y., and Cao, S. (2018). Risk data analysis based anomaly detection of Ship Information System. Energies, 11.","DOI":"10.3390\/en11123403"},{"key":"ref_14","first-page":"429","article-title":"A taxonomy framework for maritime cybersecurity: A demonstration using the automatic identification system","volume":"12","author":"Kessler","year":"2018","journal-title":"TransNav Int. J. Mar. Navig. Saf. Sea. Transp."},{"key":"ref_15","first-page":"2677","article-title":"A survey on cyber security threats in IoT-enabled maritime industry","volume":"24","author":"Ashraf","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"8176","DOI":"10.1016\/j.egyr.2021.08.126","article-title":"A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments","volume":"7","author":"Li","year":"2021","journal-title":"Energy Rep."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.iotcps.2021.12.002","article-title":"Cyber Physical Systems: Analyses, challenges and possible solutions","volume":"1","author":"Tyagi","year":"2021","journal-title":"Internet Things Cyber-Phys. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MCOMSTD.101.2000073","article-title":"Developing Maritime Digital Competencies","volume":"5","author":"Hopcraft","year":"2021","journal-title":"IEEE Commun. Stand. Mag."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Sardi, A., Rizzi, A., Sorano, E., and Guerrieri, A. (2020). Cyber risk in health facilities: A systematic literature review. Sustainability, 12.","DOI":"10.3390\/su12177002"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1060","DOI":"10.1016\/j.rser.2015.12.193","article-title":"On the definition of cyber-physical resilience in power systems","volume":"58","author":"Arghandeh","year":"2016","journal-title":"Renew. Sustain. Energy Rev."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"4411","DOI":"10.1016\/j.trpro.2017.05.337","article-title":"Port risk management in container terminals","volume":"25","author":"Pallis","year":"2017","journal-title":"Transp. Res. Procedia."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"128050","DOI":"10.1109\/ACCESS.2020.3008395","article-title":"An in-depth security assessment of maritime container terminal software systems","volume":"8","author":"Eichenhofer","year":"2020","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Karamperidis, S., Kapalidis, C., and Watson, T. (2021). Maritime cyber security: A global challenge tackled through distinct regional approaches. J. Mar. Sci. Eng., 9.","DOI":"10.3390\/jmse9121323"},{"key":"ref_24","unstructured":"IMO (2017). Maritime Cyber Risk Management in Safety Management Systems. Resolution MSC.428(98), IMO."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Yoo, Y., and Park, H.-S. (2021). Qualitative risk assessment of cybersecurity and development of vulnerability enhancement plans in consideration of digitalized ship. J. Mar. Sci. Eng., 9.","DOI":"10.3390\/jmse9060565"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"258750","DOI":"10.33175\/mtr.2023.258750","article-title":"Developing a maritime cyber safety culture: Improving safety of operations","volume":"5","author":"Hopcraft","year":"2022","journal-title":"Marit. Technol. Res."},{"key":"ref_27","unstructured":"National Institute of Standards and Technology (2018). Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1, National Institute of Standards and Technology."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Progoulakis, I., Rohmeyer, P., and Nikitakos, N. (2021). Cyber physical systems security for maritime assets. J. Mar. Sci. Eng., 9.","DOI":"10.3390\/jmse9121384"},{"key":"ref_29","unstructured":"Veritas, D.N., and Lloyd, G. (2016). Cyber Security Resilience Management for Ships and Mobile Offshore Units in Operation, DNV-GL. DNVGL-RP-0496."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Drazovich, L., Brew, L., and Wetzel, S. (2021, January 26\u201328). Advancing the state of maritime cybersecurity guidelines to improve the resilience of the maritime transportation system. Proceedings of the IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece.","DOI":"10.1109\/CSR51186.2021.9527922"},{"key":"ref_31","unstructured":"Tuomala, V. (2021). Maritime Cybersecurity. Before the Risks Turn into Attacks, South-Eastern Finland University of Applied Sciences."},{"key":"ref_32","unstructured":"ABS (2021). Guide for Cybersecurity Implementation for the Marine and Offshore Industries, ABS CyberSafety."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"W65","DOI":"10.7326\/0003-4819-151-4-200908180-00136","article-title":"The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: Explanation and elaboration","volume":"151","author":"Liberati","year":"2009","journal-title":"Ann. Intern. Med."},{"key":"ref_34","unstructured":"Booth, A., Sutton, A., and Papaioannou, D. (2016). Systematic Approaches to a Successful Literature Review, Sage Publications."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"104908","DOI":"10.1016\/j.ssci.2020.104908","article-title":"A novel cyber-risk assessment method for ship systems","volume":"131","author":"Bolbot","year":"2020","journal-title":"Saf. Sci."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Alshehri, J., Alhamed, A., and Hafizur Rahman, M.M. (2024, January 19\u201322). A systematic literature review on cybersecurity risk management in smart cities. Proceedings of the Internationl Conference on Artificial Intelligence in Information and Communication (ICAIC), Osaka, Japan.","DOI":"10.1109\/ICAIIC60209.2024.10463312"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1108\/MBE-06-2019-0053","article-title":"Big data and performance measurement research: Trends, evolution and future opportunities","volume":"27","author":"Sardi","year":"2023","journal-title":"Meas. Bus. Excell."},{"key":"ref_38","unstructured":"Clarivate Analytics (2024). Journal Citation Reports, Clarivate."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"107078","DOI":"10.1016\/j.ocecoaman.2024.107078","article-title":"Current status and governance of data assets monetization in the global maritime industry: A comparative study of the United States, Europe, and China","volume":"251","author":"Yuan","year":"2024","journal-title":"Ocean Coast Manag."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"107082","DOI":"10.1016\/j.ocecoaman.2024.107082","article-title":"China\u2019s competition regulation in the maritime industry: Regulatory concerns, problems and potential implications","volume":"251","author":"Wang","year":"2024","journal-title":"Ocean Coast Manag."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1016\/j.joi.2017.08.007","article-title":"bibliometrix: An R-tool for comprehensive science mapping analysis","volume":"11","author":"Aria","year":"2017","journal-title":"J. Informetr."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1016\/j.ress.2019.04.037","article-title":"A Bayesian network based approach for modeling and assessing resilience: A case study of a full service deep water port","volume":"189","author":"Hossain","year":"2019","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"86542","DOI":"10.1109\/ACCESS.2022.3198947","article-title":"On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication","volume":"10","author":"Juvonen","year":"2022","journal-title":"IEEE Access"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"106480","DOI":"10.1016\/j.ocecoaman.2023.106480","article-title":"A BN driven FMEA approach to assess maritime cybersecurity risks","volume":"235","author":"Park","year":"2023","journal-title":"Ocean. Coast. Manag."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"9980","DOI":"10.1109\/JIOT.2020.2988733","article-title":"Secure and efficient data collection and storage of IoT in smart ocean","volume":"7","author":"Hu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_46","first-page":"2472","article-title":"DLTIF: Deep learning-driven cyber threat intelligence modeling and identification framework in IoT-enabled maritime transportation systems","volume":"24","author":"Kumar","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"4093","DOI":"10.1109\/TII.2018.2832853","article-title":"A security analysis method for industrial internet of things","volume":"14","author":"Mouratidis","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_48","first-page":"2503","article-title":"Intrusion detection for maritime transportation systems with batch federated aggregation","volume":"24","author":"Liu","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"102196","DOI":"10.1016\/j.cose.2021.102196","article-title":"Cyber security risk assessment for seaports: A case study of a container port","volume":"103","author":"Gunes","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Ben Farah, M.A., Ukwandu, E., Hindy, H., Brosset, D., Bures, M., Andonovic, I., and Bellekens, X. (2022). Cyber security in the maritime industry: A systematic survey of recent advances and future trends. Information, 13.","DOI":"10.3390\/info13010022"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Potamos, G., Stavrou, E., and Stavrou, S. (2024). Enhancing maritime cybersecurity through operational technology sensor data fusion: A comprehensive survey and analysis. Sensors, 24.","DOI":"10.3390\/s24113458"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"29493","DOI":"10.1109\/ACCESS.2022.3158943","article-title":"Cybersecurity attacks on software logic and error handling within AIS implementations: A systematic testing of resilience","volume":"10","author":"Khandker","year":"2022","journal-title":"IEEE Access"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"1030","DOI":"10.1109\/TASE.2019.2963257","article-title":"A recursive watermark method for hard real-time industrial control system cyber-resilience enhancement","volume":"17","author":"Song","year":"2020","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"2868","DOI":"10.1109\/TASE.2023.3270489","article-title":"Fully distributed hierarchical ET intrusion-and fault-tolerant group control for MASs with application to robotic manipulators","volume":"21","author":"Liu","year":"2024","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"103179","DOI":"10.1016\/j.cose.2023.103179","article-title":"A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS","volume":"128","author":"Sahay","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Aerts, G., and Mathys, G. (2024). Discovering trends in the digitalization of shipping: An exploratory study into trends using natural language processing. J. Mar. Sci. Eng., 12.","DOI":"10.3390\/jmse12040618"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MCOM.001.1900632","article-title":"Vessels cybersecurity: Issues, challenges, and the road ahead","volume":"58","author":"Caprolu","year":"2020","journal-title":"IEEE Commun. Mag."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Sharma, L. (2024). Maritime cybersecurity in the Indo-Pacific: Envisioning a role for the Quad. J. Indian Ocean. Reg., 1\u201323.","DOI":"10.1080\/19480881.2024.2341467"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Leite Junior, W.C., de Moraes, C.C., de Albuquerque, C.E.P., Machado, R.C.S., and de S\u00e1, A.O. (2021). A triggering mechanism for cyber-attacks in naval sensors and systems. Sensors, 21.","DOI":"10.3390\/s21093195"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"103383","DOI":"10.1016\/j.cose.2023.103383","article-title":"A systematic literature review on wireless security testbeds in the cyber-physical realm","volume":"133","author":"Kampourakis","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"6617","DOI":"10.1109\/TII.2020.2976840","article-title":"Shipping 4.0: Security requirements for the cyber-enabled ship","volume":"16","author":"Kavallieratos","year":"2020","journal-title":"IEEE Trans. Industr. Inform."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1057\/s41278-022-00214-0","article-title":"Cyber security risk assessment in autonomous shipping","volume":"24","author":"Tusher","year":"2022","journal-title":"Marit. Econ. Logist."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"17114","DOI":"10.1109\/ACCESS.2024.3357082","article-title":"Maritime autonomous surface ships: A review of cybersecurity challenges, countermeasures, and future perspectives","volume":"12","author":"Tabish","year":"2024","journal-title":"IEEE Access"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"108246","DOI":"10.1016\/j.ress.2021.108246","article-title":"A trustable architecture over blockchain to facilitate maritime administration for MASS systems","volume":"219","author":"Wang","year":"2022","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Yoo, J., and Jo, Y. (2023). Formulating cybersecurity requirements for autonomous ships using the SQUARE methodology. Sensors, 23.","DOI":"10.3390\/s23115033"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1080\/20464177.2023.2298521","article-title":"Adversarial waypoint injection attacks on Maritime Autonomous Surface Ships (MASS) collision avoidance systems","volume":"23","author":"Longo","year":"2024","journal-title":"J. Mar. Eng. Technol."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"3575","DOI":"10.1109\/TIFS.2023.3282132","article-title":"Attacking (and defending) the maritime radar system","volume":"18","author":"Longo","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Awan, M.S.K., and Al Ghamdi, M.A. (2019). Understanding the vulnerabilities in digital components of an integrated bridge system (IBS). J. Mar. Sci. Eng., 7.","DOI":"10.3390\/jmse7100350"},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Androjna, A., Brcko, T., Pavic, I., and Greidanus, H. (2020). Assessing cyber challenges of maritime navigation. J. Mar. Sci. Eng., 8.","DOI":"10.3390\/jmse8100776"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"2709","DOI":"10.1109\/TDSC.2021.3069428","article-title":"Auth-AIS: Secure, flexible, and backward-compatible authentication of vessels AIS broadcasts","volume":"19","author":"Sciancalepore","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"107934","DOI":"10.1016\/j.comnet.2021.107934","article-title":"Novel security models, metrics and security assessment for maritime vessel networks","volume":"189","author":"Enoch","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1017\/S0373463321000837","article-title":"Securing the Automatic Identification System (AIS): Using public key cryptography to prevent spoofing whilst retaining backwards compatibility","volume":"75","author":"Wimpenny","year":"2022","journal-title":"J. Navig."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"101426","DOI":"10.1016\/j.softx.2023.101426","article-title":"MaCySTe: A virtual testbed for maritime cybersecurity","volume":"23","author":"Longo","year":"2023","journal-title":"SoftwareX"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Lee, C., and Lee, S. (2023). Overcoming the DDoS attack vulnerability of an ISO 19847 shipboard data server. J. Mar. Sci. Eng., 11.","DOI":"10.3390\/jmse11051000"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"118059","DOI":"10.1016\/j.oceaneng.2024.118059","article-title":"Systematic literature review of threat modeling and risk assessment in ship cybersecurity","volume":"306","author":"Erbas","year":"2024","journal-title":"Ocean Eng."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1080\/20464177.2023.2292782","article-title":"A novel application of the CORAS framework for ensuring cyber hygiene on shipboard RADAR","volume":"23","author":"Kayisoglu","year":"2024","journal-title":"J. Mar. Eng. Technol."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"106493","DOI":"10.1016\/j.ocecoaman.2023.106493","article-title":"Maritime cybersecurity threats: Gaps and directions for future research","volume":"236","author":"Afenyo","year":"2023","journal-title":"Ocean. Coast. Manag."},{"key":"ref_78","first-page":"103724","article-title":"Physics-aware targeted attacks against maritime industrial control systems","volume":"82","author":"Longo","year":"2024","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Fenton, A.J. (2024). Preventing catastrophic cyber\u2013physical attacks on the global maritime transportation system: A case study of hybrid maritime security in the Straits of Malacca and Singapore. J. Mar. Sci. Eng., 12.","DOI":"10.20944\/preprints202401.1609.v1"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Uflaz, E., Sezer, S.I., Tun\u00e7el, A.L., Aydin, M., Akyuz, E., and Arslan, O. (2024). Quantifying potential cyber-attack risks in maritime transportation under Dempster\u2013Shafer theory FMECA and rule-based Bayesian network modelling. Reliab. Eng. Syst. Saf., 24.","DOI":"10.1016\/j.ress.2023.109825"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Hopcraft, R., Harish, A.V., Tam, K., and Jones, K. (2023). Raising the standard of maritime voyage data recorder security. J. Mar. Sci. Eng., 11.","DOI":"10.3390\/jmse11020267"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Guo, J., and Guo, H. (2023). Real-time risk detection method and protection strategy for intelligent ship network security based on cloud computing. Symmetry, 15.","DOI":"10.3390\/sym15050988"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"103855","DOI":"10.1016\/j.apor.2023.103855","article-title":"Risk sensitivity analysis of AIS cyber security through maritime cyber regulatory frameworks","volume":"142","author":"Soner","year":"2024","journal-title":"Appl. Ocean Res."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Paraskevas, A., Madas, M., Zeimpekis, V., and Fouskas, K. (2024). Smart ports in industry 4.0: A systematic literature review. Logistics, 8.","DOI":"10.3390\/logistics8010028"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"53646","DOI":"10.1109\/ACCESS.2024.3387529","article-title":"An edge computing-based preventive framework with machine learning- integration for anomaly detection and risk management in maritime wireless communications","volume":"12","author":"Algarni","year":"2024","journal-title":"IEEE Access"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"100571","DOI":"10.1016\/j.ijcip.2022.100571","article-title":"Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis","volume":"39","author":"Bolbot","year":"2022","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_87","unstructured":"Cimpean, D., Meire, J., Bouckaert, V., Stijn, V.C., Pelle, A., and Hellebooge, L. (2011). Analysis of Cyber Security Aspects in the Maritime Sector, ENISA."},{"key":"ref_88","unstructured":"Anderson, L.W., Peter, W., Airasian, K., and Cruikshank, D.R. (2001). A Taxonomy for Learning, Teaching, and Assessing, Longman."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"105138","DOI":"10.1016\/j.marpol.2022.105138","article-title":"Maritime cybersecurity and the IMO legal instruments: Sluggish response to an escalating threat?","volume":"143","author":"Karim","year":"2022","journal-title":"Mar. Policy"},{"key":"ref_90","unstructured":"BIMCO (2021). The Guidelines on Cyber Security Onboard Ships, BIMCO."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"144895","DOI":"10.1109\/ACCESS.2021.3122433","article-title":"Cyber risk perception in the maritime domain: A systematic literature review","volume":"9","author":"Larsen","year":"2021","journal-title":"IEEE Access"},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1017\/S0373463319000808","article-title":"Towards a cyber secure shipboard radar","volume":"73","author":"Svilicic","year":"2020","journal-title":"J. Navig."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Kapalidis, C., Karamperidis, S., Watson, T., and Koligiannis, G. (2022). A vulnerability centric System of Systems Analysis on the maritime transportation sector most valuable assets: Recommendations for port facilities and ships. J. Mar. Sci. Eng., 10.","DOI":"10.3390\/jmse10101486"},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Oruc, A., Amro, A., and Gkioulos, V. (2022). Assessing cyber risks of an INS using the MITRE ATT & CK framework. Sensors, 22.","DOI":"10.3390\/s22228745"},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.ijinfomgt.2015.11.009","article-title":"Information security management needs more holistic approach: A literature review","volume":"36","author":"Soomro","year":"2016","journal-title":"Int. J. Inf. Manag."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"105151","DOI":"10.1016\/j.ssci.2020.105151","article-title":"Maritime safety: Prevention versus mitigation?","volume":"136","author":"Puisa","year":"2021","journal-title":"Saf. Sci."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1016\/j.ijnaoe.2016.05.012","article-title":"Enforcement of opacity security properties for ship information system","volume":"8","author":"Xing","year":"2016","journal-title":"Int. J. Nav. Archit. Ocean Eng."},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Kotis, K., Stavrinos, S., and Kalloniatis, C. (2022). Review on semantic modeling and simulation of cybersecurity and interoperability on the Internet of Underwater Things. Future Internet, 15.","DOI":"10.3390\/fi15010011"},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.csi.2017.09.006","article-title":"Cyber-attack path discovery in a dynamic supply chain maritime risk management system","volume":"56","author":"Polatidis","year":"2018","journal-title":"Comput. Stand. Interfaces."},{"key":"ref_100","first-page":"2411","article-title":"A provably secure mobile user authentication scheme for big data collection in IoT-enabled maritime intelligent transportation system","volume":"24","author":"Mahmood","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_101","first-page":"2538","article-title":"An adaptive network security system for IoT-enabled maritime transportation","volume":"24","author":"Gyamfi","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1016\/j.future.2019.05.049","article-title":"CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships","volume":"100","author":"Sahay","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Amro, A., Oruc, A., Gkioulos, V., and Katsikas, S. (2022). Navigation data anomaly analysis and detection. Information, 13.","DOI":"10.20944\/preprints202201.0322.v1"},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1002\/rob.22068","article-title":"Hijacking of unmanned surface vehicles: A demonstration of attacks and countermeasures in the field","volume":"39","author":"Volden","year":"2022","journal-title":"J. Field Robot."},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"128055","DOI":"10.1109\/ACCESS.2021.3112899","article-title":"Boosting the decision-making in smart ports by using blockchain","volume":"9","author":"Duran","year":"2021","journal-title":"IEEE Access"},{"key":"ref_106","first-page":"2988","article-title":"Assessing and reviewing of cyber-security threats, attacks, mitigation techniques in IoT environment","volume":"100","author":"Albalawi","year":"2022","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"66839","DOI":"10.1109\/ACCESS.2021.3076918","article-title":"Security testing for naval ship combat system software","volume":"9","author":"Yi","year":"2021","journal-title":"IEEE Access"},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"100526","DOI":"10.1016\/j.ijcip.2022.100526","article-title":"Digital transformation of the maritime industry: A cybersecurity systemic approach","volume":"37","author":"Kechagias","year":"2022","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"508","DOI":"10.1080\/14778238.2018.1486789","article-title":"Knowledge management methodology for identifying threats in maritime\/logistics supply chains","volume":"16","author":"Kalogeraki","year":"2018","journal-title":"Knowl. Manag. Res. Pract."},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"103429","DOI":"10.1016\/j.csi.2020.103429","article-title":"SafeSec Tropos: Joint security and safety requirements elicitation","volume":"70","author":"Kavallieratos","year":"2020","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1017\/S0373463318001157","article-title":"Maritime cyber risk management: An experimental ship assessment","volume":"72","author":"Svilicic","year":"2019","journal-title":"J. Navig."},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"108569","DOI":"10.1016\/j.oceaneng.2021.108569","article-title":"A system-theoretic approach to safety and security co-analysis of autonomous ships","volume":"222","author":"Zhou","year":"2021","journal-title":"Ocean Eng."},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"105139","DOI":"10.1016\/j.ssci.2020.105139","article-title":"An STPA-based formal composition framework for trustworthy autonomous maritime systems","volume":"136","author":"Dghaym","year":"2021","journal-title":"Saf. Sci."},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Jo, Y., Choi, O., You, J., Cha, Y., and Lee, D.H. (2022). Cyberattack models for ship equipment based on the MITRE ATT&CK framework. Sensors, 22.","DOI":"10.3390\/s22051860"},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"Nganga, A., Nganya, G., L\u00fctzh\u00f6ft, M., Mallam, S., and Scanlan, J. (2023). Bridging the gap: Enhancing maritime vessel cyber resilience through security operation centers. Sensors, 24.","DOI":"10.3390\/s24010146"},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1080\/20464177.2024.2330176","article-title":"Future of maritime autonomy: Cybersecurity, trust and mariner\u2019s situational awareness","volume":"23","author":"Hopcraft","year":"2024","journal-title":"J. Mar. Eng. Technol."},{"key":"ref_117","first-page":"2286409","article-title":"Digital tools and challenges in human resource development and its potential within the maritime sector through bibliometric analysis","volume":"7","author":"Autsadee","year":"2023","journal-title":"J. Int. Marit. Saf. Environ. Aff. Shipp."},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Lee, C., and Lee, S. (2023). Evaluating the vulnerability of YOLOv5 to adversarial attacks for enhanced cybersecurity in MASS. J. Mar. Sci. Eng., 11.","DOI":"10.3390\/jmse11050947"},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"105592","DOI":"10.1016\/j.marpol.2023.105592","article-title":"Cyber-seaworthiness: A critical review of the literature","volume":"151","author":"Schinas","year":"2023","journal-title":"Mar. Policy"},{"key":"ref_120","doi-asserted-by":"crossref","unstructured":"Kavallieratos, G., and Katsikas, S. (2020). Managing cyber security risks of the cyber-enabled ship. J. Mar. Sci. Eng., 8.","DOI":"10.3390\/jmse8100768"},{"key":"ref_121","first-page":"102916","article-title":"Stakeholder perspectives and requirements on cybersecurity in Europe","volume":"61","author":"Alcaraz","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_122","doi-asserted-by":"crossref","unstructured":"Oruc, A., Gkioulos, V., and Katsikas, S. (2022). Towards a Cyber-Physical Range for the Integrated Navigation System (INS). J. Mar. Sci. Eng., 10.","DOI":"10.3390\/jmse10010107"},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Freire, W.P., Melo Jr, W.S., do Nascimento, V.D., Nascimento, P.R., and de S\u00e1, A.O. (2022). Towards a secure and scalable Maritime Monitoring System using blockchain and low-cost IoT technology. Sensors, 22.","DOI":"10.3390\/s22134895"},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Spravil, J., Hemminghaus, C., von Rechenberg, M., Padilla, E., and Bauer, J. (2023). Detecting maritime GPS spoofing attacks based on NMEA sentence integrity monitoring. J. Mar. Sci. Eng., 11.","DOI":"10.3390\/jmse11050928"},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1017\/S0373463322000595","article-title":"Cybersecurity risk assessment of VDR","volume":"76","author":"Kayisoglu","year":"2023","journal-title":"J. Navig."},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1007\/s11135-022-01382-0","article-title":"Recent trends and proposed response strategies of international standards related to shipbuilding equipment big data integration platform","volume":"57","author":"Lim","year":"2023","journal-title":"Qual. Quant."},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Illiashenko, O., Kharchenko, V., Babeshko, I., Fesenko, H., and Di Giandomenico, F. (2023). Security-informed safety analysis of autonomous transport systems considering AI-powered cyberattacks and protection. Entropy, 25.","DOI":"10.3390\/e25081123"},{"key":"ref_128","doi-asserted-by":"crossref","unstructured":"Svilicic, B., Rudan, I., Jugovi\u0107, A., and Zec, D. (2019). A study on cyber security threats in a shipboard integrated navigational system. J. Mar. Sci. Eng., 7.","DOI":"10.3390\/jmse7100364"},{"key":"ref_129","first-page":"100173","article-title":"Industry 4.0 in the port and maritime industry: A literature review","volume":"20","author":"Soeane","year":"2020","journal-title":"J. Ind. Inf. Integr."},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1017\/S0373463302002072","article-title":"AIS the cornerstone of national security?","volume":"56","author":"Creech","year":"2003","journal-title":"J. Navig."},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"105772","DOI":"10.1016\/j.marpol.2023.105772","article-title":"Critical maritime infrastructure protection: What\u2019s the trouble?","volume":"155","author":"Bueger","year":"2023","journal-title":"Mar. Policy"},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"1364","DOI":"10.1017\/S0373463322000534","article-title":"Evaluating SLIM-based human error probability for ECDIS cybersecurity in maritime","volume":"75","author":"Kayisoglu","year":"2022","journal-title":"J. Navig."},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1017\/S0373463318000164","article-title":"Enhancing navigator competence by demonstrating maritime cyber security","volume":"71","author":"Hareide","year":"2018","journal-title":"J. Navig."},{"key":"ref_134","doi-asserted-by":"crossref","unstructured":"Liu, J., Li, C., Bai, J., Luo, Y., Lv, H., and Lv, Z. (2021). Security in IoT-enabled digital twins of maritime transportation systems. IEEE Trans. Intell. Transp. Syst., 1\u20139.","DOI":"10.1109\/TITS.2021.3122566"},{"key":"ref_135","doi-asserted-by":"crossref","unstructured":"Amro, A., and Gkioulos, V. (2023). Evaluation of a cyber risk assessment approach for cyber\u2013physical systems: Maritime- and energy-use cases. J. Mar. Sci. Eng., 11.","DOI":"10.20944\/preprints202303.0135.v1"},{"key":"ref_136","doi-asserted-by":"crossref","unstructured":"Mohd Salleh, N.H., Selvaduray, M., Jeevan, J., Ngah, A.H., and Zailani, S. (2021). Adaptation of Industrial Revolution 4.0 in a seaport system. Sustainability, 13.","DOI":"10.3390\/su131910667"},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"110162","DOI":"10.1016\/j.oceaneng.2021.110162","article-title":"The impact of shipping 4.0 on controlling shipping accidents: A systematic literature review","volume":"243","author":"Sepehri","year":"2022","journal-title":"Ocean Eng."},{"key":"ref_138","unstructured":"Luft, L.A., Anderson, L., and Cassidy, F. (2002, January 28\u201330). NMEA 2000: A digital interface for the 21st century. Proceedings of the 2002 National Technical Meeting of The Institute of Navigation, San Diego, CA, USA."},{"key":"ref_139","doi-asserted-by":"crossref","unstructured":"Maturana, M.C., De Abreu, D., and Martins, M.R. (2022). Preliminary hazard analysis of vessel maneuvers in access channels to port terminals. Trends in Maritime Technology and Engineering, CRC Press.","DOI":"10.1201\/9781003320289-26"},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.tre.2019.06.004","article-title":"The strategic role of logistics in the industry 4.0 era","volume":"129","author":"Tang","year":"2019","journal-title":"Transp. Res. Part E Logist. Transp. Rev."},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"107324","DOI":"10.1016\/j.ress.2020.107324","article-title":"Risk assessment of the operations of maritime autonomous surface ships","volume":"207","author":"Chang","year":"2021","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_142","doi-asserted-by":"crossref","unstructured":"Pleshakova, E., Osipov, A., Gataullin, S., Gataullin, T., and Vasilakos, A. (2024). Next gen cybersecurity paradigm towards artificial general intelligence: Russian market challenges and future global technological trends. J. Comput. Virol. Hacking Tech.","DOI":"10.1007\/s11416-024-00529-x"},{"key":"ref_143","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/TSG.2014.2298195","article-title":"Model-Based Attack Detection and Mitigation for Automatic Generation Control","volume":"5","author":"Sridhar","year":"2014","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_144","doi-asserted-by":"crossref","unstructured":"Tsapin, D., Pitelinskiy, K., Suvorov, S., Osipov, A., Pleshakova, E., and Gataullin, S. (2023). Machine learning methods for the industrial robotic systems security. J. Comput. Virol. Hacking Tech.","DOI":"10.1007\/s11416-023-00499-6"},{"key":"ref_145","unstructured":"Grech, A., Simpson, P., and Zammit, R. (2024, January 2\u20136). Exploring the opportunities of generative artificial intelligence in concept ship design. Proceedings of the 15th International Marine Design Conference, Amsterdam, The Netherlands."},{"key":"ref_146","doi-asserted-by":"crossref","unstructured":"Wolf, M.J., Grodzinsky, F., and Miller, K.W. (2024). Generative AI and Its Implications for Definitions of Trust. Information, 15.","DOI":"10.3390\/info15090542"},{"key":"ref_147","doi-asserted-by":"crossref","unstructured":"Alowibdi, J.S. (2024). Gender Prediction of Generated Tweets Using Generative AI. Information, 15.","DOI":"10.3390\/info15080452"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/11\/710\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:26:56Z","timestamp":1760113616000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/11\/710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,6]]},"references-count":147,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["info15110710"],"URL":"https:\/\/doi.org\/10.3390\/info15110710","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,6]]}}}