[HTML][HTML] Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis
V Bolbot, K Kulkarni, P Brunou, OV Banda… - International Journal of …, 2022 - Elsevier
Ships and maritime infrastructure are becoming increasingly interconnected as the maritime
industry is undergoing the industry 4.0 revolution. This development is associated with novel …
industry is undergoing the industry 4.0 revolution. This development is associated with novel …
Low earth orbit satellite security and reliability: Issues, solutions, and the road ahead
Low Earth Orbit (LEO) satellites undergo a period of rapid development driven by ever-
increasing user demands, reduced costs, and technological progress. Since there is a lack …
increasing user demands, reduced costs, and technological progress. Since there is a lack …
A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems
Cybersecurity incident response is a very crucial part of the cybersecurity management
system. Adversaries emerge and evolve with new cybersecurity tactics, techniques, and …
system. Adversaries emerge and evolve with new cybersecurity tactics, techniques, and …
[HTML][HTML] Multi-scale collision risk estimation for maritime traffic in complex port waters
Ship collision risk estimation is an essential component of intelligent maritime surveillance
systems. Traditional risk estimation approaches, which can only analyze traffic risk in one …
systems. Traditional risk estimation approaches, which can only analyze traffic risk in one …
[HTML][HTML] Navigating the sea of data: a comprehensive review on data analysis in maritime IoT applications
The Internet of Things (IoT) is significantly transforming the maritime industry, enabling the
generation of vast amounts of data that can drive operational efficiency, safety, and …
generation of vast amounts of data that can drive operational efficiency, safety, and …
Malware detection using image representation of malware data and transfer learning
With the increased proliferation of internet-enabled mobile devices and large internet use,
cybercrime incidents have grown exponentially, often leading to huge financial losses. Most …
cybercrime incidents have grown exponentially, often leading to huge financial losses. Most …
[HTML][HTML] A cluster-tree-based trusted routing algorithm using Grasshopper Optimization Algorithm (GOA) in Wireless Sensor Networks (WSNs)
In wireless sensor networks (WSNs), existing routing protocols mainly consider energy
efficiency or security separately. However, these protocols must be more comprehensive …
efficiency or security separately. However, these protocols must be more comprehensive …
Quantifying potential cyber-attack risks in maritime transportation under Dempster–Shafer theory FMECA and rule-based Bayesian network modelling
Maritime cyber security is a growing concern in the shipping industry as reliance on
technology increases. With the potential for cyber attacks to disrupt vessel operations …
technology increases. With the potential for cyber attacks to disrupt vessel operations …
[HTML][HTML] A survey on the role of industrial IOT in manufacturing for implementation of smart industry
The Internet of Things (IoT) is an innovative technology that presents effective and attractive
solutions to revolutionize various domains. Numerous solutions based on the IoT have been …
solutions to revolutionize various domains. Numerous solutions based on the IoT have been …
UAV-assisted secure uplink communications in satellite-supported IoT: Secrecy fairness approach
The escalating growth of the Internet of Things (IoT) has intensified the demand for
dependable and efficient communication networks to accommodate the massive data …
dependable and efficient communication networks to accommodate the massive data …