2021 Thirteenth International Conference on Contemporary Computing (IC3-2021) 2021
DOI: 10.1145/3474124.3474213
|View full text |Cite
|
Sign up to set email alerts
|

Integrating and Validating Maritime Transport Security Services: Initial results from the CS4EU demonstrator

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…The authors surveyed the vessel cybersecurity management system consisting of several defense layers including, physical access, patching, access control, and others. Grigoriadis et al [26] proposed a group of defenses for improving the cybersecurity of ports including vulnerability assessment, communication authenticity, weak password protection, and binary protection. Kavallieratos et al [27] leveraged the STRIDE and DREAD risk analysis techniques to assess cyber risks in cyber-enabled ships, which include autonomous and remotely controlled ships.…”
Section: Maritime Cyber Risk Managementmentioning
confidence: 99%
See 4 more Smart Citations
“…The authors surveyed the vessel cybersecurity management system consisting of several defense layers including, physical access, patching, access control, and others. Grigoriadis et al [26] proposed a group of defenses for improving the cybersecurity of ports including vulnerability assessment, communication authenticity, weak password protection, and binary protection. Kavallieratos et al [27] leveraged the STRIDE and DREAD risk analysis techniques to assess cyber risks in cyber-enabled ships, which include autonomous and remotely controlled ships.…”
Section: Maritime Cyber Risk Managementmentioning
confidence: 99%
“…Surveys through checklists and questionnaires are the most common method. Surveys focus on aspects including market research; quality and cost of controls [54], stakeholder engagement [26], usability and quality of risk assessment frameworks [80,81], existence, revision and awareness of controls [25]. Risk evaluation including risk and residual risk estimation and assessment is usually combined with another approach such as assessing the risks in scenarios using a game-based approach [82] or through questionnaires [54,81].…”
Section: Evaluation Approachesmentioning
confidence: 99%
See 3 more Smart Citations