Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
In this paper we detail the security vulnerabilities of such unmanned ships. The attack surface as well as motivations for attack attempts also are discussed to ...
The first is to create a continuous monitoring system that can provide real-time situation awareness of the ship's security health status [65, 67,68]. In this ...
Jun 1, 2019 · Abstract—By 2020, unmanned ships such as remotely con- trolled boats and autonomous vessels would become operational,.
In this paper we detail the security vulnerabilities of such unmanned ships. The attack surface as well as motivations for attack attempts also are discussed to ...
People also ask
Being still under development, the effects of cyberattacks on autonomous vessels are not yet apparent. It is more efficient to consider security issues in the ...
The last segment of the paper describes a structured approach to mitigate high-risk threats. Keywords. Unmanned systems, autonomous systems, unmanned aerial ...
"Cybersecurity Attacks and Defences for Unmanned Smart Ships." 2018 IEEE Conferences on Internet of Things, Green Computing, and Communications, Cyber ...
May 24, 2023 · Cyberthreats and cybersecurity requirements are formulated for autonomous ships by employing the security quality requirements engineering (SQUARE) methodology.
Missing: Defences | Show results with:Defences
Other cyber attack methods are evolving such as impersonating a legitimate shore-based employee in a shipping company to obtain valuable information, which can ...
Discover more about: Cybersecurity. Conference Paper. Cybersecurity Attacks and Defences for Unmanned Smart Ships. July 2018. Bilhanan Silverajan · Mert Ocak ...