1 |
J.E. Vinnem, and I.B. Utne, "Risk from cyberattacks on autonomous ships." Safety and Reliability-Safe Societies in a Changing World, CRC Press, pp. 1485-1492, June. 2018.
|
2 |
A. Noel, K. Shreyanka, Kumar, K.G.S., Shameem, B.M. and B. Akshar, "Autonomous ship navigation methods: A review," Proc. Int. Conf. Marine Eng. Technol. Oman, pp. 161-174, Nov. 2019.
|
3 |
S. Guo, X. Zhang, Y. Zheng and Y. Du, "An autonomous path planning model for unmanned ships based on deep reinforcement learning," Sensors, vol. 20, no. 2: 426. Jan. 2020.
DOI
|
4 |
N. Im, "A study on ship automatic berthing with assistance of auxiliary devices," International Journal of Naval Architecture and Ocean Engineering, vol. 4, no. 3, pp. 199-210, Sep. 2012.
DOI
|
5 |
N.K. Im and V.S. Nguyen, "Artificial neural network controller for automatic ship berthing using head-up coordinate system," International Journal of Naval Architecture and Ocean Engineering, vol. 10, no. 3, pp. 235-249, May. 2018.
DOI
|
6 |
K.D. Gupta, D. Dasgupta and Z. Akhtar, "Applicability issues of evasion-based adversarial attacks and mitigation techniques," In 2020 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1506-1515, Dec. 2020.
|
7 |
Y. Yao, H. Li, H. Zheng and B.Y. Zhao, "Latent backdoor attacks on deep neural networks," Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2041-2055, Nov. 2019.
|
8 |
E.L.H. Rorvik, "Automatic docking of an autonomous surface vessel," Master thesis. Norwegian University of Science and Technology (NTNU), Feb. 2020.
|
9 |
V.S. Nguyen, V.C. Do and N.K. Im, "Development of automatic ship berthing system using artificial neural network and distance measurement system," International journal of Fuzzy logic and Intelligent systems, vol. 18, no. 1, pp. 41-49, Mar. 2018.
DOI
|
10 |
N. Mizuno and R. Kuboshima "Implementation and evaluation of non-linear optimal feedback control for ship's automatic berthing by recurrent neural network," IFAC-PapersOnLine, vol. 52, no. 21, pp. 91-96, Sep. 2019.
DOI
|
11 |
A. Levine and S. Feizi, "Deep partition aggregation: Provable defense against general poisoning attacks," arXiv preprint arXiv:2006.14768. Mar. 2021.
|
12 |
K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, C. Xiao and D. Song, "Robust physical-world attacks on deep learning visual classification," Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1625-1634, Dec. 2018.
|
13 |
G. Kavallieratos, V. Diamantopoulou, and K. S. Katsikas, "Shipping 4.0: Security requirements for the cyber-enabled ship," IEEE Transactions on Industrial Informatics, vol. 16, no. 10, pp. 6617-6625, Feb. 2020.
DOI
|
14 |
Y. Takefuji, "Connected vehicle security vulnerabilities [commentary]," IEEE Technology and Society Magazine, vol. 37, no. 1, pp. 15-18. Mar. 2018.
DOI
|
15 |
R. Changalvala and H. Malik, "LiDAR data integrity verification for autonomous vehicle," IEEE Access, vol. 7, pp. 138018-138031, Sep. 2019.
DOI
|
16 |
A. Costin, "Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations," Proceedings of the 6th international workshop on trustworthy embedded devices, pp. 45-54, Oct. 2016.
|
17 |
CyberKeel, "Maritime Cyber-Risks: Virtual Pirates at Large on the Cyber Seas," NCC Group Publication, Oct. 2014.
|
18 |
J. Wagstaff, "All at sea: global shipping fleet exposed to hacking threat," Reuters, Apr. 24. 2014.
|
19 |
J. Coffed, "The threat of gps jamming: The risk to an information utility," Report of EXELIS, Feb. 2014
|
20 |
A. Costin, "Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations," Proceedings of the 6th international workshop on trustworthy embedded devices, pp. 45-54, Oct. 2016.
|
21 |
B. Muthusenthil and H.S. Kim, "CCTV Surveillance System, attacks and design goals," International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 4, pp. 2072-2082, Aug. 2018.
DOI
|
22 |
J. Wang and S.M. Zhang, "Management of human error in shipping operations," Professional safety, vol. 45, no. 10, pp. 23-28. Oct. 2000.
|
23 |
Korea Autonomous Surface Ship, "autonomous ship effect," https://kassproject.org/?menucode=10700&tmenu=content, Feb 3, 2022.
|
24 |
E. Jokioinen, "Redefining shipping:Remote and Autonomous Ship-Thenext steps," vol. 4, no. 5, AAWA whitepaper, Ship Intelligence Marine, June. 2016.
|
25 |
M.S. Zaghloul, "Online ship control system using Supervisory Control and Data Acquisition (SCADA)," International Journal of Computer Science and Application, vol. 3, no. 1, pp. 6-10, Feb. 2014.
DOI
|
26 |
BIMCO. The Guidelines on Cyber Security Onboard Ships, Version 4, BIMCO, Dec. 2020.
|
27 |
M. Fredrikson, S. Jha and T. Ristenpart, "Model inversion attacks that exploit confidence information and basic countermeasures," Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp. 1322-1333, Oct. 2015.
|
28 |
D. Lee, S.J. Lee and Y.J. Seo, "Application of recent developments in deep learning to ANN-based automatic berthing systems," International Journal of Engineering and Technology Innovation, vol. 10, no. 1, pp. 75-90, Jan. 2020.
DOI
|
29 |
A. Humayed, J. Lin, F. Li and B. Luo, "Cyber-physical systems security-A survey," IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1802-1831, May. 2017.
DOI
|
30 |
Sun-seon Kwon, "Technology Trends of AI and Big Data," TTA journal, 187(393), pp. 38-44, Jan. 2020.
|
31 |
O.J. Rodseth, B. Kvamstad, T. Porathe and H.C. Burmeister, "Communication architecture for an unmanned merchant ship," 2013 MTS/IEEE OCEANS-Bergen, pp. 1-9, June. 2013.
|
32 |
R. Royce, "Autonomous ships: The next step," Marine Ship Intelligence. 2017.
|
33 |
K.D. Jones, K. Tam and M. Papadaki, "Threats and impacts in maritime cyber security," Engineering& Technology Reference, Apr. 2016.
|
34 |
M. Hoyhtya, J. Huusko, M. Kiviranta,K. Solberg, and J. Rokka, "Connectivity for autonomous ships: Architecture, use cases, and research challenges," 2017 International Conference on Information and Communication Technology Convergence (ICTC), IEEE, pp. 345-350, Oct. 2017.
|
35 |
K.W. Kug, "Case of application by artificial intelligence technology and industry field," ISSN 1225-6447. Weekly ICT Trends, IITP, pp. 15-27, Mar. 2019.
|
36 |
N. Kaloudi and J. Li, "The ai-based cyber threat landscape: A survey," ACM Computing Surveys (CSUR), vol. 53, no. 1, pp. 1-34, 2020.
|
37 |
MSC. 1/Circ. 1638. "Outcome of the Regulatory Scoping Exercise for the Use of Maritime Autonomous Surface Ships (MASS)," IMO, June. 2021.
|
38 |
J. Kim and H.S. Jang, "Technology trends and preparations for autonomous ships," Bulletin of the Society of Naval Architects of Korea, 56(4), pp. 4-7, Dec. 2019.
|
39 |
S.K. Singh and F. Heymann, "Machine learning-assisted anomaly detection in maritime navigation using AIS data," 2020 IEEE/ION Position, Location and Navigation Symposium (PLANS), pp. 832-838, Apr. 2020.
|
40 |
S.J. Lee, H.C. Lee, H.H. Song, H.S. Jeon and T.H. Im, "Comparative Analysis of CNN Deep Learning Model Performance Based on Quantification Application for High-Speed Marine Object Classification," Journal of Internet Computing and Services (JICS), 22(2), pp. 59-68, Feb. 2021.
DOI
|
41 |
W. Jiang, H. Li, S. Liu, X. Luo and R. Lu, "Poisoning and evasion attacks against deep learning algorithms in autonomous vehicles," IEEE transactions on vehicular technology, vol. 69 no. 4, pp. 4439-4449. Apr. 2020.
DOI
|
42 |
I. Evtimov, K. Eykholt, E. Fernandes, T. Kohno, B. Li, A. Prakash, and D. Song, "Robust physical-world attacks on machine learning models," arXiv preprint arXiv:1707.08945, vol. 2, no. 3:4, Apr. 2018.
|
43 |
A. Goudosis and S. Katsikas, "Secure AIS with identity-based authentication and encryption," 2020
|
44 |
L.P. Perera, "Autonomous ship navigation under deep learning and the challenges in COLREGs," International Conference on Offshore Mechanics and Arctic Engineering, June. 2018.
|
45 |
D. Qiao, G. Liu, T. Lv, W. Li and J. Zhang, "Marine vision-based situational awareness using discriminative deep learning: A survey," Journal of Marine Science and Engineering, vol. 9, no. 4:397, Apr. 2021.
DOI
|
46 |
M. Caprolu, R. Di Pietro, S. Raponi, S. Sciancalepore and P. Tedeschi, "Vessels cybersecurity: Issues, challenges, and the road ahead," IEEE Communications Magazine, vol. 58, no. 6, pp. 90-96, June. 2020.
DOI
|
47 |
D.S. Fowler, A.T. Le and C. Maple, "LiDAR Sensor Security of a Driverless Pod," May. 2021.
|
48 |
J. Petit, B. Stottelaar, M. Feiri and F. Kargl, "Remote attacks on automated vehicles sensors: Experiments on camera and lidar," Black Hat Europe, Nov. 2015.
|
49 |
K. Tam and K. Jones, "Cyber-risk assessment for autonomous ships," 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), IEEE, pp. 1-8, June. 2018.
|
50 |
G. Apruzzese, M. Andreolini, M. Marchetti, V.G. Colacino and G. Russo, "AppCon: Mitigating evasion attacks to ML cyber detectors," Symmetry, vol. 12, no. 4, pp. 653, Apr. 2020.
DOI
|
51 |
D. Schmidt, K. Radke, S. Camtepe, E. Foo and M. Ren, "A survey and analysis of the GNSS spoofing threat and countermeasures," ACM Computing Surveys (CSUR), vol. 48,no. 4, pp. 1-31, May. 2016.
|
52 |
D. Nguyen, R. Vadaine, G. Hajduch, R. Garello and R. Fablet, "A multi-task deep learning architecture for maritime surveillance using AIS data streams," 2018 IEEE 5th International Conference on Data Science and Advanced Analytics (DSAA), pp. 331-340, Oct. 2018.
|
53 |
S. Park and D. Choi, "Artificial intelligence security issues," Review of KIISC, 27(3), pp. 27-32, June. 2017.
|
54 |
M. Guri, G. Kedma, A. Kachlon and Y. Elovici, "AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies," 2014 9th International Conference on Malicious and Unwanted Software: The Americas(MALWARE), pp. 58-67, Oct. 2014.
|
55 |
C. Benzaid and T. Taleb, "AI for beyond 5G networks: a cyber-security defense or offense enabler?," IEEE Network, vol. 34, no. 6, pp. 140-147, Sep. 2020.
|
56 |
S. Ahvenjarvi, "The human element and autonomous ships," TransNav: International Journal on Marine Navigation and Safety of Sea Transportation, vol. 10 no. 3, pp. 517-521, Oct. 2016.
DOI
|
57 |
V. Bolbot, G. Theotokatos, E. Boulougouris and D. Vassalos, "Safety related cyber-attacks identification and assessment for autonomous inland ships," International Seminar on Safety and Security of Autonomous Vessels (ISSAV), Sep. 2019.
|
58 |
S. Thombre, Z. Zhao, H. Ramm-Schmidt, J.M.V. Garcia, T. Malkamaki, S. Nikolskiy and V.V. Lehtola, "Sensors and AI Techniques for Situational Awareness in Autonomous Ships: A Review," in IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 1, pp. 64-83, Jan. 2022.
DOI
|
59 |
L.P. Perera, V. Ferrari, F.P. Santos, M.A. Hinostroza and C.G. Soares, "Experimental evaluations on ship autonomous navigation and collision avoidance by intelligent guidance," IEEE Journal of Oceanic Engineering, vol. 40, no. 2, pp. 374-387, 2014.
DOI
|
60 |
C. Wang, X. Zhang, R. Li and P. Dong, "Path planning of maritime autonomous surface ships in unknown environment with reinforcement learning," International Conference on Cognitive Systems and Signal Processing, Springer, Singapore, pp. 127-137, Nov. 2018.
|
61 |
C. Heffner, "Exploiting surveillance cameras like a hollywood hacker," Black Hat USA 2013, Aug. 2013.
|
62 |
R. Santamarta, "Maritime security: Hacking into a voyage data recorder (VDR)," IOActive [Online], Dec. 2015.
|
63 |
R. Santamarta, "SATCOM terminals: Hacking by air, sea, and land," BlackHat USA 2014. Aug. 2014.
|
64 |
I.J. Goodfellow, J. Shlens and C. Szegedy, "Explaining and harnessing adversarial examples," arXiv preprint arXiv:1412.6572, Mar. 2015.
|
65 |
K. Tam and K. Jones, "Cyber-risk assessment for autonomous ships," 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), IEEE, pp. 1-8, June. 2018.
|