Show simple item record

dc.contributor.authorTam, K
dc.contributor.authorJones, Kevin
dc.date.accessioned2018-04-10T11:39:11Z
dc.date.issued2018-12-06
dc.identifier.isbn978-1-5386-4683-0
dc.identifier.urihttp://hdl.handle.net/10026.1/11245
dc.description.abstract

As a 183.3 Billion industry controlling 90 % of all world trade, the shipping community is continuously looking for methods to increase profits while still considering human and environmental safety. As a result of developing technologies and policy that make autonomy a feasible solution, at least three separate organizations are aiming to produce and sail their first autonomous ships by 2020. Thus it is essential to begin assessing their cyber-risk profiles in order to rank and mitigate any vulnerabilities. As existing risk models for physical ship safety and autonomous cars do not adequately represent the unique nature of cyber-threats for autonomous vessels within the maritime sector, this article applies a model-based risk assessment framework named MaCRA which had previous only been used to model existing ships, not those of the near-future.

dc.format.extent1-8
dc.language.isoen
dc.publisherIEEE
dc.subjectPrevention
dc.titleCyber-Risk Assessment for Autonomous Ships
dc.typeconference
dc.typeConference Proceeding
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000458747300025&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.date-start2018-06-11
plymouth.date-finish2018-06-12
plymouth.volume00
plymouth.conference-nameCyber Security
plymouth.publication-statusPublished
plymouth.journal2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
dc.identifier.doi10.1109/cybersecpods.2018.8560690
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics/SoECM - Manual
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dc.publisher.placeGlasgow
dcterms.dateAccepted2018-03-31
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1109/cybersecpods.2018.8560690
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2018-12-06
rioxxterms.typeConference Paper/Proceeding/Abstract


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV