Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis
Ships and maritime infrastructure are becoming increasingly interconnected as the maritime
industry is undergoing the industry 4.0 revolution. This development is associated with novel …
industry is undergoing the industry 4.0 revolution. This development is associated with novel …
Port cyberattacks from 2011 to 2023: a literature review and discussion of selected cases
Cyberattacks pose a significant threat to seaports worldwide. While numerous scholars have
endeavored to address these threats, their findings are often limited in practicality, applying …
endeavored to address these threats, their findings are often limited in practicality, applying …
[HTML][HTML] A blockchain future for internet of things security: a position paper
Abstract Internet of Things (IoT) devices are increasingly being found in civilian and military
contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of …
contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of …
Cybersecurity risk assessment of VDR
The voyage data recorder (VDR) is a data recording system that aims to provide all
navigational, positional, communicational, sensor, control and command information for data …
navigational, positional, communicational, sensor, control and command information for data …
MITIGATE: a dynamic supply chain cyber risk assessment methodology
Modern port infrastructures have become highly dependent on the operation of complex,
dynamic ICT-based maritime supply chains. This makes them open and vulnerable to the …
dynamic ICT-based maritime supply chains. This makes them open and vulnerable to the …
Security vulnerabilities and issues of traditional wireless sensors networks in IoT
K Gopalakrishnan - Principles of internet of things (IoT) ecosystem: Insight …, 2020 - Springer
From the past decade, Wireless sensor networks (WSNs) spread out significantly with the
result of technological progress in hardware, software, and micro electro mechanical …
result of technological progress in hardware, software, and micro electro mechanical …
Knowledge management methodology for identifying threats in maritime/logistics supply chains
The growing complexity and the heterogeneity of critical infrastructures (CIs) in multicultural
maritime and logistics networks challenge existing methods and tools to dynamically …
maritime and logistics networks challenge existing methods and tools to dynamically …
Securing small and medium ports and their supply chain services
P Kyranoudi, N Polemi - Frontiers in Computer Science, 2023 - frontiersin.org
This paper argues that small and medium sized ports (SMPs) are as important as larger
ones in terms of supply chain service (SCS) management and security, as they can become …
ones in terms of supply chain service (SCS) management and security, as they can become …
[PDF][PDF] A socio-technical approach to cyber risk assessment
K Kioskli, N Polemi - World Academy of Science, Engineering and …, 2020 - academia.edu
Evaluating the levels of cyber-security risks within an enterprise is most important in
protecting its information system, services and all its digital assets against security incidents …
protecting its information system, services and all its digital assets against security incidents …
Cyber-threat landscape of border control infrastructures
Various events in recent decades, such as the 9/11 tragedy and the European migration
crisis, have highlighted the critical nature of robust borders and the impact of associated …
crisis, have highlighted the critical nature of robust borders and the impact of associated …