773
guidelines, collaborating with institutions such as
NIST, and promoting a culture of security are key to
ensuring the protection of infrastructure and
operations in the maritime environment.
REFERENCES
1. Afenyo, M., Caesar, L.D.: Maritime cybersecurity threats:
Gaps and directions for future research. Ocean & Coastal
Management. 236, 106493 (2023).
https://doi.org/10.1016/j.ocecoaman.2023.106493.
2. Alanda, A. et al.: Cross-Site Scripting (XSS)
Vulnerabilities in Modern Web Applications. In: 2024
11th International Conference on Electrical Engineering,
Computer Science and Informatics (EECSI). pp. 270–276
(2024).
https://doi.org/10.1109/EECSI63442.2024.10776461.
3. Androjna, A. et al.: Assessing Cyber Challenges of
Maritime Navigation. Journal of Marine Science and
Engineering. 8, 10, 776 (2020).
https://doi.org/10.3390/jmse8100776.
4. Benton, K., Bross, T.: Timing Analysis of SSL/TLS Man in
the Middle Attacks. CoRR. abs/1308.3559, (2013).
5. Bimco: The Guidelines on Cyber Security Onboard
Ships, https://www.bimco.org/-/media/bimco/about-us-
and-our-members/publications/ebooks/guidelines-on-
cyber-security-onboard-ships-
v4.ashx?rev=e86ee4330cce44d7b90ad718e8af3c2e, last
accessed 2024/12/03.
6. Cichocki, R.: State-Sponsored and Organized Crime
Threats to Maritime Transportation Systems in the
Context of the Attack on Ukraine. TransNav Int. J. Mar.
Navig. Saf. Sea Transp. 17, 3, 717–721 (2023).
https://doi.org/10.12716/1001.17.03.24.
7. De Alwis, N., Nam, H.-S.: A way towards port
automation: challenges and implications. WMU Journal
of Maritime Affairs. (2024).
https://doi.org/10.1007/s13437-024-00350-9.
8. Dyrcz, C.: Bezpieczeństwo morskie a nawigacja.
Nautologia. 158, 1–10 (2021).
9. Forte, D.: Spyware: more than a costly annoyance.
Network Security. 2005, 12, 8–10 (2005).
https://doi.org/10.1016/S1353-4858(05)70312-3.
10. Gupta, B.B. et al.: Defending against phishing attacks:
taxonomy of methods, current issues and future
directions. Telecommun Syst. 67, 2, 247–267 (2018).
https://doi.org/10.1007/s11235-017-0334-z.
11. IMO: Directive A 584(14) Measures to prevent unlawful
acts which threaten the safety of ships and the security
of their passengers and crew,
https://wwwcdn.imo.org/localresources/en/OurWork/Se
curity/Documents/Resolution%20A.584(14).pdf, last
accessed 2024/12/03.
12. IMO: MSC/Circ.443 Measures to prevent unlawful acts
against passengers and crews on board ships,
https://wwwcdn.imo.org/localresources/en/OurWork/Se
curity/Documents/MSC.Circ.443.pdf, last accessed
2024/12/03.
13. IMO: MSC-FAL.1/Circ.3/Rev.2 Guidelines on maritime
cyber risk management,
https://wwwcdn.imo.org/localresources/en/OurWork/Se
curity/Documents/MSC-FAL.1-Circ.3-Rev.2%20-
%20Guidelines%20On%20Maritime%20Cyber%20Risk%
20Management%20(Secretariat)%20(1).pdf, last accessed
2024/12/03.
14. IMO: Resolution A 741(18) International management
code for the safe operation of ships and for pollution
prevention (International Safety Management (ISM)
code). (2017).
15. IMO: Resolution MSC 428(98). Maritime Cyber Risk
Management in Safety Management Systems. (2017).
16. IMO: SOLAS XI-2 and the ISPS Code,
https://www.imo.org/en/OurWork/Security/Pages/SOLA
S-XI-2%20ISPS%20Code.aspx, last accessed 2024/12/03.
17. Johansen, K., Gudmestad, O.T.: Revisiting Unsinkable
Ships: From Titanic to Helge Ingstad, the Long-Standing
Issues and Persistent Risks of Ship Disasters. TransNav
Int. J. Mar. Navig. Saf. Sea Transp. 18, 1, 95–106 (2024).
https://doi.org/10.12716/1001.18.01.08.
18. Kopacz, Z. et al.: Formalne i nieformalne oceny
bezpieczeństwa morskiego. Zeszyty Naukowe Akademii
Marynarki Wojennej. R. 46 nr 3 (162), 51–67 (2005).
19. Koshevyy, V., Shishkin, A.: Developments of Interface
for VHF, MF/HF Communication Using DSC in GMDSS
Services in the Framework of E-navigation Concept.
TransNav Int. J. Mar. Navig. Saf. Sea Transp. 15, 3, 593–
600 (2021). https://doi.org/10.12716/1001.15.03.12.
20. Lind, M. et al. eds: Maritime Informatics. Springer
International Publishing, Cham (2021).
https://doi.org/10.1007/978-3-030-50892-0.
21. Linh Vu et al.: A Cyber-HIL for Investigating Control
Systems in Ship Cyber Physical Systems Under
Communication Issues and Cyber Attacks. IEEE
Transactions on Industry Applications. 60, 2, 2142–2152
(2024). https://doi.org/10.1109/TIA.2023.3311429.
22. Martínez, F. et al.: Maritime cybersecurity: protecting
digital seas. Int. J. Inf. Secur. 23, 2, 1429–1457 (2024).
https://doi.org/10.1007/s10207-023-00800-0.
23. Melnyk, O. et al.: Review of Ship Information Security
Risks and Safety of Maritime Transportation Issues.
TransNav Int. J. Mar. Navig. Saf. Sea Transp. 16, 4, 717–
722 (2022). https://doi.org/10.12716/1001.16.04.13.
24. Mohsendokht, M. et al.: Decoding dependencies among
the risk factors influencing maritime cybersecurity:
Lessons learned from historical incidents in the past two
decades. Ocean Engineering. 312, 119078 (2024).
https://doi.org/10.1016/j.oceaneng.2024.119078.
25. Mraković, I., Vojinović, R.: Maritime Cyber Security
Analysis – How to Reduce Threats? Transactions on
Maritime Science. 8, 1, 132–139 (2019).
https://doi.org/10.7225/toms.v08.n01.013.
26. NIST: Releases Version 1.1 of its Popular Cybersecurity
Framework, https://www.nist.gov/news-
events/news/2018/04/nist-releases-version-11-its-
popular-cybersecurity-framework, last accessed
2024/12/03.
27. Onishchenko, O. et al.: Ensuring Cyber Resilience of
Ship Information Systems. TransNav Int. J. Mar. Navig.
Saf. Sea Transp. 16, 1, 43–50 (2022).
https://doi.org/10.12716/1001.16.01.04.
28. Paar, C., Pelzl, J.: Understanding Cryptography: A
Textbook for Students and Practitioners. Springer,
Berlin, Heidelberg (2010). https://doi.org/10.1007/978-3-
642-04101-3.
29. Polish Government: Poland’s energy policy until 2040,
https://www.gov.pl/web/klimat/polityka-energetyczna-
polski, last accessed 2024/12/03.
30. Schiller, C.A. et al.: Chapter 2 - Botnets Overview. In:
Schiller, C.A. et al. (eds.) Botnets. pp. 29–75 Syngress,
Burlington (2007). https://doi.org/10.1016/B978-
159749135-8/50004-4.
31. Spravil, J. et al.: Detecting Maritime GPS Spoofing
Attacks Based on NMEA Sentence Integrity Monitoring.
Journal of Marine Science and Engineering. 11, 5, 928
(2023). https://doi.org/10.3390/jmse11050928.
32. Trabelsi, Z. et al.: Malicious sniffing systems detection
platform. In: 2004 International Symposium on
Applications and the Internet. Proceedings. pp. 201–207
(2004). https://doi.org/10.1109/SAINT.2004.1266117.
33. Yang, Y. et al.: Internet of things for smart ports:
Technologies and challenges. IEEE Instrumentation &
Measurement Magazine. 21, 1, 34–43 (2018).
https://doi.org/10.1109/MIM.2018.8278808.
34. Zeb, K. et al.: DDoS attacks and countermeasures in
cyberspace. In: 2015 2nd World Symposium on Web