436
REFERENCES
Balduzzi,M.,Wilhoit, K., & Pasta, A.(2014, December). A
SecurityEvaluationofAIS.TrendMicroResearchPaper.
Retrieved from https://www.trendmicro.com/cloud‐
content/us/pdfs/security‐intelligence/white‐papers/wp‐
a‐security‐evaluation‐of‐ais.pdf
Barki, D., & Délèze‐Black, L. (Eds.) (2017). Review of
MaritimeTransport2017.UnitedNationsConferenceOn
Trade And Development, UNCTAD/RMT/2017.
New
York: United Nations. Retrieved from
http://unctad.org/en/PublicationsLibrary/rmt2017_en.pd
f
Boukhtouta, A., Mouheb, D., Debbabi, M., Alfandi, O.,
Iqbal, F., & El Barachi, M. (2015). Graph‐theoretic
characterization of cyber‐threat infrastructures. Digital
Investigation, 14, S3‐S15. Retrieved from
https://www.dfrws.org/sites/default/files/session‐
files/paper‐graph‐theoretic_characterization_ of_cyber‐
threat_infrastructures.pdf
Czaplewski, K., & Goward, D. (2016,
June). Global
Navigation Satellite Systems – Perspectives on
Development and Threats to System Operation.
TransNav,The International Journal on MarineNavigation
and Safety of Sea Transportation, 10(2), 183‐192.
https://doi.org/10.12716/1001.10.02.01
Gauthier, R., & Seker, R. (2018, January). Addressing
OperatorPrivacyinAutomaticDependentSurveillance‐
Broadcast (ADS‐B). In Proceedings
of the 51st
Hawaii
International Conference on System Sciences (HICSS),
WaikoloaVillage,HI,USA,pp.52‐61.
Haass,J.,Craiger,J.P.,&Kessler,G.C.(2018).AFramework
and Taxonomy for Aviation Cybersecurity. In
Proceedings of the 2018 IEEE National Aerospace &
ElectronicsConference (NAECON) 2018, July23‐26, 2018,
Dayton,Ohio.LosAlamitos(CA):IEEEPress.
Haass,J.C.,Sampigethaya,K.,&Capezzuto,V.(2016,July).
Aviation Cybersecurity: Opportunities for Applied
Research. Transportation Research Board TR News
Magazine,(304)39‐43.
Hexeberg, S., Flåten, A.L., Eriksen, B.H., & Brekke, E.F.
(2017). AIS‐Based Vessel Trajectory Prediction. In
Proceedings of the 2017
20th International Conference on
Information Fusion (Fusion), Xiʹan, pp. 1‐8.
https://doi.org/10.23919/ICIF.2017.8009762
Hrala, J. (2016, February 12). The Scary, Practical Reason
The US Navy Is Once Again Teaching Celestial
Navigation. Science Alert Web site. Retrieved from
https://www.sciencealert.com/the‐scary‐practical‐
reason‐the‐navy‐is‐once‐again‐teaching‐celestial‐
navigation
International
Maritime Organization (IMO). (2002, July 1).
International Convention for the Safety of Life at Sea
(SOLAS), Chapter V (Safety of Navigation), Regulation
19 (Carriage requirements for shipborne navigational
systems and equipment). Retrieved from
https://mcanet.mcga.gov.uk/public/c4/solas/index.html
International Maritime Organization (IMO). (2018).
Maritime Security‐AIS Ship Data. AIS Transponders
Web page. Retrieved
from
http://www.imo.org/en/OurWork/Safety/Navigation/Pa
ges/AIS.aspx
International Telecommunication Union (ITU). (2014,
February). Technical Characteristics for an Automatic
Identification System Using Time Division Multiple Access
in the VHF Maritime Mobile Frequency Band. M‐Series:
Mobile, radiodetermination, Amateur and Related
Satellite Services. ITU‐R Recommendation M.1371‐5.
Retrieved from https://www.itu.int/dms_pubrec/itu‐
r/rec/m/R‐REC‐M.1371‐5‐201402
‐I!!PDF‐E.pdf
International Telecommunication Union (ITU). (2015,
March). Assignment and Use of Identities in the Maritime
Mobile Service. M‐Series: Mobile, radiodetermination,
Amateur and Related Satellite Services. ITU‐R
Recommendation M.585‐7. Retrieved from
https://www.itu.int /dms_pubrec/itu‐r/rec/m/R‐REC‐
M.585‐7‐201503‐I!!PDF‐E.pdf
Johnston, R.G. (2018, August). Vulnerabilities Trump
Threats
Maxim. Security Maxims. Right Brain Sekurity.
Retrieved from http://rbsekurity.com/Papers/security
maximswithaxe.pdf
Kessler, G.C. (2018, August 11). An Overview of
Cryptography. Retrieved from
https://www.garykessler.net/library/crypto.html
Kessler, G.C. (In press, expected 2019, Spring).
CybersecurityintheMaritimeDomain.Proceedingsofthe
USCGMarineSafety&SecurityCouncil.
Last,P.,Bahlke,C.,
Hering‐Bertram,M.,&Linsen,L.(2014,
September). Comprehensive Analysis of Automatic
Identification System (AIS) Data in Regard to Vessel
Movement Prediction. The Journal of Navigation, 67(5),
791‐809.https://doi.org/10.1017/S0373463314000253
Mansouri, M., Gorod, A., Wakeman, T.H., & Sauser, B.
(2009).ASystemsApproachtoGovernanceinMaritime
Transportation System of
Systems. Proceedings of the
IEEE International Conference on System of Systems
Engineering(SoSE).Albuquerque,NM.
MarEx.(2018,April3).KongsbergandWilhelmsenLaunch
Autonomous‐Shipping JV. The Maritime Executive.
Retrieved from https://www.maritime‐
executive.com/article/kongsberg‐and‐wilhelmsen‐
launch‐autonomous‐shipping‐jv
Mazzarella, F., Arguedas, V.F., & Vespe, M. (2015).
Knowledge‐Based
Vessel Position Prediction Using
Historical AIS Data. In Proceedings of 2015 Sensor Data
Fusion:Trends,Solutions,Applications(SDF), Bonn, 2015,
pp.1‐6.https://doi.org/10.1109/SDF.2015.7347707
Parker, D.B. (2015). Toward a New Framework for
InformationSecurity?InS.Bosworth,M.E.Kabay,&E.
Whyne (Eds.), Computer Security Handbook, 6th ed. (pp
3.1
‐3.23).Hoboken,NJ:JohnWiley&Sons,Inc.
Purton,L.,Abbass, H., &Alam, S.(2010). Identification of
ADS‐B System Vulnerabilities and Threats. In
Proceedings of the Australasian Transport Research Forum
2010, 29 September‐1 October 2010, Canberra,
Australia.
Raymond, E.S. (2016, August). AIVDM/AIVDO Protocol
Decoding. Version 1.52. Retrieved
from
http://catb.org/gpsd/AIVDM.html
Ridden, P. (2018, September 4). Unmanned Surface Vessel
Successfully Crosses Atlantic. New Atlas Web site.
Retrieved from https://newatlas.com/offshore‐sensing‐
sailbuoy‐met‐atlantic/56204/
Roberts, F.S. (2015, January). Vulnerabilities of Cyber‐
Physical Systems: From Football to Oil Rigs. Retrieved
from http://www.dimacs.rutgers.edu/People/Staff/
froberts/CyberPhysicalSystemsFootballOilRigs1‐3‐
15.pptx.pdf
Serpanos, D. (2018, March). The Cyber
‐Physical Systems
Revolution.Computer,51(3),70‐73.
Shine Micro. (n.d.). AIS Overview. Retrieved from
https://www.shinemicro.com/ais‐overview/
Strohmeier,M.,Lenders,V.,&Martinovic, I.(2015).Onthe
Security of the Automatic Dependent Surveillance‐
Broadcast Protocol. IEEE Communications Surveys &
Tutorials,17(2),1066‐1087.
U.S. Coast Guard (USCG). (2014, June
4). Encrypted
Automatic Identification System (EAIS) Interface Design
Description (IDD). Command, Control, and
CommunicationsEngineeringCenter(C3Cen).Retrieved
from https://epic.org/foia/dhs/uscg/nais/EPIC‐15‐05‐29‐
USCG‐FOIA‐20151030‐Production‐2.pdf
U.S. Coast Guard (USCG). (2018, July 24). AIS
Requirements. USCG Navigation Center Web site.
Retrieved from
https://www.navcen.uscg.gov/?pageName=AISRequire
mentsRev
U.S. Department of Transportation (DOT). (n.d.).
Marine
TransportationSystem(MTS).Maritime Administration
(MARAD) Web site. Retrieved from