Skip to main content
Go to the home page of the European Commission (opens in new window)
English en
CORDIS - EU research results
CORDIS

ERA Chair in Maritime Cyber Security at Tallinn University of Technology

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Schedule of schools and conferences for Years 4 and 5 (opens in new window)

Schedule of summer and/or winter schools (Task 4.1) and international conferences (Task 4.2) for Years 4 and 5.

Project newsletters produced in Period 1 (opens in new window)

Collection of project newsletters produced in Period 1

Progress report on Postgraduate Training Programmes in Period 1 (opens in new window)

Progress report on Postgraduate Training Programmes in Period 1 PhD training in Task 22 and Masters training in Task 23

Schedule of schools and conferences for Years 2 and 3 (opens in new window)

Schedule of summer andor winter schools Task 41 and international conferences Task 42 for Years 2 and 3

Set of training material on project management (opens in new window)

Training materials presentations online resources and handouts with practical advice on how to effectively manage national and EU funded RD projects developed by the Research Administration Manager in close consultation with TalTechs Research Administration Office see Task 34

Strategic Research Programme - midterm version (opens in new window)

Midterm version of the Strategic Research Programme for the new, multidisciplinary Centre for Maritime Cyber Security at TalTech produced by the ERA Chair Holder according to Task 2.1.

Project leaflet and poster (opens in new window)

Short description of the project leaflet 2 pages A4 size and project poster A1 size

One-page statement that Task 6.3 has been completed (opens in new window)

Onepage statement that Task 63 has been completed The task will be to introduce in the Continuous reporting tool on the Funding and tenders portal before the end of month 2 of the project peerreviewed publications in the particular field of research of the coordinating entity during the three years preceding the start date of the project

Set of training material on proposal writing (opens in new window)

Training materials presentations online resources and handouts with practical advice on how to write competitive proposals for national and EU funding RD programmes developed by the Research Administration Manager in close consultation with TalTechs Research Administration Office see Task 32

Progress report on Postgraduate Training Programmes in Period 2 (opens in new window)

Progress report on Postgraduate Training Programmes in Period 2 (PhD training in Task 2.2 and Master's training in Task 2.3)

Strategic Research Programme - initial version (opens in new window)

Initial version of the Strategic Research Programme for the new multidisciplinary Centre for Maritime Cyber Security at TalTech produced by the ERA Chair Holder according to Task 21

Project newsletters produced in Period 2 (opens in new window)

Collection of project newsletters produced in Period 2.

Project website (opens in new window)

Short report describing the design and implementation of the project website

Publications

Blockchain Implementation Barriers in Maritime: A Case Study based on ISM and MICMAC Techniques

Author(s): Sanja Bauk, Lindani Handsome Ntshangase
Published in: Journal of Maritime Research, Issue Vol XX. No. III (2023), 2023, Page(s) 72-80, ISSN 1697-4840
Publisher: University of Cantabria

Smart cargo container tracking and IT security management: Experimental results

Author(s): Sanja Bauk, Radoje Dzankic
Published in: Journal of Maritime Research, 2024, ISSN 1697-4840
Publisher: University of Cantabria

Patient informed consent, ethical and legal considerations in the context of digital vulnerability with smart, cardiac implantable electronic devices (opens in new window)

Author(s): Leanne N. S. Torgersen, Stefan M. Schulz, Ricardo G. Lugo, Stefan Sütterlin
Published in: PLOS Digital Health, Issue 3, 2024, Page(s) e0000507, ISSN 2767-3170
Publisher: Public Library of Science (PLoS)
DOI: 10.1371/journal.pdig.0000507

Optimizing offensive cyber operation planner‘s development: exploring tailored training paths and framework evolution (opens in new window)

Author(s): Marko Arik, Ricardo Gregorio Lugo, Rain Ottis, Adrian Nicholas Venables
Published in: Frontiers in Computer Science, Issue 6, 2024, Page(s) 11, ISSN 2624-9898
Publisher: Frontiers Media SA
DOI: 10.3389/fcomp.2024.1400360

The UnCODE System: A Unifying Approach for Classifying the Goals and Methods of Cognitive Warfare

Author(s): Ask, T.F., Lugo, R.G., Sütterlin,S., Canham,M., Hermansen, D., &  Knox, B.J.
Published in: Journal of Information Warfare, Issue vol 4, 2025, ISSN 2273-1601
Publisher: HAL-IRD

The role of trait and state mindfulness in cognitive performance of male adolescents (opens in new window)

Author(s): Firth, A., Sütterlin, S., & Lugo, R.
Published in: Psychology Research and Behavior Management, Issue Vol16, 2023, Page(s) 3939-3948, ISSN 1179-1578
Publisher: Dove Medical Press Ltd
DOI: 10.2147/prbm.s409737

Inclusive Education: Piloting a Comprehensive Attitudes Measure

Author(s): Rahel Johanna Warnatsch, Karen Parish, Ricardo G. Lugo, Florian Kiuppis
Published in: Nordic Studies in Education, 2025, ISSN 1891-5949
Publisher: Nordic Studies in Education

A Model-Based Adaptive Control of Turning Maneuver for CatamaranAutonomous Surface Vessel (opens in new window)

Author(s): IGOR ASTROV, IRINA ASTROVA
Published in: WSEAS TRANSACTIONS on SYSTEMS and CONTROL, Issue Volume 19, 2024, Page(s) 135-142, ISSN 2224-2856
Publisher: WSEAS Transactions on Systems and Control
DOI: 10.37394/23203.2024.19.14

Pilot Feasibility Study on The Use of Virtual Reality Simulation Training for Parent-Teacher Consultations to Enhance Self-Efficacy in Pre-Service Teachers

Author(s): Parish, Karen; Warnatsch, Rahel; Torgersen; Leanne; Lugo, R.G.
Published in: Journal of Teacher Education and Educators, Issue Volume 13, Number 1, 20, 2024, ISSN 2630-5941
Publisher: DergiPark

Using Technical Cybersecurity Exercises in University Admissions and Skill Evaluation (opens in new window)

Author(s): Kaie Maennel, Sten Mäses, Stefan Sütterlin, Margus Ernits, Olaf Maennel
Published in: IFAC-PapersOnLine, Issue 52/19, 2019, Page(s) 169-174, ISSN 2405-8963
Publisher: IFAC Paper
DOI: 10.1016/j.ifacol.2019.12.169

Human-Centric Approach to Cyber Threat Identification (opens in new window)

Author(s): Ricardo Gregorio Lugo, Ausrius Juozapavicius, Kristina Lapin, Torvald F. Ask, Benjamin J. Knox, Stefan Sütterlin
Published in: Journal of Cases on Information Technology, Issue 27, 2026, Page(s) 1-13, ISSN 1548-7717
Publisher: Idea Group Publishing
DOI: 10.4018/jcit.368220

Simulating a Cyber-Attack on the Mass Thruster Controllers at Low-Speed Motion (opens in new window)

Author(s): Igor ASTROV, Sanja BAUK
Published in: Promet - Traffic&Transportation, Issue 36, 2024, Page(s) 1006-1021, ISSN 0353-5320
Publisher: Sveuciliste u Zagrebu
DOI: 10.7307/ptt.v36i6.797

Constraint Programming-Based Verification of COLREG Safety (opens in new window)

Author(s): Jüri Vain, Leonidas Tsiopoulos, Marina Waldén, Aboubaker Seddiq Benterki
Published in: IEEE Journal of Oceanic Engineering, Issue 50, 2025, Page(s) 2797-2821, ISSN 0364-9059
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/joe.2025.3592285

A Systematic Literature Review of Cyber Security Monitoring in Maritime (opens in new window)

Author(s): Risto Vaarandi, Leonidas Tsiopoulos, Gábor Visky, Muaan Ur Rehman, Hayretdin Bahşi
Published in: IEEE Access, Issue 13, 2025, Page(s) 85307-85329, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2025.3567385

Humanoid Robots as Learning Assistants? Useability Perspectives of Grade 6 Students (opens in new window)

Author(s): Solveig Tilden, Karen Parish, Deepti Mishra, Ricardo G. Lugo, Per Normann Andersen
Published in: Technology, Knowledge and Learning, Issue 30, 2025, Page(s) 241-262, ISSN 2211-1662
Publisher: Springer Science + Business Media
DOI: 10.1007/s10758-024-09731-8

Exploring Simulation Methods to Counter Cyber-Attacks on the Steering Systems of the Maritime Autonomous Surface Ship (MASS) (opens in new window)

Author(s): Igor Astrov, Sanja Bauk, Pentti Kujala
Published in: Journal of Marine Science and Engineering, Issue 13, 2025, Page(s) 1470, ISSN 2077-1312
Publisher: MDPI AG
DOI: 10.3390/jmse13081470

Threat modeling of industrial control systems: A systematic literature review (opens in new window)

Author(s): Khalil, Shaymaa Mamdouh; Bahsi, Hayretdin; Korõtko, Tarmo
Published in: Computers & Security, Issue Vol136, 2023, Page(s) 19, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2023.103543

The Role of Emotion Regulation for General Self-Efficacy in Adolescents Assessed Through Both Neurophysiological and Self-Reported Measures (opens in new window)

Author(s): Natalie Marie Lande, Torvald F Ask, Sjur Skjørshammer Sætren, Ricardo Gregorio Lugo, Stefan Sütterlin
Published in: Psychology Research and Behavior Management, Issue Volume 2023:16, 2023, Page(s) 3373—3383, ISSN 1179-1578
Publisher: Dove Medical Press Ltd
DOI: 10.2147/prbm.s406702

On Underwater Data Centers: Surveillance, Monitoring, and Environmental Management in the Baltic Sea (opens in new window)

Author(s): Mark Abner, Sanja Bauk
Published in: JITA - Journal of Information Technology and Applications (Banja Luka) - APEIRON, Issue 24, 2025, ISSN 2233-0194
Publisher: National and University Library of the Republic of Srpska
DOI: 10.7251/jit2402142a

Systematic literature review of threat modeling and risk assessment in ship cybersecurity (opens in new window)

Author(s): Muhammed Erbas, Shaymaa Mamdouh Khalil, Leonidas Tsiopoulos
Published in: Ocean Engineering, Issue Vol 306, 2024, ISSN 0029-8018
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.oceaneng.2024.118059

Misconfiguration-Free Compositional SDN for Cloud Networks (opens in new window)

Author(s): H. Pan, Z. Li, P. Zhang, P. Cui, K. Salamatian and G. Xie
Published in: IEEE Transactions on Dependable and Secure Computing, Issue Vol20, issue 3, 2023, Page(s) 2484 - 2499, ISSN 1545-5971
Publisher: IEEE Computer Society
DOI: 10.1109/tdsc.2022.3185096

Learning From Few Cyber-Attacks: Addressing the Class Imbalance Problem in Machine Learning-Based Intrusion Detection in Software-Defined Networking (opens in new window)

Author(s): Seyed Mohammad Hadi Mirsadeghi, Hayretdin Bahsi, Risto Vaarandi, Wissem Inoubli
Published in: IEEE Access, Issue 11, 2024, Page(s) 140428-140442, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2023.3341755

Stream clustering guided supervised learning for classifying NIDS alerts (opens in new window)

Author(s): Risto Vaarandi and Alejandro Guerra-Manzanares
Published in: Future Generation Computer Systems, Issue Vol 155, 2024, Page(s) 231-244, ISSN 0167-739X
Publisher: Elsevier BV
DOI: 10.1016/j.future.2024.01.032

Data Mining and Cybersecurity-Driven Solutions for CO2 Emissions Reduction of Different Maritime Shipping: A Multi-Faceted Analysis (opens in new window)

Author(s): Saeed Rahimpour, Mahtab Shahin, Yigit Gülmez, Sanja Bauk
Published in: TechRxiv, 2024, ISSN 0018-9235
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.36227/techrxiv.173030522.24669178/v1

The UnCODE system: A neurocentric systems approach for classifying the goals and methods of Cognitive Warfare. (opens in new window)

Author(s): Ask, T. F., Lugo, R., Sütterlin, S., Canham, M., Hermansen, D., & Knox, B. J. (2023)
Published in: NATO STO-MP-HFM-361, 2023, ISSN 2331-8422
Publisher: PsyArXiv
DOI: 10.31234/osf.io/7c2ez

Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners (opens in new window)

Author(s): Dan Heering
Published in: TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation, Issue 14/2, 2020, Page(s) 271-278, ISSN 2083-6473
Publisher: TransNav
DOI: 10.12716/1001.14.02.01

Network IDS alert classification with active learning techniques (opens in new window)

Author(s): Risto Vaarandi and Alejandro Guerra-Manzanares
Published in: Journal of Information Security and Applications, Issue Vol. 81, article 103687, 2024, ISSN 2214-2126
Publisher: Elsevier B.V.
DOI: 10.1016/j.jisa.2023.103687

A comprehensive instrument for identifying critical information infrastructure services (opens in new window)

Author(s): Luis-Carlos Herrera, Olaf Maennel
Published in: International Journal of Critical Infrastructure Protection, Issue 25, 2019, Page(s) 50-61, ISSN 1874-5482
Publisher: Elsevier BV
DOI: 10.1016/j.ijcip.2019.02.001

A National Maritime Cyber Security Operations Center (M-SOC) Concept (opens in new window)

Author(s): Aybars Oruc, Sanja Bauk, Jianying Zhou
Published in: Journal of Marine Science and Engineering, Issue 14, 2025, Page(s) 17, ISSN 2077-1312
Publisher: MDPI AG
DOI: 10.3390/jmse14010017

Enhancing Forensic-Tool Security with Rust: Development of a String Extraction Utility (opens in new window)

Author(s): Jens Getreu, Olaf Maennel
Published in: The Journal of Digital Forensics, Security and Law, 2019, ISSN 1558-7223
Publisher: Association of Digital Forensics, Security and Law (ADFSL)
DOI: 10.15394/jdfsl.2019.1607

Identifying cyber attack vulnerabilities in the main lubricating oil system of marine propulsion units (opens in new window)

Author(s): Yigit Gülmez, Olgun Konur, Muhammed Erbas, Sanja Bauk
Published in: International Journal of Critical Infrastructure Protection, Issue 51, 2026, Page(s) 100810, ISSN 1874-5482
Publisher: Elsevier BV
DOI: 10.1016/j.ijcip.2025.100810

Stress in Parents of Preschool Aged Autistic Children Who Underwent Community Based Early Intensive Behavioral Intervention (opens in new window)

Author(s): Marita Andreassen, Ricardo G. Lugo, Sigmund Eldevik, Svein Eikeseth
Published in: Advances in Neurodevelopmental Disorders, 2025, ISSN 2366-7532
Publisher: Springer Science and Business Media LLC
DOI: 10.1007/s41252-025-00446-0

Towards projection of the individualised risk assessment for the cybersecurity workforce (opens in new window)

Author(s): Agnė Brilingaitė, Linas Bukauskas, Ingrida Domarkienė, Tautvydas Rančelis, Laima Ambrozaitytė, Rūta Pirta, Ricardo G. Lugo, Benjamin J. Knox
Published in: Computer Standards & Interfaces, Issue 93, 2025, Page(s) 103962, ISSN 0920-5489
Publisher: Elsevier BV
DOI: 10.1016/j.csi.2024.103962

Gamification as a neuroergonomic approach to improving interpersonal situational awareness in cyber defense. (opens in new window)

Author(s): Ask, T. F., Knox, B. J., Lugo, R. G., Hoffmann, L., & Sütterlin, S.
Published in: Frontiers in Education, Issue 2023, Vol. 8, 2023
Publisher: Frontiers
DOI: 10.3389/feduc.2023.988043

Enhancing Operational Planning and Situational Awareness for Cyberspace Operations (CO), Based on the Crossed Swords Exercises (opens in new window)

Author(s): Marko Arik, Rain Ottis, Adrian Venables, Ricardo Lugo
Published in: European Conference on Cyber Warfare and Security, Issue 24, 2025, Page(s) 18-27, ISSN 2048-8610
Publisher: Academic Conferences International Limited
DOI: 10.34190/eccws.24.1.3327

Try to esCAPE from Cybersecurity Incidents! A Technology-Enhanced Educational Approach (opens in new window)

Author(s): Rūta Pirta-Dreimane, Agnė Brilingaitė, Evita Roponena, Karen Parish, Jānis Grabis, Ricardo Gregorio Lugo, Mārtiņš Bonders
Published in: Technology, Knowledge and Learning, Issue 30, 2025, Page(s) 1577-1606, ISSN 2211-1662
Publisher: Springer Science + Business Media
DOI: 10.1007/s10758-024-09769-8

From Theory to Practice: Leveraging VR and CTF Competitions for Advanced Cybersecurity Education (opens in new window)

Author(s): Triin Muulmann, Ricardo Gregorio Lugo, Rain Ottis
Published in: Lecture Notes in Computer Science, HCI International 2025 – Late Breaking Papers, 2026, Page(s) 108-122
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-032-12660-3_9

Cyber Hygiene: The Big Picture (opens in new window)

Author(s): Kaie Maennel, Sten Mäses, Olaf Maennel
Published in: Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings, Issue 11252, 2018, Page(s) 291-305, ISBN 978-3-030-03637-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-03638-6_18

Conflict in cyberspace (opens in new window)

Author(s): Ottis, Rain
Published in: Routledge Handbook of the Future of Warfare, Issue 1st Edition, 2023, Page(s) 411−420
Publisher: Routledge
DOI: 10.4324/9781003299011

Technical Considerations for Open-Source Intrusion Detection System Integration in Marine Vehicles (opens in new window)

Author(s): Gabor Visky, Dariana Khisteva, Olaf Maennel
Published in: Signals and Communication Technology, Maritime Cybersecurity, 2025, Page(s) 143-160
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-87290-7_8

Small Languages and Big Models: Using ML to Generate Norwegian Language Social Media Content for Training Purposes (opens in new window)

Author(s): Ole Joachim Arnesen Aasen, Ricardo G. Lugo, Benjamin J. Knox
Published in: Lecture Notes in Computer Science, Augmented Cognition, 2024, Page(s) 103-121
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-61572-6_8

Competencies Required for Offensive Cyber Operations Planners

Author(s): Arik, Marko; Lugo, Ricardo Gregorio; Ottis, Rain; Venables, Adrian
Published in: HCI for Cybersecurity, Privacy and Trust 6th International Conference, HCI-CPT 2024, 2024
Publisher: Springer

Improving Security and Privacy with Raspberry Pi Devices (opens in new window)

Author(s): Radoje Džankić, Zvonko Bulatović, Sanja Bauk
Published in: Signals and Communication Technology, Maritime Cybersecurity, 2025, Page(s) 217-233
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-87290-7_12

Rethinking Seafarer Training for the Digital Age (opens in new window)

Author(s): Dan Heering
Published in: Signals and Communication Technology, Maritime Cybersecurity, 2025, Page(s) 29-53
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-87290-7_3

Heightened Cyber Vulnerability to Patients with Cardiac Implantable Electronic Devices (opens in new window)

Author(s): Leanne N. S. Torgersen, Rupert E. D. Whitaker, Ricardo G. Lugo, Stefan Sütterlin, Stefan M. Schulz
Published in: Communications in Computer and Information Science, HCI International 2023 Posters, 2024, Page(s) 519-528
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-35989-7_66

Stenmap: Framework for Evaluating Cybersecurity-Related Skills Based on Computer Simulations (opens in new window)

Author(s): Sten Mäses, Liina Randmann, Olaf Maennel, Birgy Lorenz
Published in: Learning and Collaboration Technologies. Learning and Teaching, Issue 10925, 2018, Page(s) 492-504, ISBN 978-3-319-91151-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-91152-6_38

Enhancing Cybersecurity in Marine Vessels: Integrating Artificial Neural Networks with Inertial Navigation Systems for Resilience Against GPS Cyber-Attacks (opens in new window)

Author(s): Yiğit Gülmez
Published in: Signals and Communication Technology, Maritime Cybersecurity, 2025, Page(s) 161-178
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-87290-7_9

A Scope Review of Secure Broadcasting Protocols for the Automatic Identification System (opens in new window)

Author(s): Leonidas Tsiopoulos, Risto Vaarandi
Published in: Signals and Communication Technology, Maritime Cybersecurity, 2025, Page(s) 103-121
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-87290-7_6

A few observations on data science

Author(s): Bauk, Sanja
Published in: New Trends and Best Practices in Socioeconomic Research, 2023, Page(s) 23-24, ISBN 978-9940-673-18-5
Publisher: Economic Laboratory for Transition Research, Montenegro; Center for Sociological Research Szczecin, Poland; Adriatic University Bar, Faculty of Mediterranean Business studies Tivat, Montenegro; and University Mediterranean, Montenegro

Art and Automation of Teaching Malware Reverse Engineering (opens in new window)

Author(s): Toomas Lepik, Kaie Maennel, Margus Ernits, Olaf Maennel
Published in: Learning and Collaboration Technologies. Learning and Teaching, Issue 10925, 2018, Page(s) 461-472, ISBN 978-3-319-91151-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-91152-6_35

Ports of Tallinn and Koper Comparative Analysis Including Cybersecurity (opens in new window)

Author(s): Sanja Bauk, Bojan Beskovnik, Seçil Gülmez
Published in: Signals and Communication Technology, Maritime Cybersecurity, 2025, Page(s) 55-82
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-87290-7_4

Simulating Cyber-Attacks on the Unmanned Sea-Surface Vessel’s Rudder Controller (opens in new window)

Author(s): Igor Astrov, Sanja Bauk
Published in: Signals and Communication Technology, Maritime Cybersecurity, 2025, Page(s) 83-102
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-87290-7_5

The Use of Virtual Agents in Cybersecurity Education and Training - a Systematic Literature Review (opens in new window)

Author(s): Vanessa Roberts, Ricardo Gregorio Lugo
Published in: Lecture Notes in Computer Science, HCI International 2025 – Late Breaking Papers, 2026, Page(s) 134-146
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-032-12660-3_11

Editorial: The human factor in cyber security education (opens in new window)

Author(s): Ricardo G. Lugo, Stefan Sütterlin, Benjamin James Knox, Linas Bukauskas, Agnė Brilingaitė, Olaf Manuel Maennel
Published in: Frontiers in Education, Issue 2023, Vol. 8, 2023
Publisher: Frontiers
DOI: 10.3389/feduc.2023.1277282

Hybrid Physics-AI Digital Twin Framework for Shared Mooring Systems in Deepwater Floating Offshore Wind Farms (opens in new window)

Author(s): Mahtab Shahin, Ahmed Nagi Nasr, Avleen Malhi, Sanja Bauk, Osiris Valdez Banda, Pentti Kujala, Ralf-Martin Soe, Shan Wang
Published in: Journal of Marine Science and Application, 2025, Page(s) 1-25
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.36227/techrxiv.176703996.62757261/v1

Optimizing AI System Security: An Ecosystem Recommendation to Socio-Technical Risk Management (opens in new window)

Author(s): Kitty Kioskli, Antonios Ramfos, Steve Taylor, Leandros Maglaras, Ricardo Lugo
Published in: AHFE International, Human Factors in Design, Engineering, and Computing, Issue 159, 2025
Publisher: AHFE International
DOI: 10.54941/ahfe1005635

Simulating a cyber-attack on an autonomous sea surface vessel’s rudder controller

Author(s): Igor Astrov, Sanja Bauk
Published in: 13th Mediterranean Conference on Embedded Computing, MECO, 2024
Publisher: IEEE Xplore

On cyber vulnerability of MASS: a simulation experiment to counter a rudder controller attack

Author(s): Igor Astrov, Sanja Bauk
Published in: Proceedings 2024 International Conference on Applied Mathematics & Computer Science, ICAMCS 2024, 2024, Page(s) 110-117
Publisher: IEEE

Metacognitive Processes Involved in Human Robot Interaction in the School Learning Environment (opens in new window)

Author(s): Deepti Mishra, Ricardo G. Lugo, Karen Parish ,Solveig Tilden
Published in: LNCS International Conference on Human-Computer Interaction, Issue Human-Computer Interaction, 2023, Page(s) 85-100, ISBN 978-3-031-35599-8
Publisher: Springer
DOI: 10.1007/978-3-031-35599-8

AIS Data Analysis: Reality in the Sea of Echos

Author(s): G. Visky, A. Rohl, S. Katsikas and O. Maennel
Published in: 2024 IEEE 49th Conference on Local Computer Networks (LCN), 2024, Page(s) 1-7
Publisher: IEEE

Lightweight Testbed for IEC61162-450-Related Cyber Security Research

Author(s): G. Visky, S. Katsikas and O. Maennel
Published in: 2024 IEEE International Conference on Cyber Security and Resilience (CSR), 2024
Publisher: IEEE Access

Blockchain Technology’s Effects on Big Data in Maritime Transportation

Author(s): Zdravko Paladin, Sanja Bauk, Rasim Mujalović, Nexhad Kapidani, Žarko Lukšić
Published in: 28th International Conference on Information Technology (IT), 2024
Publisher: IEEE

A method for teaching Open Source Intelligence (OSINT) using personalised cloud-based exercises

Author(s): Saber, Yari; Mäses, Sten; Maennel, Olaf Manuel
Published in: Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020, 2020
Publisher: Old Dominion University (ODU)

Statistical analysis-based feature selection for anomaly detection in AIS dataset

Author(s): Gabor Visky, Risto Vaarandi, Sokratis Katsikas, Olaf Maennel
Published in: IEEE 23rd World Symposium on Applied Machine Intelligence and Informatics (SAMI 2025), 2025
Publisher: IEEE

Towards an Open-source Intrusion Detection System Integration Into Marine Vehicles

Author(s): G. Visky, D. Khisteva, R. Vaarandi and O. M. Maennel
Published in: 2024 International Symposium ELMAR, 2024
Publisher: IEEE

Anomalous file system activity detection through temporal association rule mining. (opens in new window)

Author(s): H. Iman, M. Reza; Chikul, Pavel; Jervan, Gert; Bahsi, Hayretdin; Ghasempouri, Tara
Published in: Proceedings of the 9th International Conference on Information Systems Security and Privacy ICISSP, Issue Vol1, 2023, Page(s) 733-740, ISBN 978-989-758-624-8
Publisher: Scitepress
DOI: 10.5220/0011805100003405

Open Source Intrusion Detection Systems’ Performance Analysis Under Resource Constraints

Author(s): G. Visky, B. Adam, R. Vaarandi, M. Pihelgas and O. Maennel
Published in: 2024 IEEE 22nd Jubilee International Symposium on Intelligent Systems and Informatics (SISY), 2024, Page(s) 000201-000208
Publisher: IEEE Xplore

Hacking on the High Seas: How Automated Reverse-Engineering Can Assist Vulnerability Discovery of a Proprietary Communication Protocol

Author(s): G. Visky, A. Rohl, R. Vaarandi, S. Katsikas and O. M. Maennel
Published in: 2024 IEEE 49th Conference on Local Computer Networks (LCN), 2024
Publisher: IEEE

Simulation of a Cyber-Attack on MASS's Rudder Stabilization Based on NARMA-L2 (opens in new window)

Author(s): Igor Astrov, Sanja Bauk
Published in: 2025 16th International Conference on Information, Intelligence, Systems & Applications (IISA), 2025, Page(s) 1-6
Publisher: IEEE
DOI: 10.1109/iisa66859.2025.11311199

Sectoral Cybersecurity Skills Gap: The Case of Maritime Cybersecurity Certification Training

Author(s): P. Kyranoudi, N. Polemi, P. Rathod, R. G. Lugo, S. Ioannidis and P. Ofem
Published in: 2024 IEEE International Conference on Engineering, Technology, and Innovation (ICE/ITMC), 2024
Publisher: IEEE

Exploring Historical Maritime Cyber-Attacks and Introducing Maritime Security Operations Center as a Solution to Mitigate

Author(s): Ahmed Nagi Nasr, Roomet Leiger, Inga Zaitseva-Pärnaste, Pentti Kujala
Published in: Series: Progress in Marine Science and Technology, Issue Vol 9: Theory and Practice of Shipbuilding, 2024, Page(s) 235-245
Publisher: IOS Press

Recommendations for Enhancing the Results of Cyber Effects (opens in new window)

Author(s): Erwin Orye, Olaf M. Maennel
Published in: 2019 11th International Conference on Cyber Conflict (CyCon), 2019, Page(s) 1-19, ISBN 978-9949-9904-5-0
Publisher: IEEE
DOI: 10.23919/cycon.2019.8756649

Modeling the trajectory tracking accuracy of an autonomous catamaran patrol vessel under different positional data disturbance conditions

Author(s): Andres Udal, Jaanus Kaugerand, Heigo Molder, Igor Astrov, Sanja Bauk
Published in: Maritime Transport Conference, 2024, ISSN 2938-8813
Publisher: UPC

Individual Deep Fake Recognition Skills are Affected by Viewer’s Political Orientation, Agreement with Content and Device Used

Author(s): Stefan Sütterlin, Torvald F. Ask, Sophia Mägerle, Sandra Glöckler, Leandra Wolf, Julian Schray, Alava Chandi, Teodora Bursac, Ali Khodabakhsh4, Benjamin J. Knox, Matthew Canham, and Ricardo G. Lugo.
Published in: Human-Computer Interaction, Issue Proceedings, Part II, 2023
Publisher: Springer

Comparative Analysis of Pattern Mining Algorithms for Event Logs (opens in new window)

Author(s): Gasimov, Orkhan; Vaarandi, Risto; Pihelgas, Mauno
Published in: 2023 IEEE International Conference on Cyber Security and Resilience, 2023, Page(s) 1-7, ISBN 979-8-3503-1170-9
Publisher: IEEE
DOI: 10.1109/csr57506.2023.10224996

Maritime Transport and Logistics Digital Solutions Optimization Using Advanced Data Sharing Platforms: ePIcenter Projects’ Case

Author(s): Paladin Zdravko, Šorovic Mira, Bauk Sanja, Knoors Frank, Stephens Julian, Nexhat Kapidani, Lukšić Žarko, Mujalović Rasim
Published in: 37th Bled eConference Resilience Through Digital Innovation: Enabling the Twin Transition, 2024
Publisher: University of Maribor Press

PASTA Threat Modeling for Cyber Resilience and COLREG Compliance in Autonomous Ship Systems (opens in new window)

Author(s): Muhammed Erbas, Gábor Visky, Olaf Maennel, Leonidas Tsiopoulos, Risto Vaarandi
Published in: 2025 IEEE International Conference on Cyber Security and Resilience (CSR), 2025, Page(s) 358-365
Publisher: IEEE
DOI: 10.1109/csr64739.2025.11130142

Integrating Cyber Threat Intelligence into Threat Modeling for Autonomous Ships Using PASTA and MISP (opens in new window)

Author(s): Muhammed Erbas, Jani Vanharanta, Jarkko Paavola, Leonidas Tsiopoulos, Risto Vaarandi
Published in: 2025 IEEE International Conference on Cyber Security and Resilience (CSR), 2025, Page(s) 133-139, ISBN 979-8-3315-3591-9
Publisher: IEEE
DOI: 10.1109/csr64739.2025.11130108

Learning Supplementary NLP Features for CTR Prediction in Sponsored Search (opens in new window)

Author(s): Dong Wang, Shaoguang Yan, Yunqing Xia, Kavé Salamatian, Weiwei Deng, Qi Zhang
Published in: KDD '22: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Issue 28, 2022, Page(s) 4010–4020
Publisher: ACM Digital library
DOI: 10.1145/3534678.3539064

Leveraging the European Cybersecurity Skills Framework(ECSF) in EU Innovation Projects: Workforce Development Through Skilling, Upskilling, and Reskilling

Author(s): P. Rathod, N. Polemi, M. Lehto, K. Kioskli, J. Wessels and R. Lugo
Published in: 2024 IEEE Global Engineering Education Conference (EDUCON), 2024
Publisher: IEEE Access

Towards Smarter Maritime Security: Apriori Algorithm Optimization in Serverless Environments (opens in new window)

Author(s): Mahtab Shahin, Saeed Rahimpour, Tara Ghasempouri, Sanja Bauk, Thomas Fahringer, Dirk Draheim
Published in: Procedia Computer Science, Issue 257, 2025, Page(s) 452-459, ISSN 1877-0509
Publisher: Elsevier BV
DOI: 10.1016/j.procs.2025.03.059

Modeling the trajectory tracking accuracy of an autonomous catamaran patrol vessel under different positional data disturbance conditions (opens in new window)

Author(s): Andres Udal, Jaanus Kaugerand, Heigo Mõlder, Igor Astrov, Sanja Bauk
Published in: Maritime Transport Conference, Issue Number, 2026, Page(s) 1-15, ISSN 2938-8813
Publisher: Universitat Politècnica de Catalunya. Iniciativa Digital Politècnica
DOI: 10.5821/mt.13165

Hybrid Cybersecurity Research and Education Environment for Maritime Sector

Author(s): G. Visky
Published in: 2024 IEEE International Conference on Cyber Security and Resilience (CSR), 2024, Page(s) 644-651
Publisher: IEEE

Port in a Storm: Iranian Cyber Operations and Chinese Strategic Interests in Middle Eastern Maritime Infrastructure (opens in new window)

Author(s): Cosimo Melella, Francesco Ferazza, Konstantinos Mersinas, Ricardo Lugo
Published in: 2025 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2025, Page(s) 115-125
Publisher: IEEE
DOI: 10.1109/eurospw67616.2025.00019

Blockchain applications and cybersecurity threats: A review (opens in new window)

Author(s): L. H. Ntshangase and S. Bauk
Published in: 28th International Conference on Information Technology (IT), 2024, Page(s) 1-4, ISBN 979-8-3503-6961-8
Publisher: IEEE
DOI: 10.1109/it61232.2024.10475777

Big Data and Cybersecurity-Enhanced Monitoring of Icebreaker Operations and Pollution in the Baltic Sea

Author(s): Shahin, Mahtab; Syed Attique, Shah; Pentti, Kujala; Bauk, Sanja; Dirk, Draheim
Published in: Baltic Sea Science Congress 2025, 2025, Page(s) 146
Publisher: Springer

DACA: Automated Attack Scenarios and Dataset Generation (opens in new window)

Author(s): Korving, Frank; Vaarandi, Risto
Published in: Proceedings of the 18th International Conference on Cyber Warfare and Security, ICCWS 2023, Issue Vol. 18 No. 1 (2023): Proceedings of the 18th International Conference on Cyber Warfare and Security, 2023, Page(s) 550−559
Publisher: Academic Conferences International Limited
DOI: 10.34190/iccws.18.1.962

From simple scoring towards a meaningful interpretation of learning in cybersecurity exercises

Author(s): Ernits, Margus; Maennel, Kaie; Mäses, Sten; Lepik, Toomas; Maennel, Olaf
Published in: Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020, 2020
Publisher: Old Dominion University (ODU)

Cognitive flexibility but not cognitive styles influence deepfake detection skills and metacognitive accuracy (opens in new window)

Author(s): Torvald F. Ask, Ricardo Lugo, Jonas fritsch, Karl Veng, Jonathan Eck, Muhammed-Talha Özmen, Basil Bärreiter, Benjamin J. Knox, Stefan Sütterlin
Published in: Issue PsyArXiv, 2025
Publisher: Center for Open Science
DOI: 10.31234/osf.io/a9dwe

Maritime Cybersecurity (opens in new window)

Author(s): Bauk, Sanja (Ed.)
Published in: Signals and Communication Technology, 2025
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-87290-7

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0