检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Steve Symes Eddie Blanco-Davis Tony Graham Jin Wang Edward Shaw
出 处:《哈尔滨工程大学学报(英文版)》2024年第4期689-706,共18页Journal of Marine Science and Application
摘 要:This study is an investigation into cyberattacks on autonomous vessels,focusing on previous“real-world”cyberattacks and their consequences.The future of commercial and noncommercial shipping is moving toward autonomous vessels.Autonomous ships can provide significant financial and logistical benefits for shipping companies and their stakeholders.However,these vessels suffer from shortcomings concerning cybersecurity.Previous cyberattacks are investigated to understand how the command system of an autonomous ship is infiltrated,the consequences of an attack,and the shortfalls of the security of the vessel.This aim is achieved via a literature review concerning cyberattacks on autonomous vessels with a focus on sources indicating how the security systems of previous vessels were breached,the consequence of said cyberattacks,and their capability for recovery.Sources used include Web of Science,Scopus,Google Scholar,Mendeley,Zotero,SciFinder,broadsheet,and newspaper articles.The results of the literature review showed that autonomous vessels are significantly vulnerable to cyberattacks.Autonomous vessels were determined to have relatively easy-to-breach security systems.In most cases,the consequences of a cyberattack had a negative financial impact,a loss of cargo,and a potential breach of oceanic airspace,resulting in military action.The vessels analyzed were left“dead in the water”until they were recovered,and after a severe attack,the affected shipping company servers suffered potential weeklong incapacitation.This study also aims to fill the gaps in the transport industry and maritime market concerning the security of autonomous vessels and viable recovery procedures.
关 键 词:Autonomous vessels CYBERSECURITY SURVIVABILITY Artificial intelligence HACKING
分 类 号:TP3[自动化与计算机技术—计算机科学与技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.149.241.32