| |
1. |
AEM, 2022. Cybersecurity management system security coding response plan [Online] Available at: https://www.autoelectronics.co.kr/article/articleView.asp?idx=4542 [Accessed 08 October 2024]. |
2. |
Aiello, G., Giallanza, A. and Mascarella, G., 2020. Towards shipping 4.0. a preliminary gap analysis. Procedia Manufacturing, 42, pp.24-29.
 |
3. |
Al Ali, N.A.R., Chebotareva, A.A. and Chebotarev, V.E., 2021. Cyber security in marine transport: opportunities and legal challenges. Pomorstvo, 35(2), pp.248-255.
 |
4. |
Androjna., 2020. Cyber threats to maritime critical infrastructure [Online] Available at: https://www.researchgate.net/profile/Andrej-Androjna-3/publication/349502224_CYBER_THREATS_TO_MARITIME_CRITICAL_INFRASTRUCTURE/links/6033c2f592851c4ed58ce729/CYBER-THREATS-TO-MARITIME-CRITICAL-INFRASTRUCTURE.pdf [Accessed 15 October 2024]. |
5. |
Androjna, A., Perkovič, M. and Pavić, I., 2022. Cyber security challenges for safe navigation at sea. Technologies, Techniques and Applications Across PNT, 47. |
6. |
Boannews, 2022. [Future car cybersecurity-2] 9-step Automotiveecurity guidelines and management system process [Online] Available at: https://m.boannews.com/html/detail.html?idx=109426 [Accessed 14 October 2024]. |
7. |
Brandt, T. and T. Tamisier., 2021. The future connected car – safely developed thanks to UNECE WP. 29? 21. Internationales Stuttgarter Symposium: Automobil-und Motorentechnik, Springer.
 |
8. |
Copeland, G., 2020. Practical cyber security for digital trains. Cyber security practitioner’s guide. World Scientific, pp.81-107.
 |
9. |
Costantino, G., De Vincenzi, M. and Matteucci, I., 2022. A comparative analysis of unece wp. 29 r155 and ISO/SAE 21434. 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), IEEE.
 |
10. |
Craigen, D., Diakun-Thibault, N. and Purse, R., 2014. Defining cybersecurity. Technology innovation management review, 4(10).
 |
11. |
Das, S., Geedipally, S.R., Dixon, K., Sun, X. and Ma, C., 2019. Measuring the effectiveness of vehicle inspection regulations in different states of the US. Transportation research record 2673(5), pp.208-219.
 |
12. |
Daum, O., 2019. Cyber security in the maritime sector. Journal of Maritime Law and Commerce, 50, pp.1. |
13. |
De Cerchio, R. and C. Riley., 2011. Aircraft systems cyber security. IEEE/AIAA 30th digital avionics systems conference, IEEE.
 |
14. |
Elmarady, A.A. and K. Rahouma., 2021. Studying cybersecurity in civil aviation, including developing and applying aviation cybersecurity risk assessment. IEEE Access, 9, pp.143997-144016.
 |
15. |
Erich, S., 2021. Cyber security framework for napa onboard products. Metropolia University of Applied Sciences. |
16. |
Finley, I. B., 2017. An evaluation of national cybersecurity policies for the maritime transportation system, Northcentral University. |
17. |
Fjørtoft, K. and S.P. Berge., 2019. ICT for sustainable shipping. Sustainable shipping: a cross-disciplinary view, pp.137-166.
 |
18. |
IACS, 2023. UR E26, Cyber resilience of ships |
19. |
IACS, 2024. UR E27, Cyber resilience of on-board systems and equipment |
20. |
IALA, 2019. ENAV24-6.1.14, Introduction of cyber security type approval applicable case based on IEC 62443 and IEC 61162-460 standards. |
21. |
IALA, 2021. ENAV27-12.2.2, IALA guideline on developments in maritime autonomous surface ships. |
22. |
IALA, 2021. ENAV28-5.1.1.4, The analysis of general cybersecurity requirements applicable to ship’s e-Nav service display device based on international standards. |
23. |
ICAO, 2016. Implementation of effective cyber security measures to achieve - a safe, secured and efficient air traffic control system in Hong Kong, China [Online] Available at: https://www.icao.int/APAC/Meetings/2016%20APANPIRG27/WP%2019,%20AI%203.6%20-%20ATS%20Cyber%20Security__HK_China.pdf [Accessed 10 October 2024]. |
24. |
IEC, 2018. 61162-460, Maritime navigation and radiocommunication equipment and systems – Digital interfaces. |
25. |
IEC, 2019. 62443, Security for industrial automation and control systems. |
26. |
IMO, 1989. A.647(16), ISM Code, International Safety Management Code. |
27. |
IMO, 2017. MSC.428(98), Maritime cyber risk management in safety management systems. |
28. |
IMO, 2017. MSC-FAL.1/Circ.3, Guidelines on maritime cyber risk management. |
29. |
IMO, 2019. MSC 101/5/5, Draft interim guidelines for MASS trial. |
30. |
IMO, 2021. MSC-FAL.1/Circ.3/Rev.2, Guidelines on maritime cyber risk management. |
31. |
ISO/IEC, 2013. ISO/IEC 27001, standard on Information technology – Security techniques – Information security management systems – Requirements |
32. |
Kagalwalla, N. and P.P. Churi., 2019. Cybersecurity in aviation: An intrinsic review. 5th international conference on computing, communication, control and automation (ICCUBEA), IEEE.
 |
33. |
Karim, M.S., 2022. Maritime cybersecurity and the IMO legal instruments: Sluggish response to an escalating threat? Marine Policy, 143, pp.105138.
 |
34. |
Kavallieratos, G., Diamantopoulou, V. and Katsikas, S.K., 2020. Shipping 4.0: Security requirements for the cyber-enabled ship. IEEE transactions on industrial informatics, 16(10), pp.6617-6625.
 |
35. |
Kavallieratos, G., Katsikas, S. and Gkioulos, V., 2020. Modelling shipping 4.0: A reference architecture for the cyber-enabled ship. Asian conference on intelligent information and database systems, Springer.
 |
36. |
Kawaguchi, T., 2023. Two approaches to responding to destructive cyberattacks on critical infrastructure in Japan: Addressing cyber crises as service failures or armed attacks. Civil defense in Japan, Routledge, pp.180-195.
 |
37. |
Kennedy, G.A., Scott, W.R., Shirvani, F. and Campbell, A.P., 2020. Modeling the evolution of organizational systems for the digital transformation of heavy rail. A framework of human systems engineering: Applications and case studies, pp.63-96.
 |
38. |
Kour, R., Patwardhan, A., Thaduri, A. and Karim, R., 2023. A review on cybersecurity in railways. Proceedings of the institution of mechanical engineers, Part F, Journal of Rail and Rapid Transit, 237(1), pp.3-20.
 |
39. |
Lagouvardou, S., 2018. Maritime cyber security: concepts, problems and models. Kongens Lyngby, Copenhagen. |
40. |
Lee, Y., Woo, S., Song, Y., Lee, J. and Lee, D.H., Practical vulnerability-information-sharing architecture for automotive security-risk analysis. IEEE Access, 8, pp.120009-120018.
 |
41. |
Limnaios, G., 2022. Cybersecurity considerations for aerial networks. International Hellenic University. |
42. |
Los Angeles TimeCyberattack cost Maersk as much as $300 million and disrupted operations for 2 weeks [Online] Available at: https://www.latimes.com/business/la-fi-maersk-cyberattack-20170817-story.html [Accessed 16 September 2024]. |
43. |
Malatji, M., 2023. Management of enterprise cyber security: A review of ISO/IEC 27001: 2022. 2023 International conference on cyber management and engineering (CyMaEn).
 |
44. |
Markopoulou, D., Papakonstantinou, V. and de Hert, P., 2019. The new EU cybersecurity framework: The NIS Directive, ENISA's role and the general data protection regulation. Computer law & security review, 35(6), pp.105336.
 |
45. |
Melnyk, O., Onyshchenko, S., Pavlova, N., Kravchenko, O. and Borovyk, S., 2022. Integrated ship cybersecurity management as a part of maritime safety and security system. International Journal of Computer Science and Network Security, 22(03), pp.135-140. |
46. |
Ministry of OcFisheries, 2023. Establishment of management guidelines to enhance ship cybersecurity [Online] Available at: https://www.mof.go.kr/doc/ko/selectDoc.do?docSeq=50842&menuSeq=971&bbsSeq=10 [Accessed 27 September 2024]. |
47. |
Mraković, I. and R. Vojinović., 2019. Maritime cyber security analysis–how to reduce threats? Transactions on maritime science 8(01), pp.132-139.
 |
48. |
Neo, M., 2021. The rising threat of maritime cyber-attacks: Level of maritime cyber-security preparedness along the straits of Malacca and Singapore. Royal Australian Navy Sea Power, 42, pp.38. |
49. |
Prochazka, J., Novobilsky, P., Prochazkova, D. and Valousek, S., 2022. Cybersecurity design for railway products. Understanding and Managing Risk and Reliability for a Sustainable Future, pp.304-311.
 |
50. |
Roberts, A., Marksteiner, S., Soyturk, M., Yaman, B. and Yang, Y., 2023. A global survey of standardization and industry practices of automotive cybersecurity validation and verification testing processes and tools. SAE International Journal of Connected and Automated Vehicles, 12-07-02-0013.
 |
51. |
RSSB, 2021. RIS-3703-TOM Iss 4.1 passenger train dispatch and platform safety measures [Online] Available at: https://www.rssb.co.uk/standards-catalogue/CatalogueItem/ris-3703-tom-iss-4-1 [Accessed 30 September 2024]. |
52. |
Schmittner, C. and G. Macher., 2019. Automotive cybersecurity standards-relation and overview. Computer safety, reliability, and security: SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedings 38, Springer.
 |
53. |
Sena, A., Hariri, A., Prasojo, G. L. and Iswahyudi, P., 2021. Diplomacy review of delegation of Republic of Indonesia to the International Civil Aviation Organization in Montreal Canada. SKYHAWK: Journal Aviasi Indonesia, 1(1), pp.52-66.
 |
54. |
Soderi, S., Masti, D. and Lun, Y.Z., 2023. Railway cyber-security in the era of interconnected systems: a survey. IEEE Transactions on Intelligent Transportation Systems, 24(7), pp.6764-6779.
 |
55. |
Tomić Rotim, S., 2020. Implementing cybersecurity measures in Transport Organisation. Annals of Disaster Risk Sciences: ADRS, 3(1).
 |
56. |
Ukwandu, E., Ben-Farah, M.A., Hindy, H., Bures, M., Atkinson, R., Tachtatzis, C., Andonovic, I. and Bellekens, X., 2022. Cyber-security challenges in aviation industry: A review of current and future trends. Information, 13(3), pp.146.
 |
57. |
UN, 2021. UN regulation No. 155, Uniform provisions concerning the approval of vehicles with regards to cyber security and cyber security management system. |
58. |
UN trade & development, 2022. Review of maritime transport 2022, New York: UNCTAD. |
59. |
Vandezande, N., 2024. Cybersecurity in the EU: How the NIS2-directive stacks up against its predecessor. Computer Law & Security Review, 52, pp.105890.
 |