{"id":"https://openalex.org/W4415219849","doi":"https://doi.org/10.1007/978-981-95-3182-0_11","title":"Towards Blockchain-Enabled Cybersecurity Risk Assessment for\u00a0Cyber-Ship Systems","display_name":"Towards Blockchain-Enabled Cybersecurity Risk Assessment for\u00a0Cyber-Ship Systems","publication_year":2025,"publication_date":"2025-10-15","ids":{"openalex":"https://openalex.org/W4415219849","doi":"https://doi.org/10.1007/978-981-95-3182-0_11"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-95-3182-0_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-95-3182-0_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034877495","display_name":"Md Shawmoon Azad","orcid":"https://orcid.org/0009-0005-1318-072X"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Md Amin Azad","raw_affiliation_strings":["SPTAGE Lab, Technical University of Denmark, 2800, Kgs. Lyngby, Denmark"],"affiliations":[{"raw_affiliation_string":"SPTAGE Lab, Technical University of Denmark, 2800, Kgs. Lyngby, Denmark","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085755018","display_name":"Weizhi Meng","orcid":"https://orcid.org/0000-0003-4384-5786"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]},{"id":"https://openalex.org/I2800531931","display_name":"Hong Kong College of Technology","ror":"https://ror.org/014w0p014","country_code":"CN","type":"education","lineage":["https://openalex.org/I2800531931"]},{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["CN","DK","GB"],"is_corresponding":false,"raw_author_name":"Weizhi Meng","raw_affiliation_strings":["Lion Rock Labs of Cyberspace Security Hong Kong College of Technology, Hong Kong, China","SPTAGE Lab, Technical University of Denmark, 2800, Kgs. Lyngby, Denmark","School of Computing and Communications, Lancaster University, Lancaster, UK"],"affiliations":[{"raw_affiliation_string":"Lion Rock Labs of Cyberspace Security Hong Kong College of Technology, Hong Kong, China","institution_ids":["https://openalex.org/I2800531931"]},{"raw_affiliation_string":"SPTAGE Lab, Technical University of Denmark, 2800, Kgs. Lyngby, Denmark","institution_ids":["https://openalex.org/I96673099"]},{"raw_affiliation_string":"School of Computing and Communications, Lancaster University, Lancaster, UK","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, USA","institution_ids":["https://openalex.org/I108468826"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034877495"],"corresponding_institution_ids":["https://openalex.org/I96673099"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.65116828,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"176","last_page":"195"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.6401000022888184},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.5877000093460083},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.5285000205039978},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.4690000116825104},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.4652999937534332},{"id":"https://openalex.org/keywords/global-positioning-system","display_name":"Global Positioning System","score":0.39079999923706055},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.3840000033378601},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.38190001249313354}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7811999917030334},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.73580002784729},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.6401000022888184},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.5877000093460083},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.5285000205039978},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5246000289916992},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.4690000116825104},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.4652999937534332},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.39079999923706055},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.3840000033378601},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.38190001249313354},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.352400004863739},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.3287000060081482},{"id":"https://openalex.org/C2780934415","wikidata":"https://www.wikidata.org/wiki/Q20997131","display_name":"Border Security","level":2,"score":0.29510000348091125},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C2777986313","wikidata":"https://www.wikidata.org/wiki/Q1661989","display_name":"Industry 4.0","level":2,"score":0.2818000018596649},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.27619999647140503},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.2743000090122223},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.27149999141693115},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.26109999418258667},{"id":"https://openalex.org/C2987597579","wikidata":"https://www.wikidata.org/wiki/Q155930","display_name":"Maritime industry","level":2,"score":0.25920000672340393},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.25029999017715454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-95-3182-0_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-95-3182-0_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2887558415","https://openalex.org/W2945990742","https://openalex.org/W3040279402","https://openalex.org/W3092728260","https://openalex.org/W3117607440","https://openalex.org/W3121291284","https://openalex.org/W3131771344","https://openalex.org/W4205352200","https://openalex.org/W4210705543","https://openalex.org/W4253402326","https://openalex.org/W4312473140","https://openalex.org/W4312768612","https://openalex.org/W4313127831","https://openalex.org/W4313446909","https://openalex.org/W4319302782","https://openalex.org/W4323923330","https://openalex.org/W4360841662","https://openalex.org/W4378194705","https://openalex.org/W4391341968","https://openalex.org/W4395007181","https://openalex.org/W4395017733","https://openalex.org/W4395049287","https://openalex.org/W4399119582","https://openalex.org/W4400896286","https://openalex.org/W4401814913","https://openalex.org/W4402742656","https://openalex.org/W4404056882","https://openalex.org/W4406088155","https://openalex.org/W4407169052","https://openalex.org/W4408145152","https://openalex.org/W4408749953"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-16T00:00:00"}
