{"id":"https://openalex.org/W4413679641","doi":"https://doi.org/10.1109/csr64739.2025.11130108","title":"Integrating Cyber Threat Intelligence into Threat Modeling for Autonomous Ships Using PASTA and MISP","display_name":"Integrating Cyber Threat Intelligence into Threat Modeling for Autonomous Ships Using PASTA and MISP","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413679641","doi":"https://doi.org/10.1109/csr64739.2025.11130108"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130108","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5096328813","display_name":"Muhammed Erbas","orcid":"https://orcid.org/0009-0007-7164-2894"},"institutions":[{"id":"https://openalex.org/I111112146","display_name":"Tallinn University of Technology","ror":"https://ror.org/0443cwa12","country_code":"EE","type":"education","lineage":["https://openalex.org/I111112146"]}],"countries":["EE"],"is_corresponding":true,"raw_author_name":"Muhammed Erbas","raw_affiliation_strings":["Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia"],"affiliations":[{"raw_affiliation_string":"Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia","institution_ids":["https://openalex.org/I111112146"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5099383826","display_name":"Jani Vanharanta","orcid":"https://orcid.org/0009-0009-5228-7131"},"institutions":[{"id":"https://openalex.org/I16231767","display_name":"Turku University of Applied Sciences","ror":"https://ror.org/04s0yt949","country_code":"FI","type":"education","lineage":["https://openalex.org/I16231767"]},{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Jani Vanharanta","raw_affiliation_strings":["Turku University of Applied Sciences,School of Networked Systems and Security,Turku,Finland"],"affiliations":[{"raw_affiliation_string":"Turku University of Applied Sciences,School of Networked Systems and Security,Turku,Finland","institution_ids":["https://openalex.org/I16231767","https://openalex.org/I155660961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077847376","display_name":"Jarkko Paavola","orcid":"https://orcid.org/0000-0002-6322-3610"},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]},{"id":"https://openalex.org/I16231767","display_name":"Turku University of Applied Sciences","ror":"https://ror.org/04s0yt949","country_code":"FI","type":"education","lineage":["https://openalex.org/I16231767"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Jarkko Paavola","raw_affiliation_strings":["Turku University of Applied Sciences,School of Networked Systems and Security,Turku,Finland"],"affiliations":[{"raw_affiliation_string":"Turku University of Applied Sciences,School of Networked Systems and Security,Turku,Finland","institution_ids":["https://openalex.org/I16231767","https://openalex.org/I155660961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031037381","display_name":"Leonidas Tsiopoulos","orcid":"https://orcid.org/0000-0002-3994-3810"},"institutions":[{"id":"https://openalex.org/I111112146","display_name":"Tallinn University of Technology","ror":"https://ror.org/0443cwa12","country_code":"EE","type":"education","lineage":["https://openalex.org/I111112146"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Leonidas Tsiopoulos","raw_affiliation_strings":["Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia"],"affiliations":[{"raw_affiliation_string":"Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia","institution_ids":["https://openalex.org/I111112146"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069019755","display_name":"Risto Vaarandi","orcid":"https://orcid.org/0000-0001-7781-5863"},"institutions":[{"id":"https://openalex.org/I111112146","display_name":"Tallinn University of Technology","ror":"https://ror.org/0443cwa12","country_code":"EE","type":"education","lineage":["https://openalex.org/I111112146"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Risto Vaarandi","raw_affiliation_strings":["Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia"],"affiliations":[{"raw_affiliation_string":"Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia","institution_ids":["https://openalex.org/I111112146"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5096328813"],"corresponding_institution_ids":["https://openalex.org/I111112146"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32916841,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"133","last_page":"139"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9616000056266785,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.941100001335144,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7443016767501831},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5424402952194214},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3783453702926636},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3731565773487091}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7443016767501831},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5424402952194214},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3783453702926636},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3731565773487091}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/csr64739.2025.11130108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130108","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},{"id":"pmh:oai:www.theseus.fi:10024/908963","is_oa":false,"landing_page_url":"http://www.theseus.fi/handle/10024/908963","pdf_url":null,"source":{"id":"https://openalex.org/S4306400928","display_name":"Theseus (Ammattikorkeakoulujen)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"127934","raw_type":"fi=A4 Artikkeli konferenssijulkaisussa|sv=A4 Artikel i en konferenspublikation|en=A4 Conference proceedings|"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Autonomous":[0],"maritime":[1,128],"systems":[2],"rely":[3],"on":[4],"the":[5,35],"complex":[6],"interplay":[7],"of":[8,120],"operational":[9],"technology":[10,14],"(OT)":[11],"and":[12,40,71,76,95,101,123],"information":[13],"(IT),":[15],"making":[16],"them":[17],"increasingly":[18],"vulnerable":[19],"to":[20,29,92],"cyber":[21,54],"threats.":[22],"This":[23],"paper":[24],"presents":[25],"an":[26],"integrated":[27,82],"approach":[28],"autonomous":[30,59,127],"ship":[31,60],"cybersecurity":[32,125],"by":[33,87],"combining":[34],"Process":[36],"for":[37,53],"Attack":[38],"Simulation":[39],"Threat":[41],"Analysis":[42],"(PASTA)":[43],"threat":[44,55,85,103,121],"modeling":[45],"framework":[46],"with":[47,111],"Malware":[48],"Information":[49],"Sharing":[50],"Platform":[51],"(MISP)":[52],"intelligence":[56],"(CTI).":[57],"The":[58,105],"architecture":[61],"is":[62,80],"divided":[63],"into":[64,83],"three":[65],"security":[66],"layers,":[67],"which":[68],"include":[69],"OT":[70],"IT":[72],"assets,":[73],"decision-making":[74],"entities,":[75],"decision":[77],"inputs.":[78],"CTI":[79],"systematically":[81],"dynamic":[84],"models":[86,91],"mapping":[88],"maritime-specific":[89],"attack":[90],"MITRE":[93,96],"ATT&CK":[94],"ATLAS,":[97],"enabling":[98],"a":[99],"structured":[100],"adaptive":[102],"representation.":[104],"results":[106],"demonstrate":[107],"that":[108],"integrating":[109],"MISP":[110],"PASTA":[112],"can":[113],"improve":[114,124],"situational":[115],"awareness,":[116],"facilitate":[117],"realtime":[118],"updates":[119],"models,":[122],"in":[126],"operations.":[129]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
