{"id":"https://openalex.org/W4413679360","doi":"https://doi.org/10.1109/csr64739.2025.11130142","title":"PASTA Threat Modeling for Cyber Resilience and COLREG Compliance in Autonomous Ship Systems","display_name":"PASTA Threat Modeling for Cyber Resilience and COLREG Compliance in Autonomous Ship Systems","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413679360","doi":"https://doi.org/10.1109/csr64739.2025.11130142"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130142","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130142","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5096328813","display_name":"Muhammed Erbas","orcid":"https://orcid.org/0009-0007-7164-2894"},"institutions":[{"id":"https://openalex.org/I111112146","display_name":"Tallinn University of Technology","ror":"https://ror.org/0443cwa12","country_code":"EE","type":"education","lineage":["https://openalex.org/I111112146"]}],"countries":["EE"],"is_corresponding":true,"raw_author_name":"Muhammed Erbas","raw_affiliation_strings":["Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia"],"affiliations":[{"raw_affiliation_string":"Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia","institution_ids":["https://openalex.org/I111112146"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062834780","display_name":"G\u00e1bor Visky","orcid":"https://orcid.org/0000-0003-0416-3985"},"institutions":[{"id":"https://openalex.org/I111112146","display_name":"Tallinn University of Technology","ror":"https://ror.org/0443cwa12","country_code":"EE","type":"education","lineage":["https://openalex.org/I111112146"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"G\u00e1bor Visky","raw_affiliation_strings":["Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia"],"affiliations":[{"raw_affiliation_string":"Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia","institution_ids":["https://openalex.org/I111112146"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006000047","display_name":"Olaf Maennel","orcid":"https://orcid.org/0000-0002-9621-0787"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Olaf Maennel","raw_affiliation_strings":["University of Adelaide,School of Computer &#x0026; Mathematical Sciences,Adelaide,Australia"],"affiliations":[{"raw_affiliation_string":"University of Adelaide,School of Computer &#x0026; Mathematical Sciences,Adelaide,Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031037381","display_name":"Leonidas Tsiopoulos","orcid":"https://orcid.org/0000-0002-3994-3810"},"institutions":[{"id":"https://openalex.org/I111112146","display_name":"Tallinn University of Technology","ror":"https://ror.org/0443cwa12","country_code":"EE","type":"education","lineage":["https://openalex.org/I111112146"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Leonidas Tsiopoulos","raw_affiliation_strings":["Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia"],"affiliations":[{"raw_affiliation_string":"Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia","institution_ids":["https://openalex.org/I111112146"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069019755","display_name":"Risto Vaarandi","orcid":"https://orcid.org/0000-0001-7781-5863"},"institutions":[{"id":"https://openalex.org/I111112146","display_name":"Tallinn University of Technology","ror":"https://ror.org/0443cwa12","country_code":"EE","type":"education","lineage":["https://openalex.org/I111112146"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Risto Vaarandi","raw_affiliation_strings":["Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia"],"affiliations":[{"raw_affiliation_string":"Tallinn University of Technology,School of Information Technologies,Tallinn,Estonia","institution_ids":["https://openalex.org/I111112146"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5096328813"],"corresponding_institution_ids":["https://openalex.org/I111112146"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37691769,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"358","last_page":"365"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9634000062942505,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.9562000036239624,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.7411952018737793},{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.6077527403831482},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5488179922103882},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5435923337936401},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.41319596767425537},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.35251671075820923},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.25182217359542847},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.07322138547897339}],"concepts":[{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.7411952018737793},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.6077527403831482},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5488179922103882},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5435923337936401},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.41319596767425537},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.35251671075820923},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.25182217359542847},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.07322138547897339},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr64739.2025.11130142","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130142","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W2797855251","https://openalex.org/W2805747776","https://openalex.org/W2894309988","https://openalex.org/W2911123865","https://openalex.org/W2914092388","https://openalex.org/W2961832654","https://openalex.org/W2973189390","https://openalex.org/W2974556546","https://openalex.org/W2986618693","https://openalex.org/W3007791787","https://openalex.org/W3016035304","https://openalex.org/W3044806866","https://openalex.org/W3090592967","https://openalex.org/W3123836503","https://openalex.org/W4210531685","https://openalex.org/W4220685260","https://openalex.org/W4223647971","https://openalex.org/W4225858218","https://openalex.org/W4244983850","https://openalex.org/W4308971593","https://openalex.org/W4309756669","https://openalex.org/W4309855151","https://openalex.org/W4362704894","https://openalex.org/W4367181612","https://openalex.org/W4377942355","https://openalex.org/W4378176353","https://openalex.org/W4382584327","https://openalex.org/W4385163628","https://openalex.org/W4386962652","https://openalex.org/W4391097217","https://openalex.org/W4393396099","https://openalex.org/W4396650316","https://openalex.org/W4399660984"],"related_works":["https://openalex.org/W3110311961","https://openalex.org/W4229008871","https://openalex.org/W2805558850","https://openalex.org/W4396897946","https://openalex.org/W2783157679","https://openalex.org/W3040950835","https://openalex.org/W4386107585","https://openalex.org/W2552246019","https://openalex.org/W2508779374","https://openalex.org/W4285815382"],"abstract_inverted_index":{"As":[0],"autonomous":[1,49,83],"vessels":[2],"have":[3],"advanced":[4],"Operational":[5],"Technology":[6,10],"(OT)":[7],"and":[8,21,53,63,89,111],"Information":[9],"(IT)":[11],"systems,":[12],"they":[13],"face":[14],"cyberthreats":[15],"that":[16],"can":[17],"compromise":[18],"their":[19],"security":[20],"make":[22],"it":[23],"difficult":[24],"for":[25,32,68,97],"them":[26],"to":[27,75,85],"comply":[28],"with":[29,55],"International":[30],"Regulations":[31],"Preventing":[33],"Collisions":[34],"at":[35],"Sea":[36],"(COLREG).":[37],"This":[38],"research":[39],"addresses":[40],"cybersecurity":[41],"issues":[42],"in":[43,93,106],"the":[44,56,76],"maritime":[45],"sector,":[46],"focusing":[47],"on":[48],"ship":[50],"systems\u2019":[51],"vulnerabilities":[52,105],"compliance":[54,92],"COLREG.":[57],"The":[58,99],"Process":[59],"of":[60,79,82,101],"Attack":[61],"Simulation":[62],"Threat":[64],"Analysis":[65],"(PASTA)":[66],"framework":[67],"threat":[69],"modeling":[70],"is":[71],"applied,":[72],"specifically":[73],"adapted":[74],"decision-making":[77,109],"mechanisms":[78],"navigation":[80],"systems":[81],"ships,":[84],"categorize":[86],"these":[87],"threats":[88],"examine":[90],"COLREG":[91],"potentially":[94],"complex":[95],"situations":[96],"navigation.":[98],"findings":[100],"this":[102],"study":[103],"reveal":[104],"communication":[107],"protocols,":[108],"algorithms,":[110],"sensor":[112],"data":[113],"integrity.":[114]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
