{"id":"https://openalex.org/W4382281850","doi":"https://doi.org/10.3389/fcomp.2023.1156726","title":"Securing small and medium ports and their supply chain services","display_name":"Securing small and medium ports and their supply chain services","publication_year":2023,"publication_date":"2023-06-27","ids":{"openalex":"https://openalex.org/W4382281850","doi":"https://doi.org/10.3389/fcomp.2023.1156726"},"language":"en","primary_location":{"id":"doi:10.3389/fcomp.2023.1156726","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3389/fcomp.2023.1156726","pdf_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2023.1156726/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2023.1156726/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020751716","display_name":"Pinelopi Kyranoudi","orcid":null},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Pinelopi Kyranoudi","raw_affiliation_strings":["Department of Informatics, University of Piraeus, Piraeus, Greece","MAGGIOLI SPA, Santarcangelo di Romagna, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]},{"raw_affiliation_string":"MAGGIOLI SPA, Santarcangelo di Romagna, Italy","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055769796","display_name":"Nineta Polemi","orcid":null},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Nineta Polemi","raw_affiliation_strings":["Department of Informatics, University of Piraeus, Piraeus, Greece","trustilio B.V., Amsterdam, Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]},{"raw_affiliation_string":"trustilio B.V., Amsterdam, Netherlands","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5020751716","https://openalex.org/A5055769796"],"corresponding_institution_ids":["https://openalex.org/I154757721"],"apc_list":{"value":1150,"currency":"USD","value_usd":1150},"apc_paid":{"value":1150,"currency":"USD","value_usd":1150},"fwci":0.2982,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.5338015,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"5","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.7582924962043762},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6279193162918091},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.49103283882141113},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.4909215569496155},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.467478483915329},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4646342098712921},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.43515175580978394},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.43097999691963196},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.421469509601593}],"concepts":[{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.7582924962043762},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6279193162918091},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.49103283882141113},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.4909215569496155},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.467478483915329},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4646342098712921},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.43515175580978394},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.43097999691963196},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.421469509601593},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3389/fcomp.2023.1156726","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3389/fcomp.2023.1156726","pdf_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2023.1156726/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:0ed19bf3ec12420aa8ed2801d7b3869a","is_oa":true,"landing_page_url":"https://doaj.org/article/0ed19bf3ec12420aa8ed2801d7b3869a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Frontiers in Computer Science, Vol 5 (2023)","raw_type":"article"},{"id":"pmh:oai:zenodo.org:10407257","is_oa":true,"landing_page_url":"https://zenodo.org/communities/cysmet","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/other"}],"best_oa_location":{"id":"doi:10.3389/fcomp.2023.1156726","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3389/fcomp.2023.1156726","pdf_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2023.1156726/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4699999988079071}],"awards":[{"id":"https://openalex.org/G3875748329","display_name":null,"funder_award_id":"European Regional Development Fund","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G6660225447","display_name":null,"funder_award_id":"co-financed","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"},{"id":"https://openalex.org/G8538941428","display_name":null,"funder_award_id":"Regional Development Fund","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320331361","display_name":"University of Piraeus Research Centre","ror":null},{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4382281850.pdf","grobid_xml":"https://content.openalex.org/works/W4382281850.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W184769691","https://openalex.org/W2780884793","https://openalex.org/W2906845177","https://openalex.org/W4206004758","https://openalex.org/W4231157681","https://openalex.org/W4254076077","https://openalex.org/W4296746025","https://openalex.org/W6628441718","https://openalex.org/W6805050918"],"related_works":["https://openalex.org/W2329452785","https://openalex.org/W2356380379","https://openalex.org/W2886412403","https://openalex.org/W3032897527","https://openalex.org/W4361204433","https://openalex.org/W2363925233","https://openalex.org/W2559850354","https://openalex.org/W1658769671","https://openalex.org/W2353260005","https://openalex.org/W1991223517"],"abstract_inverted_index":{"This":[0],"paper":[1],"argues":[2],"that":[3,117],"small":[4],"and":[5,24,35,40,67,131],"medium":[6],"sized":[7],"ports":[8],"(SMPs)":[9],"are":[10,89],"as":[11,13,26,71,73],"important":[12],"larger":[14],"ones":[15],"in":[16,107],"terms":[17],"of":[18,61,95],"supply":[19],"chain":[20],"service":[21],"(SCS)":[22],"management":[23,113],"security,":[25],"they":[27],"can":[28,118],"become":[29],"the":[30],"weakest":[31],"links":[32],"for":[33,87,115],"national":[34],"European":[36],"Union":[37],"(EU)":[38],"resilience":[39],"security.":[41],"It":[42],"focuses":[43],"on":[44,92],"explaining":[45],"key":[46],"concepts":[47,76],"about":[48],"SMPs,":[49,122],"their":[50,128],"characteristics":[51],"(e.g.,":[52,59,77],"size,":[53],"operational":[54],"field,":[55],"infrastructure),":[56],"potential":[57],"threats":[58],"interception":[60],"sensitive":[62],"information,":[63],"illegal":[64],"access,":[65],"terrorism)":[66],"attacks":[68],"(cyber,":[69],"cyber-physical),":[70],"well":[72],"basic":[74],"security":[75],"attack":[78,80,85],"path,":[79],"vector,":[81],"risk).":[82],"Three":[83],"SCS":[84],"scenarios":[86],"SMPs":[88],"described":[90],"based":[91],"different":[93],"types":[94],"threats,":[96],"which":[97],"could":[98],"cause":[99],"catastrophic":[100],"impacts,":[101],"even":[102],"paralyzing":[103],"an":[104],"SMP":[105],"propagated":[106],"its":[108],"SCS.":[109],"Finally,":[110],"a":[111],"risk":[112],"methodology":[114],"SCSs":[116],"be":[119],"used":[120],"by":[121],"named":[123],"CYSMET,":[124],"is":[125],"presented":[126],"considering":[127],"capabilities,":[129],"needs":[130],"constraints.":[132]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
