Recent maritime cybersecurity accidents reveal that shipping is facing increased exposure to cyber threats, especially due to the fast-growing digitalisation of the sector, leaving vessels and their onboard systems vulnerable to cyberattacks. This research aims at evaluating the relationship among the critical dimensions influencing cybersecurity performance in the maritime industry. To achieve this, six critical dimensions related to cybersecurity preparedness are first identified through literature review, namely 'regulations', 'company procedures' from a managerial perspective and 'shipboard systems readiness', 'training and awareness', 'human factor' and 'compliance monitoring' at an operation level. A Likert-scale questionnaire is designed and used to collect empirical data from 133 seafarers and shore-based staff. Structural Equation Modelling (SEM) is applied to examine the causal relationships between the six dimensions and shipboard cybersecurity performance. The results show that 'regulations' positively influence shipping companies' cybersecurity-related 'procedures', which in turn positively affects 'shipboard systems readiness', 'training and awareness', and 'monitoring'. Further, 'training and awareness' positively influences the cybersecurity performance of ships. The results have profound implications for the shipping industry on how to strengthen their cyber practices in order to improve their cybersecurity performance. Recommendations for future academic research related to maritime cybersecurity are also provided.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11146163 | PMC |
http://dx.doi.org/10.1080/03088839.2022.2124464 | DOI Listing |
Enhancement of security, personalization, and safety in advanced transportation systems depends on driver identification. In this context, this work suggests a new method to find drivers by means of a Random Forest model optimized using the osprey optimization algorithm (OOA) for feature selection and the salp swarm optimization (SSO) for hyperparameter tuning based on driving behavior. The proposed model achieves an accuracy of 92%, a precision of 91%, a recall of 93%, and an F1-score of 92%, significantly outperforming traditional machine learning models such as XGBoost, CatBoost, and Support Vector Machines.
View Article and Find Full Text PDFNeural Netw
January 2025
Institute of High Performance Computing (IHPC), Agency for Science, Technology and Research (A*STAR), 138632, Singapore.
Pre-training and fine-tuning have become popular due to the rich representations embedded in large pre-trained models, which can be leveraged for downstream medical tasks. However, existing methods typically either fine-tune all parameters or only task-specific layers of pre-trained models, overlooking the variability in input medical images. As a result, these approaches may lack efficiency or effectiveness.
View Article and Find Full Text PDFMicrosc Res Tech
January 2025
AIDA Lab. College of Computer and Information Sciences (CCIS), Prince Sultan University, Riyadh, Saudi Arabia.
The development of deep learning algorithms has transformed medical image analysis, especially in brain tumor recognition. This research introduces a robust automatic microbrain tumor identification method utilizing the VGG16 deep learning model. Microscopy magnetic resonance imaging (MMRI) scans extract detailed features, providing multi-modal insights.
View Article and Find Full Text PDFSci Rep
January 2025
Computer Science Department, Faculty of Computers and Information, South Valley University, Qena, 83523, Egypt.
Adversarial attacks were commonly considered in computer vision (CV), but their effect on network security apps rests in the field of open investigation. As IoT, AI, and 5G endure to unite and understand the potential of Industry 4.0, security events and incidents on IoT systems have been enlarged.
View Article and Find Full Text PDFIn the current cybersecurity landscape, Distributed Denial of Service (DDoS) attacks have become a prevalent form of cybercrime. These attacks are relatively easy to execute but can cause significant disruption and damage to targeted systems and networks. Generally, attackers perform it to make reprisal but sometimes this issue can be authentic also.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!