최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.32 no.2, 2022년, pp.447 - 463
유지운 ((주)디에스랩컴퍼니) , 조용현 ((주)디에스랩컴퍼니) , 차영균 (고려대학교)
Artificial Intelligence (AI) technology is a major technology that develops smart ships into autonomous ships in the marine industry. Autonomous ships recognize a situation with the information collected without human judgment which allow them to operate on their own. Existing ship systems, like con...
A. Humayed, J. Lin, F. Li and B. Luo, "Cyber-physical systems security-A survey," IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1802-1831, May. 2017.
Sun-seon Kwon, "Technology Trends of AI and Big Data," TTA journal, 187(393), pp. 38-44, Jan. 2020.
Korea Autonomous Surface Ship, "autonomous ship effect," https://kassproject.org/?menucode10700&tmenucontent, Feb 3, 2022.
J.E. Vinnem, and I.B. Utne, "Risk from cyberattacks on autonomous ships." Safety and Reliability-Safe Societies in a Changing World, CRC Press, pp. 1485-1492, June. 2018.
O.J. Rodseth, B. Kvamstad, T. Porathe and H.C. Burmeister, "Communication architecture for an unmanned merchant ship," 2013 MTS/IEEE OCEANS-Bergen, pp. 1-9, June. 2013.
M. Hoyhtya, J. Huusko, M. Kiviranta,K. Solberg, and J. Rokka, "Connectivity for autonomous ships: Architecture, use cases, and research challenges," 2017 International Conference on Information and Communication Technology Convergence (ICTC), IEEE, pp. 345-350, Oct. 2017.
A. Noel, K. Shreyanka, Kumar, K.G.S., Shameem, B.M. and B. Akshar, "Autonomous ship navigation methods: A review," Proc. Int. Conf. Marine Eng. Technol. Oman, pp. 161-174, Nov. 2019.
K.W. Kug, "Case of application by artificial intelligence technology and industry field," ISSN 1225-6447. Weekly ICT Trends, IITP, pp. 15-27, Mar. 2019.
S. Park and D. Choi, "Artificial intelligence security issues," Review of KIISC, 27(3), pp. 27-32, June. 2017.
C. Benzaid and T. Taleb, "AI for beyond 5G networks: a cyber-security defense or offense enabler?," IEEE Network, vol. 34, no. 6, pp. 140-147, Sep. 2020.
N. Kaloudi and J. Li, "The ai-based cyber threat landscape: A survey," ACM Computing Surveys (CSUR), vol. 53, no. 1, pp. 1-34, 2020.
MSC. 1/Circ. 1638. "Outcome of the Regulatory Scoping Exercise for the Use of Maritime Autonomous Surface Ships (MASS)," IMO, June. 2021.
S. Ahvenjarvi, "The human element and autonomous ships," TransNav: International Journal on Marine Navigation and Safety of Sea Transportation, vol. 10 no. 3, pp. 517-521, Oct. 2016.
R. Royce, "Autonomous ships: The next step," Marine Ship Intelligence. 2017.
J. Kim and H.S. Jang, "Technology trends and preparations for autonomous ships," Bulletin of the Society of Naval Architects of Korea, 56(4), pp. 4-7, Dec. 2019.
V. Bolbot, G. Theotokatos, E. Boulougouris and D. Vassalos, "Safety related cyber-attacks identification and assessment for autonomous inland ships," International Seminar on Safety and Security of Autonomous Vessels (ISSAV), Sep. 2019.
D. Nguyen, R. Vadaine, G. Hajduch, R. Garello and R. Fablet, "A multi-task deep learning architecture for maritime surveillance using AIS data streams," 2018 IEEE 5th International Conference on Data Science and Advanced Analytics (DSAA), pp. 331-340, Oct. 2018.
S.K. Singh and F. Heymann, "Machine learning-assisted anomaly detection in maritime navigation using AIS data," 2020 IEEE/ION Position, Location and Navigation Symposium (PLANS), pp. 832-838, Apr. 2020.
S. Thombre, Z. Zhao, H. Ramm-Schmidt, J.M.V. Garcia, T. Malkamaki, S. Nikolskiy and V.V. Lehtola, "Sensors and AI Techniques for Situational Awareness in Autonomous Ships: A Review," in IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 1, pp. 64-83, Jan. 2022.
E. Jokioinen, "Redefining shipping:Remote and Autonomous Ship-Thenext steps," vol. 4, no. 5, AAWA whitepaper, Ship Intelligence Marine, June. 2016.
L.P. Perera, V. Ferrari, F.P. Santos, M.A. Hinostroza and C.G. Soares, "Experimental evaluations on ship autonomous navigation and collision avoidance by intelligent guidance," IEEE Journal of Oceanic Engineering, vol. 40, no. 2, pp. 374-387, 2014.
L.P. Perera, "Autonomous ship navigation under deep learning and the challenges in COLREGs," International Conference on Offshore Mechanics and Arctic Engineering, June. 2018.
C. Wang, X. Zhang, R. Li and P. Dong, "Path planning of maritime autonomous surface ships in unknown environment with reinforcement learning," International Conference on Cognitive Systems and Signal Processing, Springer, Singapore, pp. 127-137, Nov. 2018.
S. Guo, X. Zhang, Y. Zheng and Y. Du, "An autonomous path planning model for unmanned ships based on deep reinforcement learning," Sensors, vol. 20, no. 2: 426. Jan. 2020.
V.S. Nguyen, V.C. Do and N.K. Im, "Development of automatic ship berthing system using artificial neural network and distance measurement system," International journal of Fuzzy logic and Intelligent systems, vol. 18, no. 1, pp. 41-49, Mar. 2018.
D. Lee, S.J. Lee and Y.J. Seo, "Application of recent developments in deep learning to ANN-based automatic berthing systems," International Journal of Engineering and Technology Innovation, vol. 10, no. 1, pp. 75-90, Jan. 2020.
N. Mizuno and R. Kuboshima "Implementation and evaluation of non-linear optimal feedback control for ship's automatic berthing by recurrent neural network," IFAC-PapersOnLine, vol. 52, no. 21, pp. 91-96, Sep. 2019.
E.L.H. Rorvik, "Automatic docking of an autonomous surface vessel," Master thesis. Norwegian University of Science and Technology (NTNU), Feb. 2020.
CyberKeel, "Maritime Cyber-Risks: Virtual Pirates at Large on the Cyber Seas," NCC Group Publication, Oct. 2014.
M. Guri, G. Kedma, A. Kachlon and Y. Elovici, "AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies," 2014 9th International Conference on Malicious and Unwanted Software: The Americas(MALWARE), pp. 58-67, Oct. 2014.
J. Wagstaff, "All at sea: global shipping fleet exposed to hacking threat," Reuters, Apr. 24. 2014.
J. Coffed, "The threat of gps jamming: The risk to an information utility," Report of EXELIS, Feb. 2014
D. Schmidt, K. Radke, S. Camtepe, E. Foo and M. Ren, "A survey and analysis of the GNSS spoofing threat and countermeasures," ACM Computing Surveys (CSUR), vol. 48,no. 4, pp. 1-31, May. 2016.
K. Tam and K. Jones, "Cyber-risk assessment for autonomous ships," 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), IEEE, pp. 1-8, June. 2018.
A. Costin, "Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations," Proceedings of the 6th international workshop on trustworthy embedded devices, pp. 45-54, Oct. 2016.
C. Heffner, "Exploiting surveillance cameras like a hollywood hacker," Black Hat USA 2013, Aug. 2013.
A. Costin, "Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations," Proceedings of the 6th international workshop on trustworthy embedded devices, pp. 45-54, Oct. 2016.
B. Muthusenthil and H.S. Kim, "CCTV Surveillance System, attacks and design goals," International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 4, pp. 2072-2082, Aug. 2018.
R. Santamarta, "Maritime security: Hacking into a voyage data recorder (VDR)," IOActive [Online], Dec. 2015.
J. Wang and S.M. Zhang, "Management of human error in shipping operations," Professional safety, vol. 45, no. 10, pp. 23-28. Oct. 2000.
R. Santamarta, "SATCOM terminals: Hacking by air, sea, and land," BlackHat USA 2014. Aug. 2014.
BIMCO. The Guidelines on Cyber Security Onboard Ships, Version 4, BIMCO, Dec. 2020.
Y. Yao, H. Li, H. Zheng and B.Y. Zhao, "Latent backdoor attacks on deep neural networks," Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2041-2055, Nov. 2019.
I.J. Goodfellow, J. Shlens and C. Szegedy, "Explaining and harnessing adversarial examples," arXiv preprint arXiv:1412.6572, Mar. 2015.
M. Fredrikson, S. Jha and T. Ristenpart, "Model inversion attacks that exploit confidence information and basic countermeasures," Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp. 1322-1333, Oct. 2015.
K.D. Jones, K. Tam and M. Papadaki, "Threats and impacts in maritime cyber security," Engineering& Technology Reference, Apr. 2016.
K. Tam and K. Jones, "Cyber-risk assessment for autonomous ships," 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), IEEE, pp. 1-8, June. 2018.
W. Jiang, H. Li, S. Liu, X. Luo and R. Lu, "Poisoning and evasion attacks against deep learning algorithms in autonomous vehicles," IEEE transactions on vehicular technology, vol. 69 no. 4, pp. 4439-4449. Apr. 2020.
K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, C. Xiao and D. Song, "Robust physical-world attacks on deep learning visual classification," Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1625-1634, Dec. 2018.
I. Evtimov, K. Eykholt, E. Fernandes, T. Kohno, B. Li, A. Prakash, and D. Song, "Robust physical-world attacks on machine learning models," arXiv preprint arXiv:1707.08945, vol. 2, no. 3:4, Apr. 2018.
D. Qiao, G. Liu, T. Lv, W. Li and J. Zhang, "Marine vision-based situational awareness using discriminative deep learning: A survey," Journal of Marine Science and Engineering, vol. 9, no. 4:397, Apr. 2021.
G. Kavallieratos, V. Diamantopoulou, and K. S. Katsikas, "Shipping 4.0: Security requirements for the cyber-enabled ship," IEEE Transactions on Industrial Informatics, vol. 16, no. 10, pp. 6617-6625, Feb. 2020.
M. Caprolu, R. Di Pietro, S. Raponi, S. Sciancalepore and P. Tedeschi, "Vessels cybersecurity: Issues, challenges, and the road ahead," IEEE Communications Magazine, vol. 58, no. 6, pp. 90-96, June. 2020.
A. Goudosis and S. Katsikas, "Secure AIS with identity-based authentication and encryption," 2020
Y. Takefuji, "Connected vehicle security vulnerabilities [commentary]," IEEE Technology and Society Magazine, vol. 37, no. 1, pp. 15-18. Mar. 2018.
D.S. Fowler, A.T. Le and C. Maple, "LiDAR Sensor Security of a Driverless Pod," May. 2021.
J. Petit, B. Stottelaar, M. Feiri and F. Kargl, "Remote attacks on automated vehicles sensors: Experiments on camera and lidar," Black Hat Europe, Nov. 2015.
A. Levine and S. Feizi, "Deep partition aggregation: Provable defense against general poisoning attacks," arXiv preprint arXiv:2006.14768. Mar. 2021.
G. Apruzzese, M. Andreolini, M. Marchetti, V.G. Colacino and G. Russo, "AppCon: Mitigating evasion attacks to ML cyber detectors," Symmetry, vol. 12, no. 4, pp. 653, Apr. 2020.
K.D. Gupta, D. Dasgupta and Z. Akhtar, "Applicability issues of evasion-based adversarial attacks and mitigation techniques," In 2020 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1506-1515, Dec. 2020.
R. Changalvala and H. Malik, "LiDAR data integrity verification for autonomous vehicle," IEEE Access, vol. 7, pp. 138018-138031, Sep. 2019.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.