721
[5] Neumann, T. (2024). Cybersecurity in Maritime Industry.
TransNav, International Journal on Marine Navigation
and Safety Od Sea Transportation, 18(4), 765–774.
https://doi.org/10.12716/1001.18.04.02
[6] Cyber Trends and Insights in the Marine Environment
2023. (2024). U.S. Coast Guard Cyber Command.
https://www.uscg.mil/Portals/0/Images/cyber/CTIME_20
23_FINAL.pdf
[7] Cyber Trends and Insights on the Marine Environment
2024. (2025). U.S. Coast Guard Cyber Command.
https://www.uscg.mil/Portals/0/Images/cyber/CGCYBER
%202024%20CTIME.pdf?ver=AgbTrQoh4Fs91HUmdhd_
xA%3d%3d×tamp=1747657640065
[8] Jaffe, J., & Floridi, L. (2024). Ransomware: Why It’s
Growing and How to Curb Its Growth. Applied
Cybersecurity & Internet Governance, 3(2), 38–64.
https://doi.org/10.60097/ACIG/192959
[9] Sindiramutty, S. R., Cen, T. Y., Raslan, M. A. H. bin M.,
Subramaniam, M. R., Xin, L. Y., Kin, S. J., Long, M. S., &
Sindiramutty, S. R. (2024). In-Depth Analysis and
Countermeasures for Ransomware Attacks: Case Studies
and Recommendations.
https://doi.org/10.20944/preprints202408.2261.v1
[10] Alhaji, U. M., Adewumi, S. E., & Yemi-peters, V. I. (2025).
Classification of Phishing Attacks Using Machine
Learning Algorithms: A Systematic Literature Review.
Journal of Advances in Mathematics and Computer
Science, 40(1), 26–44.
https://doi.org/10.9734/jamcs/2025/v40i11960
[11] Jampani, S. K. (2025). Social Engineering 2.0 Deepfake
and Deep Learning-based Cyber-attacks (Phishing).
IJFMR - International Journal For Multidisciplinary
Research, 7(1).
https://doi.org/10.36948/ijfmr.2025.v07i01.35527
[12] DDOS Attacks and Analysis of Different Defense
Mechanisms – IJSREM. (n.d.). Retrieved May 31, 2025,
from https://ijsrem.com/download/ddos-attacks-and-
analysis-of-different-defense-mechanisms/
[13] Afek, Y., Berger, H., & Bremler-Barr, A. (2025, January
23). POPS: From History to Mitigation of DNS Cache
Poisoning Attacks. arXiv.Org.
https://arxiv.org/abs/2501.13540v1
[14] Rolansa, F., Istiyanto, J. E., Afiahayati, A., & Frisky, A. Z.
K. (2025). SMOTE tree-based autoencoder multi-stage
detection for man-in-the-middle in SCADA. Indonesian
Journal of Electrical Engineering and Computer Science,
38(1), Article 1.
https://doi.org/10.11591/ijeecs.v38.i1.pp133-144
[15] Kandasamy, V., & Roseline, A. A. (2025). Harnessing
advanced hybrid deep learning model for real-time
detection and prevention of man-in-the-middle cyber
attacks. Scientific Reports, 15(1), Article 1.
https://doi.org/10.1038/s41598-025-85547-5
[16] Zhuo, Z., Cai, T., Zhang, X., & Lv, F. (2021). Long short-
term memory on abstract syntax tree for SQL injection
detection. IET Software, 15(2), 188–197.
https://doi.org/10.1049/sfw2.12018
[17] College of Computers and Information Technology, Taif
University, Taif, SA., Awadh, N., Zaid, H., College of
Computers and Information Technology, Taif University,
Taif, SA., Al-ajmani, Dr. S., & Department of Information
Technology, College of Computer and Information
Technology, Taif University, Taif, SA. (2025). A Robust
Framework for Detecting Brute-Force Attacks through
Deep Learning Techniques. International Journal of
Recent Technology and Engineering (IJRTE), 13(5), 27–42.
https://doi.org/10.35940/ijrte.E8182.13050125
[18] Mujtaba, A., Zulfiqar, M., Azhar, M. U., Ali, S., Ali, A., &
Khan, H. (2025). ML-based Fileless Malware Threats
Analysis for the Detection of Cyber security Attack based
on Memory Forensics: A Survey. The Asian Bulletin of
Big Data Management, 5(1), Article 1.
https://doi.org/10.62019/abbdm.v5i1.289
[19] Guadarrama-Estrada, A. R., Osorio-Gordillo, G. L.,
Vargas-Méndez, R. A., Reyes-Reyes, J., & Astorga-
Zaragoza, C. M. (2025). Cyber–Physical System Attack
Detection and Isolation: A Takagi–Sugeno Approach.
Mathematical and Computational Applications, 30(1),
Article 1. https://doi.org/10.3390/mca30010012
[20] Transportation-Energy-Communication Integrated
Management of Ship Cyber-Physical Systems Against
Cyber Attacks. (n.d.). Retrieved May 31, 2025, from
https://ieeexplore.ieee.org/document/10833774
[21] Swope, C., Bingen, K. A., Young, M., & Lafave, K. (2025).
Space Threat Assessment 2025. Center for Strategic &
International Studies. https://scispace.com/pdf/kinetic-
weapons-nonkinetic-weapons-electronic-weapons-
cyber-p1kxo3ufwf.pdf
[22] Greig, J. (2023, January 17). Ransomware attack on
maritime software impacts 1,000 ships.
https://therecord.media/ransomware-attack-on-
maritime-software-impacts-1000-ships
[23] Kovacs, E. (2023, January 18). Ransomware Attack on
DNV Ship Management Software Impacts 1,000 Vessels.
SecurityWeek.
https://www.securityweek.com/ransomware-attack-dnv-
ship-management-software-impacts-1000-vessels/
[24] Page, C. (2023, January 18). Maritime giant DNV says
1,000 ships affected by ransomware attack. TechCrunch.
https://techcrunch.com/2023/01/18/dnv-norway-
shipping-ransomware/
[25] Cyber-attack on ShipManager servers – update. (2023,
January 23). DNV. https://www.dnv.com/news/cyber-
attack-on-shipmanager-servers-update-237931/
[26] LaGrone, S. (2023, April 20). Ransomware Attack Hits
Marinette Marine Shipyard, Results in Short-Term Delay
of Frigate, Freedom LCS Construction. USNI News.
https://news.usni.org/2023/04/20/ransomware-attack-
hits-marinette-marine-shipyard-results-in-short-term-
delay-of-frigate-freedom-lcs-construction
[27] Ransomware attack on US Navy shipbuilder leaked
information of nearly 17,000 people. (n.d.). Retrieved May
31, 2025, from https://therecord.media/fincantieri-
shipbuilder-us-navy-wisconsin-ransomware
[28] Arghire, I. (2023, July 5). Japan’s Nagoya Port Suspends
Cargo Operations Following Ransomware Attack.
SecurityWeek. https://www.securityweek.com/japans-
nagoya-port-suspends-cargo-operations-following-
ransomware-attack/
[29] Nagoya Port Cyber Attack Japan’s Largest Port
Paralyzed 2023. (2023, July 5).
https://thecyberexpress.com/nagoya-port-cyber-attack-
largest-japan/
[30] Wadhwani, S. (n.d.). Nagoya Port Ransomware Attack—
Spiceworks. Spiceworks Inc. Retrieved April 27, 2025,
from https://www.spiceworks.com/it-security/security-
general/news/nagoya-port-ransomware-attack/
[31] Benjamin, J. (2023, July 11). OT Cybersecurity Breach
Disrupts Operations at the Port of Nagoya, Japan |
Dragos. https://www.dragos.com/blog/ot-cybersecurity-
breach-disrupts-operations-at-the-port-of-nagoya-japan/
[32] Network, M. N. (2025, May 16). Intelligence Firm
Confirms GPS Spoofing Responsible For MSC Antonia
Grounding. Marine Insight.
https://www.marineinsight.com/shipping-
news/intelligence-firm-confirms-gps-spoofing-
responsible-for-msc-antonia-grounding/
[33] Schuler, M. (2025, May 15). Pole Star Confirms GPS
Interference Caused MSC ANTONIA Grounding.
gCaptain. https://gcaptain.com/pole-star-confirms-gps-
interference-caused-msc-antonia-grounding/
[34] MSC ANTONIA Current Position (Container Ship, IMO
9398216)—VesselFinder. (n.d.). Retrieved May 29, 2025,
from https://www.vesselfinder.com/pl/?imo=9398216
[35] UKMTO Ops Centre w [@UK_MTO]. (2025, May 9).
20250509_UKMTO_ADVISORY_INCIDENT 015-25
https://ukmto.org/-
/media/ukmto/products/20250509_ukmto_advisory_inci
dent-015-
25.pdf?rev=aaa78cfdab39445b8662a9c4232205e3