Articles published on Critical infrastructure protection
Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
906 Search results
Sort by Recency
- New
- Research Article
- 10.3390/electronics15030557
- Jan 28, 2026
- Electronics
- Md Shazzad Hossain Shaon + 1 more
Quantum computing is a new discipline that uses the ideas of quantum physics to do calculations that are not possible with conventional computers. Quantum bits, called qubits, could exist in superposition states, making them suitable for parallel processing in contrast to traditional bits. When it comes to addressing complex challenges like proof simulation, optimization, and cryptography, quantum entanglement and quantum interference provide exponential improvements. This survey focuses on recent advances in entanglement routing, quantum key distribution (QKD), and qubit management for short- and long-distance quantum communication. It studies optimization approaches such as integer programming, reinforcement learning, and collaborative methods, evaluating their efficacy in terms of throughput, scalability, and fairness. Despite improvements, challenges remain in dynamic network adaptation, resource limits, and error correction. Addressing these difficulties necessitates the creation of hybrid quantum–classical algorithms for efficient resource allocation, hardware-aware designs to improve real-world deployment, and fault-tolerant architecture. Therefore, this survey suggests that future research focus on integrating quantum networks with existing classical infrastructure to improve security, dependability, and mainstream acceptance. This connection has significance for applications that require secure communication, financial transactions, and critical infrastructure protection.
- Research Article
- 10.1002/cpe.70524
- Jan 1, 2026
- Concurrency and Computation: Practice and Experience
- Ibtihal A Alablani + 1 more
ABSTRACT The proliferation of Open Radio Access Network (O‐RAN) architectures in 5G/6G networks introduces unprecedented cybersecurity challenges. Strategic base station deployment constitutes a fundamental determinant of network security posture and cyberattack resilience. In this paper, a novel cybersecurity‐driven deployment strategy for resilient base station positioning using an intelligent Resilient Ant Colony Optimization (iResACO) algorithm. The algorithm integrates security considerations directly into deployment optimization, employing bio‐inspired collective intelligence to discover patterns that balance coverage efficiency with attack resilience. Through extensive simulations in a 3.6 km 3.6 km urban environment in Riyadh, Saudi Arabia, experimental results demonstrate superior performance achieving 92.04% overall effectiveness with 96.0% coverage probability and 100% critical infrastructure protection. Under various cyberattack scenarios ranging from random to coordinated sophisticated attacks, the algorithm maintains coverage above 87% while preserving complete protection of critical facilities. The proposed approach provides a practical framework for deploying secure, resilient 5G/6G networks capable of withstanding evolving cyber threats while ensuring uninterrupted service to essential infrastructure.
- Research Article
- 10.2139/ssrn.6162447
- Jan 1, 2026
- SSRN Electronic Journal
- Susanne Lloyd-Jones + 1 more
Governments and businesses with an interest in quantum technologies are predicting that they have the potential to enable significant sociotechnical change in multiple fields. Expectations from technical developments enabled by quantum technologies include exponential increases in computing power; new treatments for diseases; and the breaking of current cryptographic systems. Perceived threats and opportunities of quantum technologies, especially quantum computing, communications, and cryptography, are driving the strategic, economic and policy agendas of nations and the commercial imperatives of business. This article compares Australia's emerging strategic, policy and regulatory landscape for quantum computing with recent interventions by other nations and regions (the US, UK, EU and India) relating to cyber security and critical infrastructure (CI) protection. We examine these interventions through the lens of resilience to gauge Australia's preparedness. The United States launched its quantum mission in 2018 and already has quantum-specific legislation in place; the UK released its national quantum strategy in March 2023 and has begun canvassing regulatory approaches to quantum technology applications; India launched its national quantum mission in April 2023; and the Australian government published its national quantum strategy in May 2023. The paper analyses recent Australian developments in CI protection and telecommunications assistance and access and considers the legal and regulatory implications of quantum technology for industry and government in these contexts. 
- Research Article
- 10.1504/ijcis.2026.10070370
- Jan 1, 2026
- International Journal of Critical Infrastructures
- Marica Mamut + 2 more
An Outline of Critical Infrastructure Protection Strategy against Hydraulic Warfare for Republic of Croatia
- Research Article
- 10.19195/2658-1310.31.3.5
- Dec 31, 2025
- Ekonomia
- Rafał Świtała
Introduction: In the era of increasing digitization of the long-term care sector and increased exposure to cyber threats, it is necessary to identify the main risks and barriers in the implementation of effective protective solutions and to provide recommendations for IT system security policies. Objective: The aim of the article is to analyze the key challenges and conditions related to cybersecurity in senior care institutions. Research methodology: A literature review methodology was used, analyzing scientific papers and industry reports (including ENISA, NIST, CERT Polska). The review included both sources from databases and regulatory documents (GDPR, NIS2 Directive). The analysis included guidelines from healthcare institutions, as well as cybersecurity supervisory bodies. Results: Senior care institutions such as social welfare homes, family care homes, nursing and treatment facilities and nursing and care facilities, multifunctional social service centers are particularly vulnerable to cyberattacks. The most common attacks include ransomware attacks (e.g., blocking electronic medical records systems); leaks of sensitive data (resulting from, among others, improper configuration of cloud computing); phishing aimed at staff (due to low level of digital awareness). Conclusions: The main factors increasing the risk of cyberattacks in senior care institutions are underfunding of IT, lack of specialized staff and fragmented implementation of standards. Based on the literature review, it can be assumed that institutions using regular security audits, employee training and cooperation with CSIRT should record a smaller number of effective attacks. It is necessary to develop a sectoral cybersecurity standard for senior care institutions, considering strengthening legal requirements regarding the protection of critical infrastructure; introducing mandatory educational programs for staff; creating mechanisms for financing the modernization of IT systems (e.g., within the framework of EU funds). The importance of intersectoral coordination is also increasing, e.g., through platforms for exchanging information on threats. Close cooperation with supervisory authorities and the use of cloud solutions with advanced encryption mechanisms is therefore recommended.
- Research Article
- 10.13166/jms/214328
- Dec 29, 2025
- Journal of Modern Science
- Anna Lidia Wierzchowska + 4 more
Objectives The aim of this article is to present the concept of building state resilience in the social dimension, with an emphasis on the role of communities and institutions in crisis management processes. The authors analyze how the modern approach to public security incorporates society’s capacity for adaptation, recovery, and cooperation in crisis situations. The is aims to identify key factors supporting the development of social resilience, particularly in the context of Poland's security policy. Material and methods The article is baased on analysis and qualitative methods, integrating various theoretical and practical approaches in crisis management and resilience theory. It also applies theoretical comparison concerning concepts such as social capital theory, constructivism, resilience theory, and crisis management theory. Strategic documents and legal acts are also analyzed. Results State social resilience depends both on institutional actions and civic engagement. A crucial factor is the integration of social initiatives with the crisis management system and support for citizen involvement in crisis planning and response. Civic education also plays an important role, enhancing social awareness and readiness to act in emergency situation. Conclusions Security policies aimed at building resilient societies should focus on effective crisis management systems, critical infrastructure protection, and civil defense mechanisms that support, rather than replace, individual citizen responsibility. Accordingly, these efforts must go beyond traditional military, legal, or diplomatic tools and extend into education and training systems. Through this, it becomes possible to reshape public awareness and even redefine national identity in terms of how security is perceived and enacted.
- Research Article
- 10.38124/ijsrmt.v4i12.1091
- Dec 24, 2025
- International Journal of Scientific Research and Modern Technology
- Theodora Teikor Tetteh
The integration of artificial intelligence (AI) in cybersecurity architecture presents unprecedented opportunities and challenges for digital health systems and critical infrastructure protection. This study examines the ethical dimensions of AI-driven cybersecurity frameworks, focusing on the dual nature of AI as both a defensive mechanism and potential threat vector. Through a comprehensive literature review and framework analysis, we investigate how ethical considerations intersect with technical implementations in protecting sensitive healthcare data and critical infrastructure. Our findings reveal that while AI-enhanced cybersecurity systems demonstrate superior threat detection capabilities, they simultaneously introduce concerns regarding bias, transparency, accountability, and human oversight. We propose an integrated ethical AI cybersecurity architecture that balances automated threat response with human judgment, incorporates fairness-aware algorithms, and maintains stakeholder trust through transparent operations. The study contributes to the growing body of knowledge on responsible AI deployment in high-stakes environments, offering practical guidelines for healthcare organizations and critical infrastructure operators. Our results indicate that successful implementation requires multi-stakeholder collaboration, robust governance frameworks, and continuous ethical auditing mechanisms. This research provides actionable insights for policymakers, healthcare administrators, and cybersecurity professionals navigating the complex landscape of AI-enabled security systems.
- Research Article
- 10.15576/gll/213751
- Dec 22, 2025
- Geomatics, Landmanagement and Landscape
- Robert Szewczyk
The development of an information society is one of the European Union’s key objectives. In this context, geospatial data play a particularly important role, and are regulated by the INSPIRE directive and the Spatial Information Infrastructure Act in Poland. These data include, among others, the BDOT10k, GESUT, and orthophoto maps, which are widely available through geoportals and network services such as WMS and WFS. Up-to-date spatial information supports institutions, businesses, and citizens in planning and economic development. At the same time, the protection of critical infrastructure (CI) is becoming increasingly important. CI includes energy, telecommunication, financial, water, healthcare, transport, rescue, and administrative systems. Disruption in their functioning can lead to serious crises. Poland has implemented the National Critical Infrastructure Protection Program, which aims to ensure the security and continuity of these systems. This protection involves physical, technical, personnel, and teleinformation measures, with cyberattacks emerging as one of the most significant threats. The conclusions emphasise the need to balance open access to data with the protection of strategic information. In particular, access to data on high-capacity transmission networks should be restricted, while the physical and cyber protection of critical infrastructure must be strengthened. The current model of publishing geospatial data requires a thorough review and adjustment in the light contemporary threats.
- Research Article
- 10.1177/23998083251405916
- Dec 14, 2025
- Environment and Planning B: Urban Analytics and City Science
- Zhenhua “Aaron” Yang + 3 more
This study explores the intersection of serious games and geogames in cybersecurity (CS) and disaster management (DM), examining implementations and applications at this convergence. Through a systematic review of 100 games (53 for cybersecurity and 47 for disaster management), it analyzes their genres, learning objectives, spatial features, target audience, and publishing contexts. The results reveal that while both domains heavily utilize simulation, cybersecurity games tend to emphasize individual awareness through puzzles and quizzes, whereas disaster management games prioritize systemic thinking and collaboration via strategy and role-playing. The key finding of this study is the underutilization of geospatial elements in cybersecurity games, despite their relevance for critical infrastructure protection. In contrast, disaster management games often embed spatial thinking as a core mechanic. This gap highlights an opportunity to develop “cybergeogames” that integrate geographic data and spatial reasoning to simulate real-world cyber-physical threats. The paper calls for a new generation of serious geogames that bridge digital and physical domains to enhance preparedness for complex, location-bound disruptions.
- Research Article
- 10.56301/juris.v9i2.1788
- Dec 13, 2025
- The Juris
- Suharto + 3 more
This study aims to analyze the legal framework of the Draft Law on Cybersecurity and Resilience (RUU KKS) in ensuring the protection of national strategic infrastructure and data, as well as to identify potential legal issues that may arise. The background of this research is driven by the growing threats of cybercrime in Indonesia, which have significant implications for national security, economic stability, and the protection of personal data. The research method employed is normative legal research using a conceptual approach and a statute approach. The data were collected from laws and regulations, academic literature, and relevant court decisions. The analysis technique used is qualitative descriptive, interpreting legal principles and assessing the coherence of existing regulations with the needs of national cybersecurity protection. The findings indicate that Indonesia’s current cybersecurity regulations remain fragmented across several sectoral laws, resulting in overlaps and weaknesses in ensuring legal certainty. The RUU KKS is expected to serve as a comprehensive legal instrument that strengthens the protection of critical infrastructure, prevents cyber misuse, and balances state interests with the protection of individual rights. Anchored in Pancasila and the 1945 Constitution, this regulation is essential to reinforce Indonesia’s digital sovereignty.
- Research Article
- 10.3390/en18246453
- Dec 10, 2025
- Energies
- Dorota Duda + 3 more
The stability of modern economies relies on the uninterrupted supply of electricity, heat, and transport fuels, making the energy sector highly exposed to various risks and disruptions, including floods, which are among the major natural hazards affecting energy infrastructure in Poland. Despite risks, a scalable and integrated modelling framework for operational flood risk management in energy infrastructure is still lacking. Such a framework should account for increasing climate-related hazard dynamics, integrate robust fragility and damage models with comprehensive flood risk assessments at both asset and system levels, and explicitly consider interdependencies among energy system components and associated critical infrastructure. This integration is essential for analyzing cascading failures and their consequences, while complying with the EU CER Directive requirements for resilience and continuity of critical infrastructure services. An original three-stage spatial vulnerability analysis method was developed, involving GIS data preparation, classification of asset importance, and flood scenario modelling, demonstrated on selected rivers in the Odra River basin. The Expected Damage Factor (EDF) metric was applied to combine flood probability with infrastructure significance. The analysis enabled spatial identification of the most vulnerable components of the energy system and illustrated the dynamics of threats in time and space. The EDF coefficient allowed for quantitative vulnerability assessment, supporting more precise adaptive planning. The approach innovatively combines infrastructure criticality assessment with probabilistic flood scenarios and explicitly incorporates systemic interdependencies in accordance with the CER Directive, enhancing operational flood risk management capabilities. The method provides a practical tool for critical infrastructure protection, operational planning, and the development of adaptive strategies, thereby increasing the flood resilience of the energy system and supporting stakeholders responsible for risk management.
- Research Article
- 10.22399/ijcesen.4359
- Nov 27, 2025
- International Journal of Computational and Experimental Science and Engineering
- Al Bagiro + 5 more
The goal of the research is to answer how deep learning techniques affect the accuracy of threat detection, threat response automation and the security of the digital infrastructure in general. These days, security measures can hardly defend against increasingly sophisticated cyber-attacks, including ransomware, phishing and even zero-day vulnerabilities. The rapid digitalization of modern-day industries, the increasing complexities of cyber threats have made the utilization of AI in cybersecurity imperative. As a set of traditional measures is unable to defend against these kinds of attacks, new emerging technologies such as deep learning are set to make an impact. AI and deep learning in particular, is set to make strides in the active, preventive and mitigative measures of cyber-attack threats. These goals achieved by employing a systematic literature review hybridized with deep learning model experimentation concerning the field of cybersecurity. Recent developments in the integration of AI in security measures reviewed, along with numerous neural networks CNNs, RNNs and GANs. It is implementing an experimental design and evaluation with a benchmark dataset pertaining to cybersecurity. The conclusion highlights that deep learning greatly improves threat detection mechanisms through automation in cybersecurity. Compared to conventional security systems, machine learning models offer higher mastery in identifying anomalies and produce fewer false alarms. There are still some obstacles like the complexity of computations, opposing threats and privacy issues. These findings suggest that AI-powered cybersecurity solutions greatly enhance the protection of national critical assets and infrastructures in a rapidly changing cyber environment.
- Research Article
- 10.1007/s41125-025-00107-2
- Nov 27, 2025
- European Journal for Security Research
- Monika Gabriela Bartoszewicz
Abstract This article examines the strategic implications of conceptual inflation in the evolving discourse of hybrid warfare, with particular focus on its consequences for critical infrastructure protection. Drawing a parallel with the post-9/11 securitisation of terrorism, it argues that the increasingly elastic use of the term “hybrid threat” has created a condition of perpetual preparedness that paradoxically undermines operational readiness. As diverse threat phenomena, from cyber intrusions and disinformation to sabotage and proxy violence, are collapsed under a single hybrid rubric, crisis planning becomes generalised and detached from actor-specific threat logic. Through a comparative analysis of Norway and Taiwan, two advanced but geopolitically exposed democracies, the article demonstrates how national security systems, though resilient, remain conceptually unprepared for deniable, adaptive threats posed by state-backed terrorist proxies. Both countries possess sophisticated infrastructure protection frameworks; yet both continue to treat disruption as accidental or technical, rather than as strategically curated. Drawing on contemporary scholarship, fieldwork, and recent incidents, the article makes the case for a reconceptualisation of infrastructure as a strategic domain vulnerable to intelligent exploitation. It calls for a shift from resilience-based preparedness to anticipatory governance, underpinned by attacker modelling, red-teaming, and clearer typological distinctions. In doing so, it contributes to the growing debate on how to move beyond the rhetoric of hybrid warfare and towards a more operationally grounded framework for future security governance.
- Research Article
- 10.24144/2307-3322.2025.91.5.33
- Nov 22, 2025
- Uzhhorod National University Herald. Series: Law
- O G Tsyhanov
The article examines the current state of the legal framework of the United States’ internal security system, which serves as an example of a state that has developed one of the most complex and, at the same time, most effective models of internal security –capable of adapting to the dynamic challenges of the 21st century. It is noted that the formation of the modern American system of internal security began after the terrorist attacks of September 11, 2001, when national security institutions faced significant criticism for the lack of coordination among federal agencies. It establishes that the development of the regulatory and legal foundations of U.S. internal security is complex and multi-level, combining legal, organizational, and democratic mechanisms for the protection of the state and society. The fundamental legal act in this sphere is The Homeland Security Act of 2002, under which the Department of Homeland Security (DHS) was established – an integrated body that united 22 federal agencies to coordinate activities in counterterrorism, border control, protection of critical infrastructure, cybersecurity, emergency response, and risk management. The content of The Stafford Act is revealed as the legislative basis for crisis response and intergovernmental cooperation. Attention is drawn to the fact that in the United States, a defining element of the legal balance between the state’s security activities and the observance of democratic principles is the restriction on the use of the armed forces in domestic affairs. The Posse Comitatus Act and Insurrection Act are defined as essential safeguards ensuring civilian control over the military and limiting the domestic use of force. The Freedom of Information Act (FOIA) and Privacy Act of 1974 are examined as key instruments of governmental transparency, accountability, and protection of human rights. It is argued that the American model of internal security operates under the rule of law and a democratic system of checks and balances that prevent power abuse while maintaining national resilience. The study concludes that the U.S. experience is of high practical relevance for Ukraine under conditions of full-scale war, particularly for developing a unified internal security system, improving crisis legislation, enhancing civilian oversight, and strengthening the legal responsibility of the state toward its citizens as a foundation of democratic stability and public trust.
- Research Article
- 10.37566/2707-6849-2025-3(52)-2
- Nov 11, 2025
- Slovo of the National School of Judges of Ukraine
- Оleksandr Babarytskyi + 1 more
The article explores the peculiarities of cooperation between military administrations in Ukraine under conditions of armed conflict, with a focus on the period since the introduction of martial law in 2022. It provides a comprehensive analysis of the legal and regulatory framework that governs the establishment and functioning of military administrations, including their legal status, jurisdiction, and interaction with other actors. Special attention is paid to the mechanisms of coordination and cooperation between military administrations at various levels – regional, district, and local – as well as their collaboration with civil authorities, law enforcement agencies, and local self-government bodies. The article identifies challenges that arise in practice, such as overlapping responsibilities, insufficient communication channels, and legal uncertainties, and proposes practical recommendations for enhancing the efficiency of these interactions. It also considers the strategic role of military administrations in the areas of defense planning, territorial defense, humanitarian assistance, and protection of critical infrastructure. Finally, the article outlines future directions for strengthening the institutional capacity and operational effectiveness of military administrations to ensure sustainable governance in conflict-affected areas under martial law. Key words: military administrations, armed conflict, martial law, civil-military cooperation, coordination of activities, defense planning, territorial defense, humanitarian aid, critical infrastructure, legal regime.
- Research Article
- 10.37566/2707-6849-2025-3(52)-16
- Nov 11, 2025
- Slovo of the National School of Judges of Ukraine
- Andriy Andreykiv
The features of cooperation during armed conflicts and crises, compliance with the principles of international economic law, which ensure the continuity of the functioning of state economies, protection of critical infrastructure, property rights, and economic freedoms, are analyzed. Judicial practice demonstrates approaches to interpreting standards for protecting investors' property rights, regulating the rights of non-residents in situations of forced alienation of property, and managing foreign investment projects. Proposals are formulated to improve the legislation of Ukraine, including in the conditions of post-war reconstruction, taking into account international standards and strategic transformation of the state. Key words: standards, economic cooperation, judicial practice, martial law, property rights, expropriation, compensation, international law, legal risks, legal certainty, due diligence, investment guarantees, post-war reconstruction, legal liability
- Research Article
- 10.3390/technologies13110514
- Nov 11, 2025
- Technologies
- Artem Kozmin + 5 more
Distributed acoustic sensing (DAS) systems enable real-time monitoring of physical events across extended areas using optical fiber that detects vibrations through changes in backscattered light patterns. In perimeter security applications, these systems must accurately distinguish between legitimate activities and potential security threats by analyzing complex spatio-temporal data patterns. However, the high dimensionality and noise content of raw DAS data presents significant challenges for effective feature extraction and event classification, particularly when computational efficiency is required for real-time deployment. Traditional approaches or current machine learning methods often struggle with the balance between information preservation and computational complexity. This study addresses the critical need for efficient and accurate feature extraction methods that can identify informative signal components while maintaining real-time processing capabilities in DAS-based security systems. Here we show that wavelet packet decomposition (WPD) combined with a cascaded machine learning approach achieves 98% classification accuracy while reducing computational load through intelligent channel selection and preliminary filtering. Our modified peak signal-to-noise ratio metric successfully identifies the most informative frequency bands, which we validate through comprehensive neural network experiments across all possible WPD channels. The integration of principal component analysis with logistic regression as a preprocessing filter eliminates a substantial portion of non-target events while maintaining high recall level, significantly improving upon methods that processed all available data. These findings establish WPD as a powerful preprocessing technique for distributed sensing applications, with immediate applications in critical infrastructure protection. The demonstrated gains in computational efficiency and accuracy improvements suggest broad applicability to other pattern recognition challenges in large-scale sensor networks, seismic monitoring, and structural health monitoring systems, where real-time processing of high-dimensional acoustic data is essential.
- Research Article
- 10.54648/aila2025058
- Nov 1, 2025
- Air and Space Law
- Rebecca Connolly + 1 more
With the increased military significance of space-based capabilities, the line between military and civilian space assets is becoming increasingly blurred. As the international community deliberates on the legal framework for safe operations in space, this ‘dual-use’ dilemma presents unique challenges. It is critical to ensure the responsible and sustainable use of outer space through a coordinated approach to the conduct of space operations. As congestion in space grows, there is pressure for states to secure their military (including dual-use) space assets from both deliberate and unintentional threats. However, government strategies relating to space security and space safety may have opposing underlying approaches. This article will consider how dual-use space assets pose a challenge for the balancing of national security objectives against the need for global cooperation to create a space rules framework. In balancing these objectives, it is also necessary for states to consider the concerns of private satellite operators, whose commercial activities are increasingly affected by evolving security postures. It will also explore whether the development of norms for behaviour in space operations, space traffic management (STM) and critical infrastructure protection could be utilized as a critical tool for enhancing space security. By examining how principles for satellite operations, collision avoidance and restrictive zones can reduce the risk of accidents and intentional interference, this article highlights the role of space safety norms in preventing conflicts and promoting stability in outer space.
- Research Article
- 10.3390/eng6110295
- Nov 1, 2025
- Eng
- Snežana Tadić + 3 more
Safety is a central concern in aviation, where aircraft operations involve complex processes and interactions exposed to multiple hazards. Addressing these hazards requires systematic risk management and the selection of effective safety measures. This study introduces a novel hybrid multi-criteria decision-making (MCDM) framework that integrates the grey Delphi method, the grey Analytic Hierarchy Process (AHP), and the grey Axial-Distance-Based Aggregated Measurement (ADAM) method. The framework provides a rigorous engineering-based approach for evaluating and ranking safety measures under uncertainty and diverse stakeholder perspectives. Application of the model to aircraft operations demonstrates its ability to identify the most effective measures, including the development of critical infrastructure protection plans, rerouting of flight paths from high-risk areas, and strengthening of regulatory oversight. The proposed methodology advances decision-support tools in aviation safety engineering, offering structured guidance for optimizing resource allocation and improving system resilience.
- Research Article
- 10.3390/jmse13102008
- Oct 19, 2025
- Journal of Marine Science and Engineering
- Florian Hoehner + 3 more
Effective operation of autonomous maritime systems requires sensor architectures tailored to mission-specific requirements, as key performance criteria like accuracy and energy consumption vary significantly by operational context. Against this background, this study develops a dual-stage, multi-criteria procedure to evaluate and assess individual sensors accounting for scenario-based requirements, using the TOPSIS algorithm as its core method. The first stage individually assesses sensors against scenario-specific requirements to generate context-aware weighting factors (αis). In the second stage, these factors are used to evaluate the overall performance of seven predefined sensor suites across five distinct operational scenarios (e.g., ‘Coastal Surveillance’ or ‘Protection of Critical Infrastructure’). The procedure is complemented by an architectural robustness assessment that systematically captures the impact of component failures. This flexible approach serves as a generic decision framework for designing unmanned maritime systems across different mission profiles. By integrating key performance metrics and failure scenarios within a context of prioritized operational requirements, the dual-stage multi-criteria procedure enables more than just selecting an optimal configuration. It reveals the fundamental architectural design principles. Our results demonstrate that for precision-focused tasks such as ‘Coastal Surveillance’, specialized sensor suites combining electro-optical and laser rangefinder achieves the highest performance score (0.84). Conversely, for scenarios with balanced requirements like ‘Protection of Critical Infrastructure’, architectures based on functional complementarity (e.g., electro-optical and Radar, score (0.64)) prove most effective. A key finding is that maximizing sensor quantity does not guarantee optimal performance, as targeted, mission-specific configurations often outperform fully integrated systems. The significance of this study lies in providing a systematic framework that shifts the design paradigm from a ‘more is better’ approach to an intelligent, context-aware composition, enabling the development of truly robust and efficient sensor architectures for autonomous maritime systems.