Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber risk (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/196)
Export
export all inquiry results
(4)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications
Carlo, Antonio
;
Manti, Nebile Pelin
;
Bintang, A. S. W. A. M.
;
Casamassima, Francesca
;
Boschetti, Nicolo
;
Breda, Paola
;
Rahloff, Tobias
Journal of space safety engineering
2023
/
p. 474-482 : ill
https://doi.org/10.1016/j.jsse.2023.08.002
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
3
journal article EST
/
journal article ENG
Safeguarding the final frontier : analyzing the legal and technical challenges to mega-constellations
Jha, Devanshu
;
Manti, Nebile Pelin
;
Carlo, Antonio
;
Zarkan, Laetitia Cesari
;
Breda, Paola
;
Jha, Antara
Journal of space safety engineering
2022
/
p. 636-643
https://doi.org/10.1016/j.jsse.2022.08.006
Journal metrics at Scopus
Article at Scopus
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
4
journal article EST
/
journal article ENG
When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisis
Skierka-Canton, Isabel
Government information quarterly
2023
/
art. 101781, 12 p. : ill
https://doi.org/10.1016/j.giq.2022.101781
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
Number of records 4, displaying
1 - 4
keyword
191
1.
cyber risk
2.
cyber-risks
3.
perceived cyber risks and threats
4.
autonomous vehicle cyber range
5.
cloud-based cyber-physical systems (C2PS)
6.
cognitive cyber warfare
7.
cyber
8.
Cyber “Maastricht”
9.
cyber architecture
10.
cyber attacks
11.
cyber battle damage assessment
12.
Cyber Bio-analytical Physical Systems (CBPSs)
13.
cyber challenge
14.
cyber command
15.
cyber conflict
16.
cyber contingency
17.
cyber crime
18.
cyber crime pathways
19.
cyber crime scripting
20.
Cyber crisis management
21.
cyber defence
22.
cyber defence exercise
23.
cyber defence exercises
24.
cyber defense education
25.
cyber defense exercise
26.
cyber defense exercises
27.
cyber dependence
28.
cyber diplomacy
29.
cyber exercise
30.
cyber hygiene
31.
cyber impact assessment
32.
cyber incidents
33.
cyber insurance
34.
cyber intrusion detection
35.
cyber kill chain
36.
cyber operation
37.
cyber operation officer
38.
cyber operations
39.
cyber physical energy systems
40.
cyber physical power system (CPPS)
41.
Cyber Physical Production System
42.
cyber physical production systems (CPPS)
43.
cyber physical social system
44.
cyber physical social systems (cpss)
45.
cyber physical system
46.
cyber power Europe
47.
cyber ranges
48.
cyber red teaming
49.
cyber resilience
50.
cyber security
51.
cyber security education
52.
cyber security exercises
53.
cyber security strategies
54.
cyber situational awareness
55.
cyber stability
56.
cyber team communication
57.
cyber threat
58.
cyber threat communication
59.
cyber threats
60.
cyber war
61.
cyber warfare
62.
cyber warriors
63.
cyber weapons
64.
cyber-attack
65.
cyber-attack pathways
66.
cyber-insurance
67.
cyber-paternalism
68.
cyber-physical energy systems
69.
cyber-physical social system (CPSS)
70.
cyber-physical system
71.
Cyber-Physical System (CPS)
72.
cyber-physical system logistic robot
73.
cyber-physical systems
74.
Cyber-Physical Systems (CPS)
75.
cyber-security
76.
cyber-vulnerabilities
77.
Defensive Cyber Operations
78.
EU cyber policy
79.
international cyber norms
80.
military cyber
81.
mobile cyber-physical system
82.
national cyber security strategy
83.
NATO Cyber Range
84.
Offensive Cyber Operations
85.
responsive cyber defence
86.
Socio-Cyber-Physical Systems
87.
technical cyber exercise
88.
at-risk-of-poverty rates
89.
bank risk-taking
90.
bank-risk taking
91.
bankruptcy risk
92.
cancer risk
93.
cardiovascular risk
94.
Cardiovascular risk assessment
95.
cardiovascular risk factors
96.
climatic risk
97.
coastal risk index
98.
conceptual framework for safety/risk analysis
99.
conditional value at risk (CVaR)
100.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
101.
credit risk
102.
credit risk determinants
103.
disaster risk reduction
104.
ecological risk assessment
105.
Economic risk
106.
elimination of risk
107.
environmental risk
108.
environmental risk assessment
109.
ESG risk
110.
farmer's risk criterion
111.
fish injury and mortality risk
112.
flood risk management
113.
health risk
114.
heart disease risk factors
115.
infection risk
116.
infection risk-based ventilation
117.
insurance risk
118.
kardiovaskulaarne risk
119.
knowledge risk
120.
knowledge risk management
121.
knowledge risk management (KRM)
122.
knowledge risk management in banking
123.
knowledge risk management in construction
124.
knowledge risk management in SMEs
125.
military environment risk assessment
126.
models for risk assessment
127.
mould growth risk
128.
mould risk
129.
multi-risk/multi-criteria
130.
operational knowledge risk
131.
overheating risk
132.
perceived risk
133.
Polygenic risk score
134.
portfolio risk hedging
135.
potential risk
136.
pre-symptomatic period risk control
137.
proactive risk management
138.
process risk
139.
project risk management
140.
psychosocial risk factors
141.
quantitative risk analysis
142.
reactive risk management
143.
residual cardiovascular risk
144.
risk
145.
risk group for mental disorders
146.
risk allocation
147.
risk analysis
148.
risk assessment
149.
risk assessment chemicals in the air
150.
risk assessments
151.
risk attitudes
152.
risk behavior
153.
risk classification
154.
risk evaluation model
155.
risk evaluation model development
156.
risk event chain analyses
157.
risk factors
158.
risk governance
159.
risk interdependence
160.
risk levels
161.
risk management
162.
risk management culture
163.
risk management in public organizations
164.
risk management model
165.
risk mitigation
166.
risk modelling
167.
risk of failure
168.
risk of mould growth
169.
risk prediction
170.
risk preference analysis
171.
risk prevention
172.
risk reduction
173.
risk stratification
174.
risk transfer
175.
risk-adjusted performance
176.
risk-based management
177.
risk-taking
178.
rrivacy risk assessment
179.
security risk assessment
180.
security risk management
181.
semi-quantitative risk assessment method
182.
ship collision risk
183.
situational risk awareness
184.
standalone risk
185.
supply chain risk
186.
supply chain risk management
187.
systemic risk
188.
tourists’ perceived travel risk
189.
value at risk
190.
vascular risk factors
191.
3D risk assesment
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
kardiovaskulaarne risk
5.
risk
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT