Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber risk (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/200)
Export
export all inquiry results
(4)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications
Carlo, Antonio
;
Manti, Nebile Pelin
;
Bintang, A. S. W. A. M.
;
Casamassima, Francesca
;
Boschetti, Nicolo
;
Breda, Paola
;
Rahloff, Tobias
Journal of space safety engineering
2023
/
p. 474-482 : ill
https://doi.org/10.1016/j.jsse.2023.08.002
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
3
journal article EST
/
journal article ENG
Safeguarding the final frontier : analyzing the legal and technical challenges to mega-constellations
Jha, Devanshu
;
Manti, Nebile Pelin
;
Carlo, Antonio
;
Zarkan, Laetitia Cesari
;
Breda, Paola
;
Jha, Antara
Journal of space safety engineering
2022
/
p. 636-643
https://doi.org/10.1016/j.jsse.2022.08.006
Journal metrics at Scopus
Article at Scopus
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
4
journal article EST
/
journal article ENG
When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisis
Skierka-Canton, Isabel
Government information quarterly
2023
/
art. 101781, 12 p. : ill
https://doi.org/10.1016/j.giq.2022.101781
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
Number of records 4, displaying
1 - 4
keyword
195
1.
cyber risk
2.
cyber-risks
3.
perceived cyber risks and threats
4.
autonomous vehicle cyber range
5.
cloud-based cyber-physical systems (C2PS)
6.
cognitive cyber warfare
7.
cyber
8.
Cyber “Maastricht”
9.
cyber architecture
10.
cyber attacks
11.
cyber battle damage assessment
12.
Cyber Bio-analytical Physical Systems (CBPSs)
13.
cyber challenge
14.
cyber command
15.
cyber conflict
16.
cyber contingency
17.
cyber crime
18.
cyber crime pathways
19.
cyber crime scripting
20.
Cyber crisis management
21.
cyber defence
22.
cyber defence exercise
23.
cyber defence exercises
24.
cyber defense education
25.
cyber defense exercise
26.
cyber defense exercises
27.
cyber dependence
28.
cyber diplomacy
29.
cyber exercise
30.
cyber hygiene
31.
cyber impact assessment
32.
cyber incidents
33.
cyber insurance
34.
cyber intrusion detection
35.
cyber kill chain
36.
cyber operation
37.
cyber operation officer
38.
cyber operations
39.
cyber physical energy systems
40.
cyber physical power system (CPPS)
41.
Cyber Physical Production System
42.
cyber physical production systems (CPPS)
43.
cyber physical social system
44.
cyber physical social systems (cpss)
45.
cyber physical system
46.
cyber power Europe
47.
cyber ranges
48.
cyber red teaming
49.
cyber resilience
50.
cyber security
51.
cyber security education
52.
cyber security exercises
53.
cyber security monitoring
54.
cyber security strategies
55.
cyber situational awareness
56.
cyber stability
57.
cyber team communication
58.
cyber threat
59.
cyber threat communication
60.
cyber threats
61.
cyber war
62.
cyber warfare
63.
cyber warriors
64.
cyber weapons
65.
cyber-attack
66.
cyber-attack pathways
67.
cyber-insurance
68.
cyber-paternalism
69.
cyber-physical energy systems
70.
cyber-physical social system (CPSS)
71.
cyber-physical system
72.
Cyber-Physical System (CPS)
73.
cyber-physical system logistic robot
74.
cyber-physical systems
75.
Cyber-Physical Systems (CPS)
76.
cyber-security
77.
cyber-vulnerabilities
78.
Defensive Cyber Operations
79.
EU cyber policy
80.
international cyber norms
81.
military cyber
82.
mobile cyber-physical system
83.
national cyber security strategy
84.
NATO Cyber Range
85.
Offensive Cyber Operations
86.
responsive cyber defence
87.
Socio-Cyber-Physical Systems
88.
technical cyber exercise
89.
at-risk-of-poverty rates
90.
bank risk-taking
91.
bank-risk taking
92.
bankruptcy risk
93.
cancer risk
94.
cardiovascular risk
95.
Cardiovascular risk assessment
96.
cardiovascular risk factors
97.
climatic risk
98.
coastal risk index
99.
conceptual framework for safety/risk analysis
100.
conditional value at risk (CVaR)
101.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
102.
credit risk
103.
credit risk determinants
104.
disaster risk reduction
105.
ecological risk assessment
106.
Economic risk
107.
elimination of risk
108.
environmental risk
109.
environmental risk assessment
110.
ergonomic risk
111.
ESG risk
112.
farmer's risk criterion
113.
fish injury and mortality risk
114.
flood risk management
115.
health risk
116.
heart disease risk factors
117.
infection risk
118.
infection risk-based ventilation
119.
insurance risk
120.
kardiovaskulaarne risk
121.
knowledge risk
122.
knowledge risk management
123.
knowledge risk management (KRM)
124.
knowledge risk management in banking
125.
knowledge risk management in construction
126.
knowledge risk management in SMEs
127.
machinery risk assessment
128.
military environment risk assessment
129.
models for risk assessment
130.
mould growth risk
131.
mould risk
132.
multi-risk/multi-criteria
133.
operational knowledge risk
134.
overheating risk
135.
perceived risk
136.
Polygenic risk score
137.
portfolio risk hedging
138.
potential risk
139.
pre-symptomatic period risk control
140.
proactive risk management
141.
process risk
142.
project risk management
143.
psychosocial risk factors
144.
quantitative risk analysis
145.
reactive risk management
146.
residual cardiovascular risk
147.
risk
148.
risk group for mental disorders
149.
risk allocation
150.
risk analysis
151.
risk assessment
152.
risk assessment chemicals in the air
153.
risk assessments
154.
risk attitudes
155.
risk behavior
156.
risk classification
157.
risk evaluation model
158.
risk evaluation model development
159.
risk event chain analyses
160.
risk factors
161.
risk governance
162.
risk interdependence
163.
risk levels
164.
risk management
165.
risk management culture
166.
risk management in public organizations
167.
risk management model
168.
risk mitigation
169.
risk modelling
170.
risk of failure
171.
risk of mould growth
172.
risk prediction
173.
risk preference analysis
174.
risk prevention
175.
risk reduction
176.
risk stratification
177.
risk transfer
178.
risk-adjusted performance
179.
risk-based laws
180.
risk-based management
181.
risk-taking
182.
rrivacy risk assessment
183.
security risk assessment
184.
security risk management
185.
semi-quantitative risk assessment method
186.
ship collision risk
187.
situational risk awareness
188.
standalone risk
189.
supply chain risk
190.
supply chain risk management
191.
systemic risk
192.
tourists’ perceived travel risk
193.
value at risk
194.
vascular risk factors
195.
3D risk assesment
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
kardiovaskulaarne risk
5.
risk
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT