Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber risk (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/187)
Export
export all inquiry results
(4)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications
Carlo, Antonio
;
Manti, Nebile Pelin
;
Bintang, A. S. W. A. M.
;
Casamassima, Francesca
;
Boschetti, Nicolo
;
Breda, Paola
;
Rahloff, Tobias
Journal of space safety engineering
2023
/
p. 474-482 : ill
https://doi.org/10.1016/j.jsse.2023.08.002
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
3
journal article EST
/
journal article ENG
Safeguarding the final frontier : analyzing the legal and technical challenges to mega-constellations
Jha, Devanshu
;
Manti, Nebile Pelin
;
Carlo, Antonio
;
Zarkan, Laetitia Cesari
;
Breda, Paola
;
Jha, Antara
Journal of space safety engineering
2022
/
p. 636-643
https://doi.org/10.1016/j.jsse.2022.08.006
Journal metrics at Scopus
Article at Scopus
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
4
journal article EST
/
journal article ENG
When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisis
Skierka-Canton, Isabel
Government information quarterly
2023
/
art. 101781, 12 p. : ill
https://doi.org/10.1016/j.giq.2022.101781
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
Number of records 4, displaying
1 - 4
keyword
182
1.
cyber risk
2.
perceived cyber risks and threats
3.
autonomous vehicle cyber range
4.
cloud-based cyber-physical systems (C2PS)
5.
cognitive cyber warfare
6.
cyber
7.
Cyber “Maastricht”
8.
cyber architecture
9.
cyber attacks
10.
cyber battle damage assessment
11.
Cyber Bio-analytical Physical Systems (CBPSs)
12.
cyber challenge
13.
cyber command
14.
cyber conflict
15.
cyber contingency
16.
cyber crime
17.
cyber crime pathways
18.
cyber crime scripting
19.
Cyber crisis management
20.
cyber defence
21.
cyber defence exercise
22.
cyber defence exercises
23.
cyber defense education
24.
cyber defense exercise
25.
cyber defense exercises
26.
cyber dependence
27.
cyber diplomacy
28.
cyber exercise
29.
cyber hygiene
30.
cyber impact assessment
31.
cyber incidents
32.
cyber insurance
33.
cyber intrusion detection
34.
cyber kill chain
35.
cyber operation
36.
cyber operations
37.
cyber physical energy systems
38.
cyber physical power system (CPPS)
39.
Cyber Physical Production System
40.
cyber physical production systems (CPPS)
41.
cyber physical social systems (cpss)
42.
cyber physical system
43.
cyber power Europe
44.
cyber ranges
45.
cyber red teaming
46.
cyber resilience
47.
cyber security
48.
cyber security education
49.
cyber security exercises
50.
cyber security strategies
51.
cyber situational awareness
52.
cyber stability
53.
cyber team communication
54.
cyber threat
55.
cyber threat communication
56.
cyber threats
57.
cyber war
58.
cyber warfare
59.
cyber warriors
60.
cyber weapons
61.
cyber-attack
62.
cyber-attack pathways
63.
cyber-insurance
64.
cyber-paternalism
65.
cyber-physical energy systems
66.
cyber-physical social system (CPSS)
67.
cyber-physical system
68.
Cyber-Physical System (CPS)
69.
cyber-physical system logistic robot
70.
cyber-physical systems
71.
Cyber-Physical Systems (CPS)
72.
cyber-security
73.
cyber-vulnerabilities
74.
Defensive Cyber Operations
75.
EU cyber policy
76.
international cyber norms
77.
military cyber
78.
mobile cyber-physical system
79.
national cyber security strategy
80.
NATO Cyber Range
81.
Offensive Cyber Operations
82.
responsive cyber defence
83.
Socio-Cyber-Physical Systems
84.
technical cyber exercise
85.
at-risk-of-poverty rates
86.
bank risk-taking
87.
bank-risk taking
88.
bankruptcy risk
89.
cancer risk
90.
cardiovascular risk
91.
Cardiovascular risk assessment
92.
cardiovascular risk factors
93.
climatic risk
94.
coastal risk index
95.
conditional value at risk (CVaR)
96.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
97.
credit risk
98.
credit risk determinants
99.
disaster risk reduction
100.
ecological risk assessment
101.
Economic risk
102.
elimination of risk
103.
environmental risk
104.
environmental risk assessment
105.
ESG risk
106.
farmer's risk criterion
107.
fish injury and mortality risk
108.
flood risk management
109.
health risk
110.
heart disease risk factors
111.
infection risk
112.
infection risk-based ventilation
113.
insurance risk
114.
kardiovaskulaarne risk
115.
knowledge risk
116.
knowledge risk management
117.
knowledge risk management (KRM)
118.
knowledge risk management in banking
119.
knowledge risk management in construction
120.
knowledge risk management in SMEs
121.
military environment risk assessment
122.
models for risk assessment
123.
mould growth risk
124.
mould risk
125.
multi-risk/multi-criteria
126.
operational knowledge risk
127.
overheating risk
128.
perceived risk
129.
Polygenic risk score
130.
portfolio risk hedging
131.
potential risk
132.
pre-symptomatic period risk control
133.
proactive risk management
134.
process risk
135.
project risk management
136.
psychosocial risk factors
137.
quantitative risk analysis
138.
reactive risk management
139.
residual cardiovascular risk
140.
risk
141.
risk group for mental disorders
142.
risk allocation
143.
risk analysis
144.
risk assessment
145.
risk assessment chemicals in the air
146.
risk assessments
147.
risk attitudes
148.
risk behavior
149.
risk classification
150.
risk evaluation model
151.
risk evaluation model development
152.
risk event chain analyses
153.
risk factors
154.
risk governance
155.
risk interdependence
156.
risk levels
157.
risk management
158.
risk management culture
159.
risk management in public organizations
160.
risk management model
161.
risk mitigation
162.
risk modelling
163.
risk of failure
164.
risk of mould growth
165.
risk prediction
166.
risk preference analysis
167.
risk prevention
168.
risk stratification
169.
risk transfer
170.
risk-adjusted performance
171.
risk-taking
172.
security risk assessment
173.
security risk management
174.
semi-quantitative risk assessment method
175.
situational risk awareness
176.
standalone risk
177.
supply chain risk
178.
supply chain risk management
179.
systemic risk
180.
value at risk
181.
vascular risk factors
182.
3D risk assesment
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
kardiovaskulaarne risk
5.
risk
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT