Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber risk (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/233)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications
Carlo, Antonio
;
Manti, Nebile Pelin
;
Bintang, A. S. W. A. M.
;
Casamassima, Francesca
;
Boschetti, Nicolo
;
Breda, Paola
;
Rahloff, Tobias
Journal of space safety engineering
2023
/
p. 474-482 : ill
https://doi.org/10.1016/j.jsse.2023.08.002
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
3
journal article EST
/
journal article ENG
Safeguarding the final frontier : analyzing the legal and technical challenges to mega-constellations
Jha, Devanshu
;
Manti, Nebile Pelin
;
Carlo, Antonio
;
Zarkan, Laetitia Cesari
;
Breda, Paola
;
Jha, Antara
Journal of space safety engineering
2022
/
p. 636-643
https://doi.org/10.1016/j.jsse.2022.08.006
Journal metrics at Scopus
Article at Scopus
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
4
journal article EST
/
journal article ENG
When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisis
Skierka-Canton, Isabel
Government information quarterly
2023
/
art. 101781, 12 p. : ill
https://doi.org/10.1016/j.giq.2022.101781
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
Number of records 4, displaying
1 - 4
keyword
227
1.
cyber risk
2.
cyber risk management in shipping
3.
cyber-risks
4.
perceived cyber risks and threats
5.
autonomous vehicle cyber range
6.
cloud-based cyber-physical systems (C2PS)
7.
cognitive cyber warfare
8.
cyber
9.
Cyber “Maastricht”
10.
cyber architecture
11.
cyber attacks
12.
cyber battle damage assessment
13.
Cyber Bio-analytical Physical Systems (CBPSs)
14.
cyber challenge
15.
cyber command
16.
Cyber Command organisational structure
17.
cyber conflict
18.
cyber contingency
19.
cyber crime
20.
cyber crime pathways
21.
cyber crime scripting
22.
Cyber crisis management
23.
cyber defence
24.
cyber defence exercise
25.
cyber defence exercises
26.
cyber defense education
27.
cyber defense exercise
28.
cyber defense exercises
29.
cyber dependence
30.
cyber diplomacy
31.
cyber exercise
32.
cyber hygiene
33.
cyber impact assessment
34.
cyber incidents
35.
cyber insurance
36.
cyber intrusion detection
37.
cyber kill chain
38.
cyber operation
39.
cyber operation officer
40.
cyber operations
41.
cyber operations exercises
42.
cyber physical energy systems
43.
cyber physical power system (CPPS)
44.
Cyber Physical Production System
45.
cyber physical production systems (CPPS)
46.
cyber physical social system
47.
cyber physical social systems (cpss)
48.
cyber physical system
49.
Cyber Planning tool
50.
cyber power Europe
51.
cyber ranges
52.
cyber red teaming
53.
cyber resilience
54.
cyber resilience at sea
55.
cyber security
56.
cyber security education
57.
cyber security exercises
58.
cyber security monitoring
59.
cyber security monitoring in maritime
60.
cyber security strategies
61.
cyber situational awareness
62.
cyber stability
63.
cyber team communication
64.
cyber threat
65.
cyber threat communication
66.
Cyber Threat Intelligence
67.
cyber threats
68.
cyber war
69.
cyber warfare
70.
cyber warriors
71.
cyber weapons
72.
cyber-attack
73.
cyber-attack pathways
74.
Cyber-attacks
75.
cyber-insurance
76.
cyber-paternalism
77.
cyber-physical energy systems
78.
cyber-physical social system (CPSS)
79.
cyber-physical system
80.
Cyber-Physical System (CPS)
81.
cyber-physical system logistic robot
82.
cyber-physical system security
83.
cyber-physical systems
84.
Cyber-Physical Systems (CPS)
85.
cyber-security
86.
cyber-space nexus
87.
cyber-vulnerabilities
88.
Defensive Cyber Operations
89.
EU cyber policy
90.
international cyber norms
91.
maritime cyber security
92.
maritime cyber security operations centers
93.
military cyber
94.
mobile cyber-physical system
95.
national cyber security strategy
96.
NATO cyber operations definitions
97.
NATO Cyber Range
98.
Offensive Cyber Operations
99.
responsive cyber defence
100.
Socio-Cyber-Physical Systems
101.
space cyber range
102.
technical cyber exercise
103.
Visualising Cyber Planning
104.
accrual-based credit risk model
105.
at-risk-of-poverty rates
106.
bank risk-taking
107.
bank-risk taking
108.
bankruptcy risk
109.
cancer risk
110.
cardiovascular risk
111.
Cardiovascular risk assessment
112.
cardiovascular risk factors
113.
climatic risk
114.
coastal risk index
115.
comprehensive climate risk assessment
116.
conceptual framework for safety/risk analysis
117.
conditional value at risk (CVaR)
118.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
119.
credit risk
120.
credit risk determinants
121.
credit risk forecasting
122.
credit risk modelling
123.
disaster risk reduction
124.
ecological risk assessment
125.
Economic risk
126.
elimination of risk
127.
enterprise risk management
128.
environmental risk
129.
environmental risk assessment
130.
ergonomic risk
131.
ESG risk
132.
failure risk assessment
133.
failure risk reduction
134.
farmer's risk criterion
135.
fish injury and mortality risk
136.
flood risk management
137.
flood risk modelling
138.
health risk
139.
heart disease risk factors
140.
infection risk
141.
infection risk calculators
142.
infection risk tools
143.
infection risk-based ventilation
144.
insurance risk
145.
kardiovaskulaarne risk
146.
knowledge risk
147.
knowledge risk management
148.
knowledge risk management (KRM)
149.
knowledge risk management in banking
150.
knowledge risk management in construction
151.
knowledge risk management in SMEs
152.
machinery risk assessment
153.
military environment risk assessment
154.
models for risk assessment
155.
Moisture risk mitigation
156.
mould growth risk
157.
mould risk
158.
multi-risk/multi-criteria
159.
navigation risk
160.
navigation risk management course
161.
operational knowledge risk
162.
overheating risk
163.
perceived risk
164.
policy risk
165.
Polygenic risk
166.
Polygenic risk score
167.
portfolio risk hedging
168.
potential risk
169.
pre-symptomatic period risk control
170.
proactive risk management
171.
process risk
172.
project risk management
173.
psychosocial risk factors
174.
quantitative risk analysis
175.
reactive risk management
176.
residual cardiovascular risk
177.
risk
178.
risk group for mental disorders
179.
risk allocation
180.
risk analysis
181.
risk assessment
182.
risk assessment chemicals in the air
183.
risk assessments
184.
risk attitudes
185.
risk behavior
186.
risk classification
187.
risk coupling effects
188.
risk evaluation model
189.
risk evaluation model development
190.
risk event chain analyses
191.
risk factors
192.
risk governance
193.
risk interdependence
194.
risk levels
195.
risk management
196.
risk management culture
197.
risk management in public organizations
198.
risk management model
199.
risk mitigation
200.
risk modelling
201.
risk of failure
202.
risk of mould growth
203.
risk prediction
204.
risk preference analysis
205.
risk prevention
206.
risk reduction
207.
risk stratification
208.
risk transfer
209.
risk-adjusted performance
210.
risk-based laws
211.
risk-based management
212.
risk-taking
213.
risk-taking behavior
214.
rrivacy risk assessment
215.
security risk assessment
216.
security risk management
217.
semi-quantitative risk assessment method
218.
ship collision risk
219.
situational risk awareness
220.
standalone risk
221.
supply chain risk
222.
supply chain risk management
223.
systemic risk
224.
tourists’ perceived travel risk
225.
value at risk
226.
vascular risk factors
227.
3D risk assesment
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
kardiovaskulaarne risk
6.
risk
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT