Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security operations center (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/170)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
A National Maritime Cyber Security Operations Center (M-SOC) Concept
Oruc, Aybars
;
Bauk, Sanja
;
Zhou, Jianying
Journal of Marine Science and Engineering
2026
/
art. 17
https://doi.org/10.3390/jmse14010017
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 2, displaying
1 - 2
keyword
163
1.
Maritime Security Operations Center (M-SOC)
2.
security operations center
3.
maritime cyber security operations centers
4.
Municipal Operations Center
5.
security operation center
6.
algebraic operations
7.
buck operations
8.
Clean port operations
9.
commercial operations
10.
computer network operations
11.
cyber operations
12.
cyber operations exercises
13.
cyberspace operations planning
14.
Defensive Cyber Operations
15.
digital operations
16.
energy consumption of construction operations
17.
ferry operations
18.
influence operations
19.
maritime operations
20.
microgrid operations
21.
NATO cyber operations definitions
22.
Offensive Cyber Operations
23.
operations research
24.
Port Operations
25.
port operations efficiency
26.
predictive analytics in port operations
27.
psychological operations
28.
supply chain operations reference (SCOR)
29.
supply chain operations reference (SCOR) model
30.
Sweedler operations
31.
term operations
32.
autoservice center
33.
center-tapped coupled inductor
34.
data center
35.
data center (DC)
36.
data center applications
37.
daycare center
38.
Non-emergency Contact Center
39.
shared service center
40.
shared service center (SSC)
41.
underwater data center
42.
urban learning center
43.
ad-hoc sensor networks security
44.
Automatic Security Verification
45.
Blockchain security
46.
cache security
47.
cloud security
48.
communication system security
49.
comprehensive system of economic security
50.
computer security
51.
cooperative security dilemma
52.
cyber security
53.
cyber security education
54.
cyber security exercises
55.
cyber security monitoring
56.
cyber security monitoring in maritime
57.
cyber security strategies
58.
cyber-physical system security
59.
cyber-security
60.
data and information security
61.
data security
62.
development of security cameras
63.
digital security practices
64.
drinking water security
65.
economic security
66.
economic security of enterprise
67.
emotional security
68.
energy security
69.
energy security indicator
70.
Estonian information security standard
71.
graded security
72.
hardware security
73.
hardware security primitive
74.
high level of security
75.
Homeland security
76.
human security
77.
information security
78.
information security and privacy
79.
initial level of security
80.
internal security
81.
international security
82.
investment and innovation security
83.
IPv6 security
84.
IT security
85.
IT security management
86.
job security
87.
long-term security
88.
maritime cyber security
89.
medium level of security
90.
metadata model for security measures
91.
Middle Eastern security
92.
Mobile security
93.
national cyber security strategy
94.
national security
95.
NATO. Science for Peace and Security Program
96.
network security
97.
network security monitoring
98.
OSCE (Organization for Security and Co-operation in Europe)
99.
passenger’s security
100.
policy-based routing security
101.
political and security cultures
102.
post-quantum security
103.
power system security
104.
quantitative security
105.
regional security
106.
RISC-V Security Verification
107.
Safety and Security in Sea Transportation
108.
safety and security testing
109.
security
110.
security adaptation
111.
security alert prioritization
112.
security analysis
113.
security and justice (AFSJ)
114.
Security and political science
115.
security and privacy
116.
security and privacy in smart grids
117.
Security Assertion
118.
Security Assertion Mining
119.
security closure
120.
Security Coverage
121.
security dataset
122.
security dilemma
123.
Security evaluation
124.
security evaluation instruments
125.
Security Level Evaluation
126.
Security limitations
127.
security log analysis
128.
security management
129.
security model
130.
security monitoring
131.
security notion
132.
security objectives
133.
security of data
134.
security of supply
135.
security patterns
136.
security policy
137.
security problem definition
138.
security proof
139.
security protocols
140.
security requirements
141.
security requirements engineering
142.
security research
143.
security risk assessment
144.
security risk management
145.
security risks
146.
security science and technology
147.
security strategies
148.
security systems for military objects
149.
security testing
150.
security training
151.
security verification
152.
security-by-design
153.
social security planning
154.
societal security
155.
software security
156.
software security level
157.
software security subcharacteristics
158.
sufficient level of security
159.
system of economic security
160.
system security
161.
terrorism security
162.
transmission System Security
163.
voting privacy and security
subject term
7
1.
Baltic Monitoring and Forecasting Center (BALMFC)
2.
Estonian Center for Safe and Trustworthy Artificial Intelligence (ECSTAI)
3.
FinEst Center for Smart Cities
4.
The Center for European Integration Studies
5.
UNDP Urban Learning Center
6.
National Computer Security Incident Response Teams (N-CSIRTs)
7.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT