Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
cybersecurity knowledge requirements (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
Ă—
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/185)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Cybersecurity knowledge requirements for strategic level decision makers
Garcia-Granados, F.
;
Bahsi, Hayretdin
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 559-568
https://doi.org/
book article
Number of records 1, displaying
1 - 1
keyword
185
1.
cybersecurity knowledge requirements
2.
automotive cybersecurity
3.
cybersecurity
4.
cybersecurity (CS)
5.
cybersecurity awareness
6.
cybersecurity behaviors
7.
cybersecurity breach
8.
cybersecurity components
9.
cybersecurity education
10.
cybersecurity exercises
11.
cybersecurity gender balance
12.
cybersecurity governance
13.
cybersecurity in shipping
14.
cybersecurity incident response
15.
cybersecurity law
16.
cybersecurity market demand
17.
cybersecurity maturity tool development for schools
18.
cybersecurity policy
19.
cybersecurity practical training
20.
cybersecurity simulations
21.
cybersecurity skills gap
22.
cybersecurity standards
23.
cybersecurity test bed
24.
cybersecurity testing
25.
cybersecurity training
26.
cybersecurity workforce development
27.
cybersecurity vulnerability
28.
EU cybersecurity policy
29.
European cybersecurity capacity building
30.
European Cybersecurity Skills Framework (ECSF)
31.
European Union Agency for Cybersecurity (ENISA)
32.
human factor of cybersecurity
33.
human factors in cybersecurity
34.
maritime cybersecurity
35.
maritime cybersecurity certification teaching
36.
organising cybersecurity exercises
37.
port cybersecurity
38.
responsibility/penalty for a cybersecurity breach
39.
set of possible cybersecurity breaches
40.
energy performance minimum requirements
41.
functional requirements
42.
grid connection requirements
43.
industrial IT requirements
44.
isolation requirements
45.
min. requirements
46.
minimum requirements
47.
national requirements
48.
nZEB requirements
49.
nutrient requirements
50.
ontology requirements
51.
requirements
52.
requirements bazaar
53.
requirements elicitation
54.
requirements engineering
55.
requirements feedback
56.
requirements gathering
57.
requirements modelling
58.
security requirements
59.
security requirements engineering
60.
User Requirements
61.
absolutist knowledge
62.
Actionable knowledge
63.
collaborative knowledge production
64.
computerised knowledge work
65.
customer knowledge sharing
66.
data mining and knowledge discovery
67.
differentiated knowledge base
68.
diffusion of knowledge
69.
diffusion of knowledge
70.
expert knowledge
71.
global knowledge warfare
72.
hiding knowledge
73.
inclusiv knowledge management
74.
Indigenous knowledge systems
75.
integrated and networked knowledge generating systems
76.
international knowledge transfer
77.
knowledge
78.
knowledge absorptive capacity
79.
knowledge abstraction
80.
knowledge and innovation
81.
knowledge and skills
82.
knowledge base
83.
knowledge based economy
84.
knowledge based manufacturing
85.
knowledge based systems
86.
knowledge bases
87.
knowledge brokering
88.
knowledge challenges
89.
knowledge contribution
90.
knowledge creation
91.
knowledge diffusion
92.
knowledge discovery
93.
knowledge discovery and data mining
94.
knowledge discovery in databases
95.
knowledge distillation
96.
knowledge driven manufacturing
97.
knowledge economy
98.
knowledge employees
99.
knowledge engineering
100.
knowledge exchange
101.
knowledge exploitation
102.
knowledge extraction
103.
knowledge flows
104.
knowledge fusion
105.
knowledge gathering
106.
knowledge generation
107.
knowledge graph
108.
knowledge graph embeddings
109.
knowledge hiding
110.
knowledge hiding behavior
111.
knowledge intensive enterprises
112.
knowledge leakage
113.
knowledge loss
114.
knowledge management
115.
knowledge management (KM)
116.
knowledge management in production
117.
Knowledge management system
118.
knowledge management systems (KMS)
119.
knowledge map
120.
knowledge network
121.
knowledge networks
122.
knowledge of brand origins
123.
knowledge overload
124.
knowledge perception
125.
knowledge processing
126.
knowledge recovery
127.
knowledge representation
128.
knowledge retention
129.
knowledge retention and higher education
130.
Knowledge retrieval
131.
knowledge risk
132.
knowledge risk management
133.
knowledge risk management (KRM)
134.
knowledge risk management in banking
135.
knowledge risk management in construction
136.
knowledge risk management in SMEs
137.
knowledge risks
138.
knowledge risks in health-care organizations
139.
knowledge sharing
140.
knowledge sourcing
141.
knowledge systems
142.
knowledge transfer
143.
knowledge translation
144.
knowledge warfare
145.
knowledge withholding
146.
knowledge workers
147.
knowledge-based design
148.
knowledge-based economy
149.
knowledge-based manufacturing
150.
knowledge-based system
151.
knowledge-based systems
152.
knowledge-basedfirms
153.
knowledge-inquiry
154.
knowledge-intensive business service (KIBS)
155.
knowledge-intensive business services
156.
knowledge-intensive service activities (KISA)
157.
knowledge-intensivefirms
158.
knowledge-management
159.
Local ecological knowledge
160.
logistics knowledge areas
161.
management knowledge
162.
nursing knowledge
163.
operational knowledge risk
164.
organisational knowledge
165.
organizations knowledge
166.
personal health knowledge graph
167.
personal knowledge management
168.
policy-relevant knowledge
169.
responsible knowledge
170.
responsible knowledge management
171.
risks knowledge risks
172.
safety knowledge
173.
scientific knowledge
174.
shared knowledge authentication
175.
symbolic knowledge
176.
symbolic knowledge in Husserlian pure logic
177.
zero-knowledge
178.
zero-knowledge proof
179.
Zero-knowledge proofs
180.
task knowledge patterns
181.
teachers’ knowledge base
182.
Traditional ecological knowledge
183.
traditional knowledge
184.
transfer of knowledge
185.
withholding knowledge
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT