Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
maritime cyber security (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(3/280)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
A National Maritime Cyber Security Operations Center (M-SOC) Concept
Oruc, Aybars
;
Bauk, Sanja
;
Zhou, Jianying
Journal of Marine Science and Engineering
2026
/
art. 17
https://doi.org/10.3390/jmse14010017
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
271
1.
maritime cyber security
2.
maritime cyber security operations centers
3.
maritime cybersecurity
4.
maritime cybersecurity certification teaching
5.
Maritime Security Operations Center (M-SOC)
6.
cyber security
7.
cyber security education
8.
cyber security exercises
9.
cyber security monitoring
10.
cyber security strategies
11.
cyber-security
12.
national cyber security strategy
13.
Autonomous Maritime Surveillance System (AMSS)
14.
Estonian maritime cluster
15.
Estonian maritime defence
16.
European Maritime Safety Agency
17.
Global Maritime Distress and Safety system (GMDSS)
18.
higher maritime education institutions
19.
International Maritime Organization (IMO)
20.
maritime
21.
maritime accidents
22.
maritime activities
23.
maritime affairs
24.
Maritime automation
25.
maritime autonomous systems
26.
Maritime cluster
27.
maritime clusters
28.
maritime communications
29.
maritime connectivity
30.
maritime decarbonization
31.
maritime defence
32.
Maritime digital transformation
33.
maritime economics
34.
maritime economy
35.
Maritime education
36.
maritime education and training
37.
maritime education concept
38.
maritime energy contract
39.
maritime environment
40.
maritime environmental governance
41.
maritime fleet management
42.
maritime higher education and training (MHET)
43.
maritime industries
44.
maritime industry
45.
maritime infrastructure
46.
maritime innovation management
47.
maritime investment theory
48.
maritime investments
49.
maritime logistic
50.
maritime logistics
51.
maritime mindset
52.
maritime navigation
53.
maritime navigation safety
54.
maritime occupational health
55.
maritime occupational health and safety
56.
maritime policy
57.
maritime pollution
58.
maritime port management
59.
maritime safety
60.
maritime sector
61.
maritime situation awareness
62.
maritime solutions
63.
maritime spatial planning
64.
maritime traffic analytics
65.
maritime transition
66.
maritime transport
67.
maritime transportation
68.
national maritime defence
69.
Swedish Maritime Competence Centre
70.
The Global Maritime Professional
71.
autonomous vehicle cyber range
72.
cloud-based cyber-physical systems (C2PS)
73.
cognitive cyber warfare
74.
cyber
75.
Cyber “Maastricht”
76.
cyber architecture
77.
cyber attacks
78.
cyber battle damage assessment
79.
Cyber Bio-analytical Physical Systems (CBPSs)
80.
cyber challenge
81.
cyber command
82.
Cyber Command organisational structure
83.
cyber conflict
84.
cyber contingency
85.
cyber crime
86.
cyber crime pathways
87.
cyber crime scripting
88.
Cyber crisis management
89.
cyber defence
90.
cyber defence exercise
91.
cyber defence exercises
92.
cyber defense education
93.
cyber defense exercise
94.
cyber defense exercises
95.
cyber dependence
96.
cyber diplomacy
97.
cyber exercise
98.
cyber hygiene
99.
cyber impact assessment
100.
cyber incidents
101.
cyber insurance
102.
cyber intrusion detection
103.
cyber kill chain
104.
cyber operation
105.
cyber operation officer
106.
cyber operations
107.
cyber operations exercises
108.
cyber physical energy systems
109.
cyber physical power system (CPPS)
110.
Cyber Physical Production System
111.
cyber physical production systems (CPPS)
112.
cyber physical social system
113.
cyber physical social systems (cpss)
114.
cyber physical system
115.
Cyber Planning tool
116.
cyber power Europe
117.
cyber ranges
118.
cyber red teaming
119.
cyber resilience
120.
cyber resilience at sea
121.
cyber risk
122.
cyber risk management in shipping
123.
cyber situational awareness
124.
cyber stability
125.
cyber team communication
126.
cyber threat
127.
cyber threat communication
128.
Cyber Threat Intelligence
129.
cyber threats
130.
cyber war
131.
cyber warfare
132.
cyber warriors
133.
cyber weapons
134.
cyber-attack
135.
cyber-attack pathways
136.
Cyber-attacks
137.
cyber-insurance
138.
cyber-paternalism
139.
cyber-physical energy systems
140.
cyber-physical social system (CPSS)
141.
cyber-physical system
142.
Cyber-Physical System (CPS)
143.
cyber-physical system logistic robot
144.
cyber-physical systems
145.
Cyber-Physical Systems (CPS)
146.
cyber-risks
147.
cyber-space nexus
148.
cyber-vulnerabilities
149.
Defensive Cyber Operations
150.
EU cyber policy
151.
international cyber norms
152.
military cyber
153.
mobile cyber-physical system
154.
NATO cyber operations definitions
155.
NATO Cyber Range
156.
Offensive Cyber Operations
157.
perceived cyber risks and threats
158.
responsive cyber defence
159.
Socio-Cyber-Physical Systems
160.
space cyber range
161.
technical cyber exercise
162.
Visualising Cyber Planning
163.
ad-hoc sensor networks security
164.
Automatic Security Verification
165.
Blockchain security
166.
cache security
167.
communication system security
168.
comprehensive system of economic security
169.
computer security
170.
cooperative security dilemma
171.
data and information security
172.
data security
173.
development of security cameras
174.
digital security practices
175.
drinking water security
176.
economic security
177.
economic security of enterprise
178.
emotional security
179.
energy security
180.
energy security indicator
181.
Estonian information security standard
182.
graded security
183.
hardware security
184.
hardware security primitive
185.
high level of security
186.
Homeland security
187.
human security
188.
information security
189.
information security and privacy
190.
initial level of security
191.
internal security
192.
international security
193.
investment and innovation security
194.
IPv6 security
195.
IT security
196.
IT security management
197.
job security
198.
long-term security
199.
medium level of security
200.
metadata model for security measures
201.
Middle Eastern security
202.
Mobile security
203.
national security
204.
NATO. Science for Peace and Security Program
205.
network security
206.
network security monitoring
207.
OSCE (Organization for Security and Co-operation in Europe)
208.
passenger’s security
209.
policy-based routing security
210.
political and security cultures
211.
post-quantum security
212.
power system security
213.
quantitative security
214.
regional security
215.
RISC-V Security Verification
216.
Safety and Security in Sea Transportation
217.
safety and security testing
218.
security
219.
security adaptation
220.
security alert prioritization
221.
security analysis
222.
security and justice (AFSJ)
223.
Security and political science
224.
security and privacy
225.
security and privacy in smart grids
226.
Security Assertion Mining
227.
security closure
228.
Security Coverage
229.
security dataset
230.
security dilemma
231.
Security evaluation
232.
security evaluation instruments
233.
Security limitations
234.
security log analysis
235.
security management
236.
security model
237.
security monitoring
238.
security notion
239.
security objectives
240.
security of data
241.
security of supply
242.
security operation center
243.
security operations center
244.
security patterns
245.
security policy
246.
security problem definition
247.
security proof
248.
security protocols
249.
security requirements
250.
security requirements engineering
251.
security risk assessment
252.
security risk management
253.
security risks
254.
security science and technology
255.
security strategies
256.
security systems for military objects
257.
security testing
258.
security training
259.
security verification
260.
security-by-design
261.
social security planning
262.
societal security
263.
software security
264.
software security level
265.
software security subcharacteristics
266.
sufficient level of security
267.
system of economic security
268.
system security
269.
terrorism security
270.
transmission System Security
271.
voting privacy and security
subject term
8
1.
Federal Maritime and Hydrographic Agency (BSH)
2.
International Maritime Organization
3.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
4.
Cyber Battle
5.
Telia Cyber Battle of Estonia
6.
Telia Cyber Battle of Nordic-Baltics
7.
National Computer Security Incident Response Teams (N-CSIRTs)
8.
USS Security Eesti AS
TalTech department
1
1.
Estonian Maritime Academy
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT