Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber risk (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/214)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications
Carlo, Antonio
;
Manti, Nebile Pelin
;
Bintang, A. S. W. A. M.
;
Casamassima, Francesca
;
Boschetti, Nicolo
;
Breda, Paola
;
Rahloff, Tobias
Journal of space safety engineering
2023
/
p. 474-482 : ill
https://doi.org/10.1016/j.jsse.2023.08.002
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
3
journal article EST
/
journal article ENG
Safeguarding the final frontier : analyzing the legal and technical challenges to mega-constellations
Jha, Devanshu
;
Manti, Nebile Pelin
;
Carlo, Antonio
;
Zarkan, Laetitia Cesari
;
Breda, Paola
;
Jha, Antara
Journal of space safety engineering
2022
/
p. 636-643
https://doi.org/10.1016/j.jsse.2022.08.006
Journal metrics at Scopus
Article at Scopus
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
4
journal article EST
/
journal article ENG
When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisis
Skierka-Canton, Isabel
Government information quarterly
2023
/
art. 101781, 12 p. : ill
https://doi.org/10.1016/j.giq.2022.101781
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
Number of records 4, displaying
1 - 4
keyword
209
1.
cyber risk
2.
cyber-risks
3.
perceived cyber risks and threats
4.
autonomous vehicle cyber range
5.
cloud-based cyber-physical systems (C2PS)
6.
cognitive cyber warfare
7.
cyber
8.
Cyber “Maastricht”
9.
cyber architecture
10.
cyber attacks
11.
cyber battle damage assessment
12.
Cyber Bio-analytical Physical Systems (CBPSs)
13.
cyber challenge
14.
cyber command
15.
Cyber Command organisational structure
16.
cyber conflict
17.
cyber contingency
18.
cyber crime
19.
cyber crime pathways
20.
cyber crime scripting
21.
Cyber crisis management
22.
cyber defence
23.
cyber defence exercise
24.
cyber defence exercises
25.
cyber defense education
26.
cyber defense exercise
27.
cyber defense exercises
28.
cyber dependence
29.
cyber diplomacy
30.
cyber exercise
31.
cyber hygiene
32.
cyber impact assessment
33.
cyber incidents
34.
cyber insurance
35.
cyber intrusion detection
36.
cyber kill chain
37.
cyber operation
38.
cyber operation officer
39.
cyber operations
40.
cyber operations exercises
41.
cyber physical energy systems
42.
cyber physical power system (CPPS)
43.
Cyber Physical Production System
44.
cyber physical production systems (CPPS)
45.
cyber physical social system
46.
cyber physical social systems (cpss)
47.
cyber physical system
48.
cyber power Europe
49.
cyber ranges
50.
cyber red teaming
51.
cyber resilience
52.
cyber security
53.
cyber security education
54.
cyber security exercises
55.
cyber security monitoring
56.
cyber security strategies
57.
cyber situational awareness
58.
cyber stability
59.
cyber team communication
60.
cyber threat
61.
cyber threat communication
62.
Cyber Threat Intelligence
63.
cyber threats
64.
cyber war
65.
cyber warfare
66.
cyber warriors
67.
cyber weapons
68.
cyber-attack
69.
cyber-attack pathways
70.
Cyber-attacks
71.
cyber-insurance
72.
cyber-paternalism
73.
cyber-physical energy systems
74.
cyber-physical social system (CPSS)
75.
cyber-physical system
76.
Cyber-Physical System (CPS)
77.
cyber-physical system logistic robot
78.
cyber-physical systems
79.
Cyber-Physical Systems (CPS)
80.
cyber-security
81.
cyber-space nexus
82.
cyber-vulnerabilities
83.
Defensive Cyber Operations
84.
EU cyber policy
85.
international cyber norms
86.
military cyber
87.
mobile cyber-physical system
88.
national cyber security strategy
89.
NATO cyber operations definitions
90.
NATO Cyber Range
91.
Offensive Cyber Operations
92.
responsive cyber defence
93.
Socio-Cyber-Physical Systems
94.
space cyber range
95.
technical cyber exercise
96.
accrual-based credit risk model
97.
at-risk-of-poverty rates
98.
bank risk-taking
99.
bank-risk taking
100.
bankruptcy risk
101.
cancer risk
102.
cardiovascular risk
103.
Cardiovascular risk assessment
104.
cardiovascular risk factors
105.
climatic risk
106.
coastal risk index
107.
conceptual framework for safety/risk analysis
108.
conditional value at risk (CVaR)
109.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
110.
credit risk
111.
credit risk determinants
112.
credit risk modelling
113.
disaster risk reduction
114.
ecological risk assessment
115.
Economic risk
116.
elimination of risk
117.
enterprise risk management
118.
environmental risk
119.
environmental risk assessment
120.
ergonomic risk
121.
ESG risk
122.
farmer's risk criterion
123.
fish injury and mortality risk
124.
flood risk management
125.
health risk
126.
heart disease risk factors
127.
infection risk
128.
infection risk-based ventilation
129.
insurance risk
130.
kardiovaskulaarne risk
131.
knowledge risk
132.
knowledge risk management
133.
knowledge risk management (KRM)
134.
knowledge risk management in banking
135.
knowledge risk management in construction
136.
knowledge risk management in SMEs
137.
machinery risk assessment
138.
military environment risk assessment
139.
models for risk assessment
140.
Moisture risk mitigation
141.
mould growth risk
142.
mould risk
143.
multi-risk/multi-criteria
144.
navigation risk
145.
navigation risk management course
146.
operational knowledge risk
147.
overheating risk
148.
perceived risk
149.
Polygenic risk score
150.
portfolio risk hedging
151.
potential risk
152.
pre-symptomatic period risk control
153.
proactive risk management
154.
process risk
155.
project risk management
156.
psychosocial risk factors
157.
quantitative risk analysis
158.
reactive risk management
159.
residual cardiovascular risk
160.
risk
161.
risk group for mental disorders
162.
risk allocation
163.
risk analysis
164.
risk assessment
165.
risk assessment chemicals in the air
166.
risk assessments
167.
risk attitudes
168.
risk behavior
169.
risk classification
170.
risk evaluation model
171.
risk evaluation model development
172.
risk event chain analyses
173.
risk factors
174.
risk governance
175.
risk interdependence
176.
risk levels
177.
risk management
178.
risk management culture
179.
risk management in public organizations
180.
risk management model
181.
risk mitigation
182.
risk modelling
183.
risk of failure
184.
risk of mould growth
185.
risk prediction
186.
risk preference analysis
187.
risk prevention
188.
risk reduction
189.
risk stratification
190.
risk transfer
191.
risk-adjusted performance
192.
risk-based laws
193.
risk-based management
194.
risk-taking
195.
risk-taking behavior
196.
rrivacy risk assessment
197.
security risk assessment
198.
security risk management
199.
semi-quantitative risk assessment method
200.
ship collision risk
201.
situational risk awareness
202.
standalone risk
203.
supply chain risk
204.
supply chain risk management
205.
systemic risk
206.
tourists’ perceived travel risk
207.
value at risk
208.
vascular risk factors
209.
3D risk assesment
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
kardiovaskulaarne risk
5.
risk
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT