Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cybersecurity knowledge requirements (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
Ă—
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/176)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Cybersecurity knowledge requirements for strategic level decision makers
Garcia-Granados, F.
;
Bahsi, Hayretdin
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 559-568
https://doi.org/
book article
Number of records 1, displaying
1 - 1
keyword
176
1.
cybersecurity knowledge requirements
2.
automotive cybersecurity
3.
cybersecurity
4.
cybersecurity (CS)
5.
cybersecurity awareness
6.
cybersecurity behaviors
7.
cybersecurity breach
8.
cybersecurity components
9.
cybersecurity education
10.
cybersecurity exercises
11.
cybersecurity gender balance
12.
cybersecurity governance
13.
cybersecurity in shipping
14.
cybersecurity incident response
15.
cybersecurity law
16.
cybersecurity market demand
17.
cybersecurity maturity tool development for schools
18.
cybersecurity policy
19.
cybersecurity practical training
20.
cybersecurity simulations
21.
cybersecurity skills gap
22.
cybersecurity standards
23.
cybersecurity test bed
24.
cybersecurity testing
25.
cybersecurity training
26.
cybersecurity workforce development
27.
cybersecurity vulnerability
28.
EU cybersecurity policy
29.
European cybersecurity capacity building
30.
European Cybersecurity Skills Framework (ECSF)
31.
human factor of cybersecurity
32.
maritime cybersecurity
33.
maritime cybersecurity certification teaching
34.
organising cybersecurity exercises
35.
responsibility/penalty for a cybersecurity breach
36.
set of possible cybersecurity breaches
37.
energy performance minimum requirements
38.
functional requirements
39.
grid connection requirements
40.
isolation requirements
41.
min. requirements
42.
minimum requirements
43.
national requirements
44.
nZEB requirements
45.
nutrient requirements
46.
ontology requirements
47.
requirements
48.
requirements bazaar
49.
requirements elicitation
50.
requirements engineering
51.
requirements feedback
52.
requirements gathering
53.
requirements modelling
54.
security requirements
55.
security requirements engineering
56.
absolutist knowledge
57.
collaborative knowledge production
58.
computerised knowledge work
59.
customer knowledge sharing
60.
differentiated knowledge base
61.
diffusion of knowledge
62.
diffusion of knowledge
63.
expert knowledge
64.
global knowledge warfare
65.
hiding knowledge
66.
inclusiv knowledge management
67.
Indigenous knowledge systems
68.
integrated and networked knowledge generating systems
69.
international knowledge transfer
70.
knowledge
71.
knowledge absorptive capacity
72.
knowledge abstraction
73.
knowledge and innovation
74.
knowledge and skills
75.
knowledge base
76.
knowledge based economy
77.
knowledge based manufacturing
78.
knowledge based systems
79.
knowledge bases
80.
knowledge brokering
81.
knowledge challenges
82.
knowledge contribution
83.
knowledge creation
84.
knowledge diffusion
85.
knowledge discovery
86.
knowledge discovery and data mining
87.
knowledge discovery in databases
88.
knowledge distillation
89.
knowledge driven manufacturing
90.
knowledge economy
91.
knowledge employees
92.
knowledge engineering
93.
knowledge exchange
94.
knowledge exploitation
95.
knowledge extraction
96.
knowledge flows
97.
knowledge fusion
98.
knowledge gathering
99.
knowledge generation
100.
knowledge graph
101.
knowledge graph embeddings
102.
knowledge hiding
103.
knowledge hiding behavior
104.
knowledge intensive enterprises
105.
knowledge leakage
106.
knowledge loss
107.
knowledge management
108.
knowledge management (KM)
109.
knowledge management in production
110.
Knowledge management system
111.
knowledge management systems (KMS)
112.
knowledge map
113.
knowledge network
114.
knowledge networks
115.
knowledge of brand origins
116.
knowledge overload
117.
knowledge perception
118.
knowledge processing
119.
knowledge recovery
120.
knowledge representation
121.
knowledge retention
122.
knowledge retention and higher education
123.
Knowledge retrieval
124.
knowledge risk
125.
knowledge risk management
126.
knowledge risk management (KRM)
127.
knowledge risk management in banking
128.
knowledge risk management in construction
129.
knowledge risk management in SMEs
130.
knowledge risks
131.
knowledge risks in health-care organizations
132.
knowledge sharing
133.
knowledge sourcing
134.
knowledge systems
135.
knowledge transfer
136.
knowledge translation
137.
knowledge warfare
138.
knowledge withholding
139.
knowledge workers
140.
knowledge-based design
141.
knowledge-based economy
142.
knowledge-based manufacturing
143.
knowledge-based system
144.
knowledge-basedfirms
145.
knowledge-inquiry
146.
knowledge-intensive business service (KIBS)
147.
knowledge-intensive business services
148.
knowledge-intensive service activities (KISA)
149.
knowledge-intensivefirms
150.
knowledge-management
151.
Local ecological knowledge
152.
logistics knowledge areas
153.
management knowledge
154.
nursing knowledge
155.
operational knowledge risk
156.
organisational knowledge
157.
organizations knowledge
158.
personal health knowledge graph
159.
personal knowledge management
160.
policy-relevant knowledge
161.
responsible knowledge
162.
responsible knowledge management
163.
risks knowledge risks
164.
safety knowledge
165.
scientific knowledge
166.
shared knowledge authentication
167.
symbolic knowledge
168.
symbolic knowledge in Husserlian pure logic
169.
zero-knowledge
170.
zero-knowledge proof
171.
task knowledge patterns
172.
teachers’ knowledge base
173.
Traditional ecological knowledge
174.
traditional knowledge
175.
transfer of knowledge
176.
withholding knowledge
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT