Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cybersecurity knowledge requirements (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
Ă—
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/183)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Cybersecurity knowledge requirements for strategic level decision makers
Garcia-Granados, F.
;
Bahsi, Hayretdin
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 559-568
https://doi.org/
book article
Number of records 1, displaying
1 - 1
keyword
183
1.
cybersecurity knowledge requirements
2.
automotive cybersecurity
3.
cybersecurity
4.
cybersecurity (CS)
5.
cybersecurity awareness
6.
cybersecurity behaviors
7.
cybersecurity breach
8.
cybersecurity components
9.
cybersecurity education
10.
cybersecurity exercises
11.
cybersecurity gender balance
12.
cybersecurity governance
13.
cybersecurity in shipping
14.
cybersecurity incident response
15.
cybersecurity law
16.
cybersecurity market demand
17.
cybersecurity maturity tool development for schools
18.
cybersecurity policy
19.
cybersecurity practical training
20.
cybersecurity simulations
21.
cybersecurity skills gap
22.
cybersecurity standards
23.
cybersecurity test bed
24.
cybersecurity testing
25.
cybersecurity training
26.
cybersecurity workforce development
27.
cybersecurity vulnerability
28.
EU cybersecurity policy
29.
European cybersecurity capacity building
30.
European Cybersecurity Skills Framework (ECSF)
31.
European Union Agency for Cybersecurity (ENISA)
32.
human factor of cybersecurity
33.
maritime cybersecurity
34.
maritime cybersecurity certification teaching
35.
organising cybersecurity exercises
36.
port cybersecurity
37.
responsibility/penalty for a cybersecurity breach
38.
set of possible cybersecurity breaches
39.
energy performance minimum requirements
40.
functional requirements
41.
grid connection requirements
42.
isolation requirements
43.
min. requirements
44.
minimum requirements
45.
national requirements
46.
nZEB requirements
47.
nutrient requirements
48.
ontology requirements
49.
requirements
50.
requirements bazaar
51.
requirements elicitation
52.
requirements engineering
53.
requirements feedback
54.
requirements gathering
55.
requirements modelling
56.
security requirements
57.
security requirements engineering
58.
User Requirements
59.
absolutist knowledge
60.
Actionable knowledge
61.
collaborative knowledge production
62.
computerised knowledge work
63.
customer knowledge sharing
64.
data mining and knowledge discovery
65.
differentiated knowledge base
66.
diffusion of knowledge
67.
diffusion of knowledge
68.
expert knowledge
69.
global knowledge warfare
70.
hiding knowledge
71.
inclusiv knowledge management
72.
Indigenous knowledge systems
73.
integrated and networked knowledge generating systems
74.
international knowledge transfer
75.
knowledge
76.
knowledge absorptive capacity
77.
knowledge abstraction
78.
knowledge and innovation
79.
knowledge and skills
80.
knowledge base
81.
knowledge based economy
82.
knowledge based manufacturing
83.
knowledge based systems
84.
knowledge bases
85.
knowledge brokering
86.
knowledge challenges
87.
knowledge contribution
88.
knowledge creation
89.
knowledge diffusion
90.
knowledge discovery
91.
knowledge discovery and data mining
92.
knowledge discovery in databases
93.
knowledge distillation
94.
knowledge driven manufacturing
95.
knowledge economy
96.
knowledge employees
97.
knowledge engineering
98.
knowledge exchange
99.
knowledge exploitation
100.
knowledge extraction
101.
knowledge flows
102.
knowledge fusion
103.
knowledge gathering
104.
knowledge generation
105.
knowledge graph
106.
knowledge graph embeddings
107.
knowledge hiding
108.
knowledge hiding behavior
109.
knowledge intensive enterprises
110.
knowledge leakage
111.
knowledge loss
112.
knowledge management
113.
knowledge management (KM)
114.
knowledge management in production
115.
Knowledge management system
116.
knowledge management systems (KMS)
117.
knowledge map
118.
knowledge network
119.
knowledge networks
120.
knowledge of brand origins
121.
knowledge overload
122.
knowledge perception
123.
knowledge processing
124.
knowledge recovery
125.
knowledge representation
126.
knowledge retention
127.
knowledge retention and higher education
128.
Knowledge retrieval
129.
knowledge risk
130.
knowledge risk management
131.
knowledge risk management (KRM)
132.
knowledge risk management in banking
133.
knowledge risk management in construction
134.
knowledge risk management in SMEs
135.
knowledge risks
136.
knowledge risks in health-care organizations
137.
knowledge sharing
138.
knowledge sourcing
139.
knowledge systems
140.
knowledge transfer
141.
knowledge translation
142.
knowledge warfare
143.
knowledge withholding
144.
knowledge workers
145.
knowledge-based design
146.
knowledge-based economy
147.
knowledge-based manufacturing
148.
knowledge-based system
149.
knowledge-based systems
150.
knowledge-basedfirms
151.
knowledge-inquiry
152.
knowledge-intensive business service (KIBS)
153.
knowledge-intensive business services
154.
knowledge-intensive service activities (KISA)
155.
knowledge-intensivefirms
156.
knowledge-management
157.
Local ecological knowledge
158.
logistics knowledge areas
159.
management knowledge
160.
nursing knowledge
161.
operational knowledge risk
162.
organisational knowledge
163.
organizations knowledge
164.
personal health knowledge graph
165.
personal knowledge management
166.
policy-relevant knowledge
167.
responsible knowledge
168.
responsible knowledge management
169.
risks knowledge risks
170.
safety knowledge
171.
scientific knowledge
172.
shared knowledge authentication
173.
symbolic knowledge
174.
symbolic knowledge in Husserlian pure logic
175.
zero-knowledge
176.
zero-knowledge proof
177.
Zero-knowledge proofs
178.
task knowledge patterns
179.
teachers’ knowledge base
180.
Traditional ecological knowledge
181.
traditional knowledge
182.
transfer of knowledge
183.
withholding knowledge
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT