Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
set of possible cybersecurity breaches (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/64)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
System for determination of legal responsibility/penalty for a cybersecurity breach
Hovorushchenko, Tetiana
;
Herts, Alla
;
Boyarchuk, Artem
;
Pavlova, Olga
ITTAP 2022 - Proceedings of the 2nd International Workshop on Information Technologies: Theoretical and Applied Problems
2022
/
p. 233-240
https://ceur-ws.org/Vol-3309/short9.pdf
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
64
1.
set of possible cybersecurity breaches
2.
Apéry set
3.
central set near idempotent
4.
closed set
5.
common set of indicators
6.
continuous control set
7.
dam-break set-up
8.
data set
9.
data set generation
10.
determinative set of rules
11.
entrepreneurial mind-set
12.
finite control set-model predictive control (FCS-MPC)
13.
fuzzy set qualitative comparative analysis (fsQCA)
14.
Fuzzy-Set Qualitative comparative analysis
15.
level set
16.
modulated finite control set-model predictive control
17.
piecewise syndetic set near idempotent
18.
public data-set
19.
SET
20.
set theory
21.
set-recovery
22.
Single Event Transient (SET) and Soft Errors
23.
small training data set
24.
training set optimization
25.
value set
26.
wave set-up
27.
automotive cybersecurity
28.
cybersecurity
29.
cybersecurity (CS)
30.
cybersecurity awareness
31.
cybersecurity behaviors
32.
cybersecurity breach
33.
cybersecurity components
34.
cybersecurity education
35.
cybersecurity exercises
36.
cybersecurity gender balance
37.
cybersecurity governance
38.
cybersecurity in shipping
39.
cybersecurity incident response
40.
cybersecurity knowledge requirements
41.
cybersecurity law
42.
cybersecurity market demand
43.
cybersecurity maturity tool development for schools
44.
cybersecurity policy
45.
cybersecurity practical training
46.
cybersecurity simulations
47.
cybersecurity skills gap
48.
cybersecurity standards
49.
cybersecurity test bed
50.
cybersecurity testing
51.
cybersecurity training
52.
cybersecurity workforce development
53.
cybersecurity vulnerability
54.
EU cybersecurity policy
55.
European cybersecurity capacity building
56.
European Cybersecurity Skills Framework (ECSF)
57.
European Union Agency for Cybersecurity (ENISA)
58.
human factor of cybersecurity
59.
human factors in cybersecurity
60.
maritime cybersecurity
61.
maritime cybersecurity certification teaching
62.
organising cybersecurity exercises
63.
port cybersecurity
64.
responsibility/penalty for a cybersecurity breach
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT