Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security monitoring (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/309)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
A systematic literature review of cyber security monitoring in maritime
Vaarandi, Risto
;
Tsiopoulos, Leonidas
;
Visky, Gabor
;
Rehman, Muaan Ur
;
Bahsi, Hayretdin
IEEE Access
2025
/
p. 85307-85329
https://doi.org/10.1109/ACCESS.2025.3567385
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
299
1.
cyber security monitoring
2.
cyber security
3.
cyber security education
4.
cyber security exercises
5.
cyber security strategies
6.
cyber-security
7.
national cyber security strategy
8.
network security monitoring
9.
security monitoring
10.
autonomous vehicle cyber range
11.
cloud-based cyber-physical systems (C2PS)
12.
cognitive cyber warfare
13.
cyber
14.
Cyber “Maastricht”
15.
cyber architecture
16.
cyber attacks
17.
cyber battle damage assessment
18.
Cyber Bio-analytical Physical Systems (CBPSs)
19.
cyber challenge
20.
cyber command
21.
cyber conflict
22.
cyber contingency
23.
cyber crime
24.
cyber crime pathways
25.
cyber crime scripting
26.
Cyber crisis management
27.
cyber defence
28.
cyber defence exercise
29.
cyber defence exercises
30.
cyber defense education
31.
cyber defense exercise
32.
cyber defense exercises
33.
cyber dependence
34.
cyber diplomacy
35.
cyber exercise
36.
cyber hygiene
37.
cyber impact assessment
38.
cyber incidents
39.
cyber insurance
40.
cyber intrusion detection
41.
cyber kill chain
42.
cyber operation
43.
cyber operation officer
44.
cyber operations
45.
cyber physical energy systems
46.
cyber physical power system (CPPS)
47.
Cyber Physical Production System
48.
cyber physical production systems (CPPS)
49.
cyber physical social system
50.
cyber physical social systems (cpss)
51.
cyber physical system
52.
cyber power Europe
53.
cyber ranges
54.
cyber red teaming
55.
cyber resilience
56.
cyber risk
57.
cyber situational awareness
58.
cyber stability
59.
cyber team communication
60.
cyber threat
61.
cyber threat communication
62.
cyber threats
63.
cyber war
64.
cyber warfare
65.
cyber warriors
66.
cyber weapons
67.
cyber-attack
68.
cyber-attack pathways
69.
cyber-insurance
70.
cyber-paternalism
71.
cyber-physical energy systems
72.
cyber-physical social system (CPSS)
73.
cyber-physical system
74.
Cyber-Physical System (CPS)
75.
cyber-physical system logistic robot
76.
cyber-physical systems
77.
Cyber-Physical Systems (CPS)
78.
cyber-risks
79.
cyber-space nexus
80.
cyber-vulnerabilities
81.
Defensive Cyber Operations
82.
EU cyber policy
83.
international cyber norms
84.
military cyber
85.
mobile cyber-physical system
86.
NATO cyber operations definitions
87.
NATO Cyber Range
88.
Offensive Cyber Operations
89.
perceived cyber risks and threats
90.
responsive cyber defence
91.
Socio-Cyber-Physical Systems
92.
space cyber range
93.
technical cyber exercise
94.
ad-hoc sensor networks security
95.
Automatic Security Verification
96.
Blockchain security
97.
cache security
98.
communication system security
99.
comprehensive system of economic security
100.
computer security
101.
cooperative security dilemma
102.
data security
103.
development of security cameras
104.
digital security practices
105.
drinking water security
106.
economic security
107.
economic security of enterprise
108.
emotional security
109.
energy security
110.
energy security indicator
111.
Estonian information security standard
112.
graded security
113.
hardware security
114.
hardware security primitive
115.
human security
116.
information security
117.
information security and privacy
118.
internal security
119.
international security
120.
investment and innovation security
121.
IPv6 security
122.
IT security
123.
IT security management
124.
job security
125.
long-term security
126.
metadata model for security measures
127.
Middle Eastern security
128.
Mobile security
129.
national security
130.
NATO. Science for Peace and Security Program
131.
network security
132.
OSCE (Organization for Security and Co-operation in Europe)
133.
passenger’s security
134.
policy-based routing security
135.
political and security cultures
136.
post-quantum security
137.
power system security
138.
quantitative security
139.
regional security
140.
RISC-V Security Verification
141.
safety and security testing
142.
security
143.
security adaptation
144.
security alert prioritization
145.
security analysis
146.
security and justice (AFSJ)
147.
Security and political science
148.
security and privacy
149.
security and privacy in smart grids
150.
Security Assertion Mining
151.
security closure
152.
Security Coverage
153.
security dataset
154.
security dilemma
155.
Security evaluation
156.
security evaluation instruments
157.
Security limitations
158.
security log analysis
159.
security management
160.
security model
161.
security notion
162.
security objectives
163.
security of data
164.
security of supply
165.
security operation center
166.
security operations center
167.
security patterns
168.
security policy
169.
security problem definition
170.
security proof
171.
security protocols
172.
security requirements
173.
security requirements engineering
174.
security risk assessment
175.
security risk management
176.
security risks
177.
security strategies
178.
security systems for military objects
179.
security testing
180.
security training
181.
security verification
182.
security-by-design
183.
social security planning
184.
societal security
185.
system of economic security
186.
system security
187.
terrorism security
188.
transmission System Security
189.
voting privacy and security
190.
ambulatory blood pressure monitoring
191.
automated decision and monitoring mechanisms
192.
Baltic-wide HELCOM COMBINE monitoring program
193.
bi-directional fault monitoring devices
194.
biological monitoring
195.
biomedical monitoring
196.
biosignal monitoring
197.
cardiac monitoring
198.
CO2 monitoring
199.
coastal monitoring
200.
condition monitoring
201.
condition monitoring system
202.
continuous monitoring
203.
Copernicus Marine Environment Monitoring Service
204.
corporate performance monitoring system
205.
corrosion monitoring
206.
data-driven condition monitoring
207.
deformation monitoring
208.
diagnosis and performance monitoring
209.
Distributed flow monitoring
210.
distributed monitoring
211.
distributed online monitoring
212.
disturbance monitoring
213.
drug monitoring
214.
e-monitoring
215.
Environmental compliance monitoring
216.
environmental monitoring
217.
fault monitoring
218.
field monitoring
219.
fish monitoring
220.
GHB monitoring
221.
groundwater monitoring
222.
haemodialysis monitoring
223.
health monitoring
224.
healthcare monitoring
225.
hemodialysis monitoring
226.
home blood pressure monitoring
227.
home monitoring
228.
industrial monitoring
229.
infrastructure monitoring
230.
integrated hemodynamic monitoring
231.
interactive monitoring
232.
IoT-based monitoring
233.
laboratory monitoring
234.
landfill monitoring
235.
load monitoring
236.
long term monitoring
237.
long-term monitoring
238.
machine condition monitoring
239.
machinery monitoring
240.
Magnetic induction monitoring
241.
marine microplastic monitoring
242.
marine monitoring
243.
monitoring
244.
monitoring and application design
245.
monitoring and detection
246.
monitoring and prognosis
247.
monitoring deformations
248.
monitoring program
249.
monitoring RIS3 observatory
250.
monitoring system
251.
monitoring the health patients
252.
NetFlow based network monitoring
253.
network monitoring
254.
Non-intrusive load monitoring
255.
non-intrusive load monitoring (NILM)
256.
ocean monitoring
257.
online monitoring
258.
on-line monitoring
259.
optical monitoring
260.
passive acoustic monitoring
261.
patient monitoring
262.
performance monitoring
263.
periodic monitoring
264.
pollen monitoring
265.
power quality monitoring
266.
PQM (Power Quality Monitoring)
267.
process monitoring
268.
production monitoring
269.
production monitoring system
270.
production monitoring system (PLM)
271.
production monitoring system (PMS)
272.
production monitoring systems (PMS)
273.
project-monitoring
274.
quality monitoring
275.
real time monitoring process
276.
real-time collision monitoring
277.
real-time monitoring
278.
remote monitoring
279.
remote patient monitoring
280.
respiratory monitoring
281.
RIS3 evaluation and monitoring
282.
road surface condition monitoring
283.
sea monitoring
284.
sensor respiratory monitoring
285.
smart materials with structural health monitoring capabilities
286.
stormwater monitoring
287.
structural health monitoring
288.
surface water monitoring
289.
susceptibility monitoring
290.
system monitoring
291.
terms—production environment monitoring
292.
the accuracy of monitoring in analysis of impact impulses
293.
The Baltic Monitoring and Forecasting Centre (BAL MFC)
294.
traffic behavior monitoring
295.
treatment monitoring
296.
water pollution monitoring
297.
water quality monitoring
298.
wearable health monitoring
299.
wide area monitoring
subject term
10
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
6.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
7.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
8.
Baltic Monitoring and Forecasting Center (BALMFC)
9.
Copernicus Marine Environment Monitoring Service (CMEMS)
10.
MyOcean Baltic Sea Monitoring and Forecasting Centre
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT