Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security monitoring (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/320)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
A systematic literature review of cyber security monitoring in maritime
Vaarandi, Risto
;
Tsiopoulos, Leonidas
;
Visky, Gabor
;
Rehman, Muaan Ur
;
Bahsi, Hayretdin
IEEE Access
2025
/
p. 85307-85329
https://doi.org/10.1109/ACCESS.2025.3567385
journal article EST
/
journal article ENG
Related publications
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
Number of records 1, displaying
1 - 1
keyword
310
1.
cyber security monitoring
2.
cyber security
3.
cyber security education
4.
cyber security exercises
5.
cyber security strategies
6.
cyber-security
7.
national cyber security strategy
8.
network security monitoring
9.
security monitoring
10.
autonomous vehicle cyber range
11.
cloud-based cyber-physical systems (C2PS)
12.
cognitive cyber warfare
13.
cyber
14.
Cyber “Maastricht”
15.
cyber architecture
16.
cyber attacks
17.
cyber battle damage assessment
18.
Cyber Bio-analytical Physical Systems (CBPSs)
19.
cyber challenge
20.
cyber command
21.
Cyber Command organisational structure
22.
cyber conflict
23.
cyber contingency
24.
cyber crime
25.
cyber crime pathways
26.
cyber crime scripting
27.
Cyber crisis management
28.
cyber defence
29.
cyber defence exercise
30.
cyber defence exercises
31.
cyber defense education
32.
cyber defense exercise
33.
cyber defense exercises
34.
cyber dependence
35.
cyber diplomacy
36.
cyber exercise
37.
cyber hygiene
38.
cyber impact assessment
39.
cyber incidents
40.
cyber insurance
41.
cyber intrusion detection
42.
cyber kill chain
43.
cyber operation
44.
cyber operation officer
45.
cyber operations
46.
cyber operations exercises
47.
cyber physical energy systems
48.
cyber physical power system (CPPS)
49.
Cyber Physical Production System
50.
cyber physical production systems (CPPS)
51.
cyber physical social system
52.
cyber physical social systems (cpss)
53.
cyber physical system
54.
Cyber Planning tool
55.
cyber power Europe
56.
cyber ranges
57.
cyber red teaming
58.
cyber resilience
59.
cyber risk
60.
cyber situational awareness
61.
cyber stability
62.
cyber team communication
63.
cyber threat
64.
cyber threat communication
65.
Cyber Threat Intelligence
66.
cyber threats
67.
cyber war
68.
cyber warfare
69.
cyber warriors
70.
cyber weapons
71.
cyber-attack
72.
cyber-attack pathways
73.
Cyber-attacks
74.
cyber-insurance
75.
cyber-paternalism
76.
cyber-physical energy systems
77.
cyber-physical social system (CPSS)
78.
cyber-physical system
79.
Cyber-Physical System (CPS)
80.
cyber-physical system logistic robot
81.
cyber-physical systems
82.
Cyber-Physical Systems (CPS)
83.
cyber-risks
84.
cyber-space nexus
85.
cyber-vulnerabilities
86.
Defensive Cyber Operations
87.
EU cyber policy
88.
international cyber norms
89.
military cyber
90.
mobile cyber-physical system
91.
NATO cyber operations definitions
92.
NATO Cyber Range
93.
Offensive Cyber Operations
94.
perceived cyber risks and threats
95.
responsive cyber defence
96.
Socio-Cyber-Physical Systems
97.
space cyber range
98.
technical cyber exercise
99.
Visualising Cyber Planning
100.
ad-hoc sensor networks security
101.
Automatic Security Verification
102.
Blockchain security
103.
cache security
104.
communication system security
105.
comprehensive system of economic security
106.
computer security
107.
cooperative security dilemma
108.
data and information security
109.
data security
110.
development of security cameras
111.
digital security practices
112.
drinking water security
113.
economic security
114.
economic security of enterprise
115.
emotional security
116.
energy security
117.
energy security indicator
118.
Estonian information security standard
119.
graded security
120.
hardware security
121.
hardware security primitive
122.
Homeland security
123.
human security
124.
information security
125.
information security and privacy
126.
internal security
127.
international security
128.
investment and innovation security
129.
IPv6 security
130.
IT security
131.
IT security management
132.
job security
133.
long-term security
134.
metadata model for security measures
135.
Middle Eastern security
136.
Mobile security
137.
national security
138.
NATO. Science for Peace and Security Program
139.
network security
140.
OSCE (Organization for Security and Co-operation in Europe)
141.
passenger’s security
142.
policy-based routing security
143.
political and security cultures
144.
post-quantum security
145.
power system security
146.
quantitative security
147.
regional security
148.
RISC-V Security Verification
149.
Safety and Security in Sea Transportation
150.
safety and security testing
151.
security
152.
security adaptation
153.
security alert prioritization
154.
security analysis
155.
security and justice (AFSJ)
156.
Security and political science
157.
security and privacy
158.
security and privacy in smart grids
159.
Security Assertion Mining
160.
security closure
161.
Security Coverage
162.
security dataset
163.
security dilemma
164.
Security evaluation
165.
security evaluation instruments
166.
Security limitations
167.
security log analysis
168.
security management
169.
security model
170.
security notion
171.
security objectives
172.
security of data
173.
security of supply
174.
security operation center
175.
security operations center
176.
security patterns
177.
security policy
178.
security problem definition
179.
security proof
180.
security protocols
181.
security requirements
182.
security requirements engineering
183.
security risk assessment
184.
security risk management
185.
security risks
186.
security science and technology
187.
security strategies
188.
security systems for military objects
189.
security testing
190.
security training
191.
security verification
192.
security-by-design
193.
social security planning
194.
societal security
195.
system of economic security
196.
system security
197.
terrorism security
198.
transmission System Security
199.
voting privacy and security
200.
ambulatory blood pressure monitoring
201.
automated decision and monitoring mechanisms
202.
Baltic-wide HELCOM COMBINE monitoring program
203.
bi-directional fault monitoring devices
204.
biological monitoring
205.
biomedical monitoring
206.
biosignal monitoring
207.
cardiac monitoring
208.
CO2 monitoring
209.
coastal monitoring
210.
condition monitoring
211.
condition monitoring system
212.
continuous monitoring
213.
Copernicus Marine Environment Monitoring Service
214.
corporate performance monitoring system
215.
corrosion monitoring
216.
data-driven condition monitoring
217.
deformation monitoring
218.
diagnosis and performance monitoring
219.
Distributed flow monitoring
220.
distributed monitoring
221.
distributed online monitoring
222.
disturbance monitoring
223.
drug monitoring
224.
e-monitoring
225.
Environmental compliance monitoring
226.
environmental monitoring
227.
fault monitoring
228.
field monitoring
229.
fish monitoring
230.
GHB monitoring
231.
groundwater monitoring
232.
haemodialysis monitoring
233.
health monitoring
234.
healthcare monitoring
235.
hemodialysis monitoring
236.
home blood pressure monitoring
237.
home monitoring
238.
industrial monitoring
239.
infrastructure monitoring
240.
in-situ monitoring
241.
integrated hemodynamic monitoring
242.
interactive monitoring
243.
IoT-based monitoring
244.
laboratory monitoring
245.
landfill monitoring
246.
load monitoring
247.
long term monitoring
248.
long-term monitoring
249.
machine condition monitoring
250.
machinery monitoring
251.
Magnetic induction monitoring
252.
marine microplastic monitoring
253.
marine monitoring
254.
monitoring
255.
monitoring and application design
256.
monitoring and detection
257.
monitoring and prognosis
258.
monitoring deformations
259.
monitoring program
260.
monitoring RIS3 observatory
261.
monitoring system
262.
monitoring the health patients
263.
NetFlow based network monitoring
264.
network monitoring
265.
Non-intrusive load monitoring
266.
non-intrusive load monitoring (NILM)
267.
ocean monitoring
268.
online monitoring
269.
on-line monitoring
270.
optical monitoring
271.
passive acoustic monitoring
272.
patient monitoring
273.
performance monitoring
274.
periodic monitoring
275.
pollen monitoring
276.
power quality monitoring
277.
PQM (Power Quality Monitoring)
278.
process monitoring
279.
production monitoring
280.
production monitoring system
281.
production monitoring system (PLM)
282.
production monitoring system (PMS)
283.
production monitoring systems (PMS)
284.
project-monitoring
285.
quality monitoring
286.
real time monitoring process
287.
real-time collision monitoring
288.
real-time monitoring
289.
remote monitoring
290.
remote patient monitoring
291.
respiratory monitoring
292.
RIS3 evaluation and monitoring
293.
road surface condition monitoring
294.
sea monitoring
295.
sensor respiratory monitoring
296.
smart materials with structural health monitoring capabilities
297.
stormwater monitoring
298.
structural health monitoring
299.
surface water monitoring
300.
susceptibility monitoring
301.
system monitoring
302.
terms—production environment monitoring
303.
the accuracy of monitoring in analysis of impact impulses
304.
The Baltic Monitoring and Forecasting Centre (BAL MFC)
305.
traffic behavior monitoring
306.
treatment monitoring
307.
water pollution monitoring
308.
water quality monitoring
309.
wearable health monitoring
310.
wide area monitoring
subject term
10
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
6.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
7.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
8.
Baltic Monitoring and Forecasting Center (BALMFC)
9.
Copernicus Marine Environment Monitoring Service (CMEMS)
10.
MyOcean Baltic Sea Monitoring and Forecasting Centre
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT