Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
maritime cyber security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(3/286)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
A National Maritime Cyber Security Operations Center (M-SOC) Concept
Oruc, Aybars
;
Bauk, Sanja
;
Zhou, Jianying
Journal of Marine Science and Engineering
2026
/
art. 17
https://doi.org/10.3390/jmse14010017
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
277
1.
maritime cyber security
2.
maritime cyber security operations centers
3.
maritime cybersecurity
4.
maritime cybersecurity certification teaching
5.
Maritime Security Operations Center (M-SOC)
6.
cyber security
7.
cyber security education
8.
cyber security exercises
9.
cyber security monitoring
10.
cyber security strategies
11.
cyber-physical system security
12.
cyber-security
13.
national cyber security strategy
14.
Autonomous Maritime Surveillance System (AMSS)
15.
Estonian maritime cluster
16.
Estonian maritime defence
17.
European Maritime Safety Agency
18.
Global Maritime Distress and Safety system (GMDSS)
19.
higher maritime education institutions
20.
International Maritime Organization (IMO)
21.
maritime
22.
maritime accidents
23.
maritime activities
24.
maritime affairs
25.
Maritime automation
26.
maritime autonomous systems
27.
Maritime cluster
28.
maritime clusters
29.
maritime communications
30.
maritime connectivity
31.
maritime decarbonization
32.
maritime defence
33.
Maritime digital transformation
34.
maritime economics
35.
maritime economy
36.
Maritime education
37.
maritime education and training
38.
maritime education concept
39.
maritime energy contract
40.
maritime environment
41.
maritime environmental governance
42.
maritime fleet management
43.
maritime higher education and training (MHET)
44.
maritime industries
45.
maritime industry
46.
maritime infrastructure
47.
maritime innovation management
48.
maritime investment theory
49.
maritime investments
50.
maritime logistic
51.
maritime logistics
52.
maritime mindset
53.
maritime navigation
54.
maritime navigation safety
55.
maritime occupational health
56.
maritime occupational health and safety
57.
maritime policy
58.
maritime pollution
59.
maritime port management
60.
maritime regulation
61.
maritime safety
62.
maritime sector
63.
maritime situation awareness
64.
maritime solutions
65.
maritime spatial planning
66.
maritime traffic analytics
67.
maritime transition
68.
maritime transport
69.
maritime transportation
70.
national maritime defence
71.
Swedish Maritime Competence Centre
72.
The Global Maritime Professional
73.
autonomous vehicle cyber range
74.
cloud-based cyber-physical systems (C2PS)
75.
cognitive cyber warfare
76.
cyber
77.
Cyber “Maastricht”
78.
cyber architecture
79.
cyber attacks
80.
cyber battle damage assessment
81.
Cyber Bio-analytical Physical Systems (CBPSs)
82.
cyber challenge
83.
cyber command
84.
Cyber Command organisational structure
85.
cyber conflict
86.
cyber contingency
87.
cyber crime
88.
cyber crime pathways
89.
cyber crime scripting
90.
Cyber crisis management
91.
cyber defence
92.
cyber defence exercise
93.
cyber defence exercises
94.
cyber defense education
95.
cyber defense exercise
96.
cyber defense exercises
97.
cyber dependence
98.
cyber diplomacy
99.
cyber exercise
100.
cyber hygiene
101.
cyber impact assessment
102.
cyber incidents
103.
cyber insurance
104.
cyber intrusion detection
105.
cyber kill chain
106.
cyber operation
107.
cyber operation officer
108.
cyber operations
109.
cyber operations exercises
110.
cyber physical energy systems
111.
cyber physical power system (CPPS)
112.
Cyber Physical Production System
113.
cyber physical production systems (CPPS)
114.
cyber physical social system
115.
cyber physical social systems (cpss)
116.
cyber physical system
117.
Cyber Planning tool
118.
cyber power Europe
119.
cyber ranges
120.
cyber red teaming
121.
cyber resilience
122.
cyber resilience at sea
123.
cyber risk
124.
cyber risk management in shipping
125.
cyber situational awareness
126.
cyber stability
127.
cyber team communication
128.
cyber threat
129.
cyber threat communication
130.
Cyber Threat Intelligence
131.
cyber threats
132.
cyber war
133.
cyber warfare
134.
cyber warriors
135.
cyber weapons
136.
cyber-attack
137.
cyber-attack pathways
138.
Cyber-attacks
139.
cyber-insurance
140.
cyber-paternalism
141.
cyber-physical energy systems
142.
cyber-physical social system (CPSS)
143.
cyber-physical system
144.
Cyber-Physical System (CPS)
145.
cyber-physical system logistic robot
146.
cyber-physical systems
147.
Cyber-Physical Systems (CPS)
148.
cyber-risks
149.
cyber-space nexus
150.
cyber-vulnerabilities
151.
Defensive Cyber Operations
152.
EU cyber policy
153.
international cyber norms
154.
military cyber
155.
mobile cyber-physical system
156.
NATO cyber operations definitions
157.
NATO Cyber Range
158.
Offensive Cyber Operations
159.
perceived cyber risks and threats
160.
responsive cyber defence
161.
Socio-Cyber-Physical Systems
162.
space cyber range
163.
technical cyber exercise
164.
Visualising Cyber Planning
165.
ad-hoc sensor networks security
166.
Automatic Security Verification
167.
Blockchain security
168.
cache security
169.
cloud security
170.
communication system security
171.
comprehensive system of economic security
172.
computer security
173.
cooperative security dilemma
174.
data and information security
175.
data security
176.
development of security cameras
177.
digital security practices
178.
drinking water security
179.
economic security
180.
economic security of enterprise
181.
emotional security
182.
energy security
183.
energy security indicator
184.
Estonian information security standard
185.
graded security
186.
hardware security
187.
hardware security primitive
188.
high level of security
189.
Homeland security
190.
human security
191.
information security
192.
information security and privacy
193.
initial level of security
194.
internal security
195.
international security
196.
investment and innovation security
197.
IPv6 security
198.
IT security
199.
IT security management
200.
job security
201.
long-term security
202.
medium level of security
203.
metadata model for security measures
204.
Middle Eastern security
205.
Mobile security
206.
national security
207.
NATO. Science for Peace and Security Program
208.
network security
209.
network security monitoring
210.
OSCE (Organization for Security and Co-operation in Europe)
211.
passenger’s security
212.
policy-based routing security
213.
political and security cultures
214.
post-quantum security
215.
power system security
216.
quantitative security
217.
regional security
218.
RISC-V Security Verification
219.
Safety and Security in Sea Transportation
220.
safety and security testing
221.
security
222.
security adaptation
223.
security alert prioritization
224.
security analysis
225.
security and justice (AFSJ)
226.
Security and political science
227.
security and privacy
228.
security and privacy in smart grids
229.
Security Assertion
230.
Security Assertion Mining
231.
security closure
232.
Security Coverage
233.
security dataset
234.
security dilemma
235.
Security evaluation
236.
security evaluation instruments
237.
Security Level Evaluation
238.
Security limitations
239.
security log analysis
240.
security management
241.
security model
242.
security monitoring
243.
security notion
244.
security objectives
245.
security of data
246.
security of supply
247.
security operation center
248.
security operations center
249.
security patterns
250.
security policy
251.
security problem definition
252.
security proof
253.
security protocols
254.
security requirements
255.
security requirements engineering
256.
security research
257.
security risk assessment
258.
security risk management
259.
security risks
260.
security science and technology
261.
security strategies
262.
security systems for military objects
263.
security testing
264.
security training
265.
security verification
266.
security-by-design
267.
social security planning
268.
societal security
269.
software security
270.
software security level
271.
software security subcharacteristics
272.
sufficient level of security
273.
system of economic security
274.
system security
275.
terrorism security
276.
transmission System Security
277.
voting privacy and security
subject term
8
1.
Federal Maritime and Hydrographic Agency (BSH)
2.
International Maritime Organization
3.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
4.
Cyber Battle
5.
Telia Cyber Battle of Estonia
6.
Telia Cyber Battle of Nordic-Baltics
7.
National Computer Security Incident Response Teams (N-CSIRTs)
8.
USS Security Eesti AS
TalTech department
1
1.
Estonian Maritime Academy
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT