Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
maritime cyber security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(3/279)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
A National Maritime Cyber Security Operations Center (M-SOC) Concept
Oruc, Aybars
;
Bauk, Sanja
;
Zhou, Jianying
Journal of Marine Science and Engineering
2026
/
art. 17
https://doi.org/10.3390/jmse14010017
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
270
1.
maritime cyber security
2.
maritime cyber security operations centers
3.
maritime cybersecurity
4.
maritime cybersecurity certification teaching
5.
Maritime Security Operations Center (M-SOC)
6.
cyber security
7.
cyber security education
8.
cyber security exercises
9.
cyber security monitoring
10.
cyber security strategies
11.
cyber-security
12.
national cyber security strategy
13.
Autonomous Maritime Surveillance System (AMSS)
14.
Estonian maritime cluster
15.
Estonian maritime defence
16.
European Maritime Safety Agency
17.
Global Maritime Distress and Safety system (GMDSS)
18.
higher maritime education institutions
19.
International Maritime Organization (IMO)
20.
maritime
21.
maritime accidents
22.
maritime activities
23.
maritime affairs
24.
Maritime automation
25.
maritime autonomous systems
26.
Maritime cluster
27.
maritime clusters
28.
maritime communications
29.
maritime connectivity
30.
maritime decarbonization
31.
maritime defence
32.
Maritime digital transformation
33.
maritime economics
34.
maritime economy
35.
Maritime education
36.
maritime education and training
37.
maritime education concept
38.
maritime energy contract
39.
maritime environment
40.
maritime environmental governance
41.
maritime fleet management
42.
maritime higher education and training (MHET)
43.
maritime industries
44.
maritime industry
45.
maritime infrastructure
46.
maritime innovation management
47.
maritime investment theory
48.
maritime investments
49.
maritime logistic
50.
maritime logistics
51.
maritime mindset
52.
maritime navigation safety
53.
maritime occupational health
54.
maritime occupational health and safety
55.
maritime policy
56.
maritime pollution
57.
maritime port management
58.
maritime safety
59.
maritime sector
60.
maritime situation awareness
61.
maritime solutions
62.
maritime spatial planning
63.
maritime traffic analytics
64.
maritime transition
65.
maritime transport
66.
maritime transportation
67.
national maritime defence
68.
Swedish Maritime Competence Centre
69.
The Global Maritime Professional
70.
autonomous vehicle cyber range
71.
cloud-based cyber-physical systems (C2PS)
72.
cognitive cyber warfare
73.
cyber
74.
Cyber “Maastricht”
75.
cyber architecture
76.
cyber attacks
77.
cyber battle damage assessment
78.
Cyber Bio-analytical Physical Systems (CBPSs)
79.
cyber challenge
80.
cyber command
81.
Cyber Command organisational structure
82.
cyber conflict
83.
cyber contingency
84.
cyber crime
85.
cyber crime pathways
86.
cyber crime scripting
87.
Cyber crisis management
88.
cyber defence
89.
cyber defence exercise
90.
cyber defence exercises
91.
cyber defense education
92.
cyber defense exercise
93.
cyber defense exercises
94.
cyber dependence
95.
cyber diplomacy
96.
cyber exercise
97.
cyber hygiene
98.
cyber impact assessment
99.
cyber incidents
100.
cyber insurance
101.
cyber intrusion detection
102.
cyber kill chain
103.
cyber operation
104.
cyber operation officer
105.
cyber operations
106.
cyber operations exercises
107.
cyber physical energy systems
108.
cyber physical power system (CPPS)
109.
Cyber Physical Production System
110.
cyber physical production systems (CPPS)
111.
cyber physical social system
112.
cyber physical social systems (cpss)
113.
cyber physical system
114.
Cyber Planning tool
115.
cyber power Europe
116.
cyber ranges
117.
cyber red teaming
118.
cyber resilience
119.
cyber resilience at sea
120.
cyber risk
121.
cyber risk management in shipping
122.
cyber situational awareness
123.
cyber stability
124.
cyber team communication
125.
cyber threat
126.
cyber threat communication
127.
Cyber Threat Intelligence
128.
cyber threats
129.
cyber war
130.
cyber warfare
131.
cyber warriors
132.
cyber weapons
133.
cyber-attack
134.
cyber-attack pathways
135.
Cyber-attacks
136.
cyber-insurance
137.
cyber-paternalism
138.
cyber-physical energy systems
139.
cyber-physical social system (CPSS)
140.
cyber-physical system
141.
Cyber-Physical System (CPS)
142.
cyber-physical system logistic robot
143.
cyber-physical systems
144.
Cyber-Physical Systems (CPS)
145.
cyber-risks
146.
cyber-space nexus
147.
cyber-vulnerabilities
148.
Defensive Cyber Operations
149.
EU cyber policy
150.
international cyber norms
151.
military cyber
152.
mobile cyber-physical system
153.
NATO cyber operations definitions
154.
NATO Cyber Range
155.
Offensive Cyber Operations
156.
perceived cyber risks and threats
157.
responsive cyber defence
158.
Socio-Cyber-Physical Systems
159.
space cyber range
160.
technical cyber exercise
161.
Visualising Cyber Planning
162.
ad-hoc sensor networks security
163.
Automatic Security Verification
164.
Blockchain security
165.
cache security
166.
communication system security
167.
comprehensive system of economic security
168.
computer security
169.
cooperative security dilemma
170.
data and information security
171.
data security
172.
development of security cameras
173.
digital security practices
174.
drinking water security
175.
economic security
176.
economic security of enterprise
177.
emotional security
178.
energy security
179.
energy security indicator
180.
Estonian information security standard
181.
graded security
182.
hardware security
183.
hardware security primitive
184.
high level of security
185.
Homeland security
186.
human security
187.
information security
188.
information security and privacy
189.
initial level of security
190.
internal security
191.
international security
192.
investment and innovation security
193.
IPv6 security
194.
IT security
195.
IT security management
196.
job security
197.
long-term security
198.
medium level of security
199.
metadata model for security measures
200.
Middle Eastern security
201.
Mobile security
202.
national security
203.
NATO. Science for Peace and Security Program
204.
network security
205.
network security monitoring
206.
OSCE (Organization for Security and Co-operation in Europe)
207.
passenger’s security
208.
policy-based routing security
209.
political and security cultures
210.
post-quantum security
211.
power system security
212.
quantitative security
213.
regional security
214.
RISC-V Security Verification
215.
Safety and Security in Sea Transportation
216.
safety and security testing
217.
security
218.
security adaptation
219.
security alert prioritization
220.
security analysis
221.
security and justice (AFSJ)
222.
Security and political science
223.
security and privacy
224.
security and privacy in smart grids
225.
Security Assertion Mining
226.
security closure
227.
Security Coverage
228.
security dataset
229.
security dilemma
230.
Security evaluation
231.
security evaluation instruments
232.
Security limitations
233.
security log analysis
234.
security management
235.
security model
236.
security monitoring
237.
security notion
238.
security objectives
239.
security of data
240.
security of supply
241.
security operation center
242.
security operations center
243.
security patterns
244.
security policy
245.
security problem definition
246.
security proof
247.
security protocols
248.
security requirements
249.
security requirements engineering
250.
security risk assessment
251.
security risk management
252.
security risks
253.
security science and technology
254.
security strategies
255.
security systems for military objects
256.
security testing
257.
security training
258.
security verification
259.
security-by-design
260.
social security planning
261.
societal security
262.
software security
263.
software security level
264.
software security subcharacteristics
265.
sufficient level of security
266.
system of economic security
267.
system security
268.
terrorism security
269.
transmission System Security
270.
voting privacy and security
subject term
8
1.
Federal Maritime and Hydrographic Agency (BSH)
2.
International Maritime Organization
3.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
4.
Cyber Battle
5.
Telia Cyber Battle of Estonia
6.
Telia Cyber Battle of Nordic-Baltics
7.
National Computer Security Incident Response Teams (N-CSIRTs)
8.
USS Security Eesti AS
TalTech department
1
1.
Estonian Maritime Academy
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT