Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber risk (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
4
Vaata veel..
(2/213)
Ekspordi
ekspordi kõik päringu tulemused
(4)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
2
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications
Carlo, Antonio
;
Manti, Nebile Pelin
;
Bintang, A. S. W. A. M.
;
Casamassima, Francesca
;
Boschetti, Nicolo
;
Breda, Paola
;
Rahloff, Tobias
Journal of space safety engineering
2023
/
p. 474-482 : ill
https://doi.org/10.1016/j.jsse.2023.08.002
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
3
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Safeguarding the final frontier : analyzing the legal and technical challenges to mega-constellations
Jha, Devanshu
;
Manti, Nebile Pelin
;
Carlo, Antonio
;
Zarkan, Laetitia Cesari
;
Breda, Paola
;
Jha, Antara
Journal of space safety engineering
2022
/
p. 636-643
https://doi.org/10.1016/j.jsse.2022.08.006
Journal metrics at Scopus
Article at Scopus
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisis
Skierka-Canton, Isabel
Government information quarterly
2023
/
art. 101781, 12 p. : ill
https://doi.org/10.1016/j.giq.2022.101781
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
Kirjeid leitud 4, kuvan
1 - 4
võtmesõna
208
1.
cyber risk
2.
cyber-risks
3.
perceived cyber risks and threats
4.
autonomous vehicle cyber range
5.
cloud-based cyber-physical systems (C2PS)
6.
cognitive cyber warfare
7.
cyber
8.
Cyber “Maastricht”
9.
cyber architecture
10.
cyber attacks
11.
cyber battle damage assessment
12.
Cyber Bio-analytical Physical Systems (CBPSs)
13.
cyber challenge
14.
cyber command
15.
Cyber Command organisational structure
16.
cyber conflict
17.
cyber contingency
18.
cyber crime
19.
cyber crime pathways
20.
cyber crime scripting
21.
Cyber crisis management
22.
cyber defence
23.
cyber defence exercise
24.
cyber defence exercises
25.
cyber defense education
26.
cyber defense exercise
27.
cyber defense exercises
28.
cyber dependence
29.
cyber diplomacy
30.
cyber exercise
31.
cyber hygiene
32.
cyber impact assessment
33.
cyber incidents
34.
cyber insurance
35.
cyber intrusion detection
36.
cyber kill chain
37.
cyber operation
38.
cyber operation officer
39.
cyber operations
40.
cyber operations exercises
41.
cyber physical energy systems
42.
cyber physical power system (CPPS)
43.
Cyber Physical Production System
44.
cyber physical production systems (CPPS)
45.
cyber physical social system
46.
cyber physical social systems (cpss)
47.
cyber physical system
48.
cyber power Europe
49.
cyber ranges
50.
cyber red teaming
51.
cyber resilience
52.
cyber security
53.
cyber security education
54.
cyber security exercises
55.
cyber security monitoring
56.
cyber security strategies
57.
cyber situational awareness
58.
cyber stability
59.
cyber team communication
60.
cyber threat
61.
cyber threat communication
62.
Cyber Threat Intelligence
63.
cyber threats
64.
cyber war
65.
cyber warfare
66.
cyber warriors
67.
cyber weapons
68.
cyber-attack
69.
cyber-attack pathways
70.
cyber-insurance
71.
cyber-paternalism
72.
cyber-physical energy systems
73.
cyber-physical social system (CPSS)
74.
cyber-physical system
75.
Cyber-Physical System (CPS)
76.
cyber-physical system logistic robot
77.
cyber-physical systems
78.
Cyber-Physical Systems (CPS)
79.
cyber-security
80.
cyber-space nexus
81.
cyber-vulnerabilities
82.
Defensive Cyber Operations
83.
EU cyber policy
84.
international cyber norms
85.
military cyber
86.
mobile cyber-physical system
87.
national cyber security strategy
88.
NATO cyber operations definitions
89.
NATO Cyber Range
90.
Offensive Cyber Operations
91.
responsive cyber defence
92.
Socio-Cyber-Physical Systems
93.
space cyber range
94.
technical cyber exercise
95.
accrual-based credit risk model
96.
at-risk-of-poverty rates
97.
bank risk-taking
98.
bank-risk taking
99.
bankruptcy risk
100.
cancer risk
101.
cardiovascular risk
102.
Cardiovascular risk assessment
103.
cardiovascular risk factors
104.
climatic risk
105.
coastal risk index
106.
conceptual framework for safety/risk analysis
107.
conditional value at risk (CVaR)
108.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
109.
credit risk
110.
credit risk determinants
111.
credit risk modelling
112.
disaster risk reduction
113.
ecological risk assessment
114.
Economic risk
115.
elimination of risk
116.
enterprise risk management
117.
environmental risk
118.
environmental risk assessment
119.
ergonomic risk
120.
ESG risk
121.
farmer's risk criterion
122.
fish injury and mortality risk
123.
flood risk management
124.
health risk
125.
heart disease risk factors
126.
infection risk
127.
infection risk-based ventilation
128.
insurance risk
129.
kardiovaskulaarne risk
130.
knowledge risk
131.
knowledge risk management
132.
knowledge risk management (KRM)
133.
knowledge risk management in banking
134.
knowledge risk management in construction
135.
knowledge risk management in SMEs
136.
machinery risk assessment
137.
military environment risk assessment
138.
models for risk assessment
139.
Moisture risk mitigation
140.
mould growth risk
141.
mould risk
142.
multi-risk/multi-criteria
143.
navigation risk
144.
navigation risk management course
145.
operational knowledge risk
146.
overheating risk
147.
perceived risk
148.
Polygenic risk score
149.
portfolio risk hedging
150.
potential risk
151.
pre-symptomatic period risk control
152.
proactive risk management
153.
process risk
154.
project risk management
155.
psychosocial risk factors
156.
quantitative risk analysis
157.
reactive risk management
158.
residual cardiovascular risk
159.
risk
160.
risk group for mental disorders
161.
risk allocation
162.
risk analysis
163.
risk assessment
164.
risk assessment chemicals in the air
165.
risk assessments
166.
risk attitudes
167.
risk behavior
168.
risk classification
169.
risk evaluation model
170.
risk evaluation model development
171.
risk event chain analyses
172.
risk factors
173.
risk governance
174.
risk interdependence
175.
risk levels
176.
risk management
177.
risk management culture
178.
risk management in public organizations
179.
risk management model
180.
risk mitigation
181.
risk modelling
182.
risk of failure
183.
risk of mould growth
184.
risk prediction
185.
risk preference analysis
186.
risk prevention
187.
risk reduction
188.
risk stratification
189.
risk transfer
190.
risk-adjusted performance
191.
risk-based laws
192.
risk-based management
193.
risk-taking
194.
risk-taking behavior
195.
rrivacy risk assessment
196.
security risk assessment
197.
security risk management
198.
semi-quantitative risk assessment method
199.
ship collision risk
200.
situational risk awareness
201.
standalone risk
202.
supply chain risk
203.
supply chain risk management
204.
systemic risk
205.
tourists’ perceived travel risk
206.
value at risk
207.
vascular risk factors
208.
3D risk assesment
märksõna
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
kardiovaskulaarne risk
5.
risk
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT