Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber risk (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
4
Vaata veel..
(2/204)
Ekspordi
ekspordi kõik päringu tulemused
(4)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
2
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications
Carlo, Antonio
;
Manti, Nebile Pelin
;
Bintang, A. S. W. A. M.
;
Casamassima, Francesca
;
Boschetti, Nicolo
;
Breda, Paola
;
Rahloff, Tobias
Journal of space safety engineering
2023
/
p. 474-482 : ill
https://doi.org/10.1016/j.jsse.2023.08.002
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
3
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Safeguarding the final frontier : analyzing the legal and technical challenges to mega-constellations
Jha, Devanshu
;
Manti, Nebile Pelin
;
Carlo, Antonio
;
Zarkan, Laetitia Cesari
;
Breda, Paola
;
Jha, Antara
Journal of space safety engineering
2022
/
p. 636-643
https://doi.org/10.1016/j.jsse.2022.08.006
Journal metrics at Scopus
Article at Scopus
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisis
Skierka-Canton, Isabel
Government information quarterly
2023
/
art. 101781, 12 p. : ill
https://doi.org/10.1016/j.giq.2022.101781
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
Kirjeid leitud 4, kuvan
1 - 4
võtmesõna
199
1.
cyber risk
2.
cyber-risks
3.
perceived cyber risks and threats
4.
autonomous vehicle cyber range
5.
cloud-based cyber-physical systems (C2PS)
6.
cognitive cyber warfare
7.
cyber
8.
Cyber “Maastricht”
9.
cyber architecture
10.
cyber attacks
11.
cyber battle damage assessment
12.
Cyber Bio-analytical Physical Systems (CBPSs)
13.
cyber challenge
14.
cyber command
15.
cyber conflict
16.
cyber contingency
17.
cyber crime
18.
cyber crime pathways
19.
cyber crime scripting
20.
Cyber crisis management
21.
cyber defence
22.
cyber defence exercise
23.
cyber defence exercises
24.
cyber defense education
25.
cyber defense exercise
26.
cyber defense exercises
27.
cyber dependence
28.
cyber diplomacy
29.
cyber exercise
30.
cyber hygiene
31.
cyber impact assessment
32.
cyber incidents
33.
cyber insurance
34.
cyber intrusion detection
35.
cyber kill chain
36.
cyber operation
37.
cyber operation officer
38.
cyber operations
39.
cyber physical energy systems
40.
cyber physical power system (CPPS)
41.
Cyber Physical Production System
42.
cyber physical production systems (CPPS)
43.
cyber physical social system
44.
cyber physical social systems (cpss)
45.
cyber physical system
46.
cyber power Europe
47.
cyber ranges
48.
cyber red teaming
49.
cyber resilience
50.
cyber security
51.
cyber security education
52.
cyber security exercises
53.
cyber security monitoring
54.
cyber security strategies
55.
cyber situational awareness
56.
cyber stability
57.
cyber team communication
58.
cyber threat
59.
cyber threat communication
60.
cyber threats
61.
cyber war
62.
cyber warfare
63.
cyber warriors
64.
cyber weapons
65.
cyber-attack
66.
cyber-attack pathways
67.
cyber-insurance
68.
cyber-paternalism
69.
cyber-physical energy systems
70.
cyber-physical social system (CPSS)
71.
cyber-physical system
72.
Cyber-Physical System (CPS)
73.
cyber-physical system logistic robot
74.
cyber-physical systems
75.
Cyber-Physical Systems (CPS)
76.
cyber-security
77.
cyber-space nexus
78.
cyber-vulnerabilities
79.
Defensive Cyber Operations
80.
EU cyber policy
81.
international cyber norms
82.
military cyber
83.
mobile cyber-physical system
84.
national cyber security strategy
85.
NATO cyber operations definitions
86.
NATO Cyber Range
87.
Offensive Cyber Operations
88.
responsive cyber defence
89.
Socio-Cyber-Physical Systems
90.
space cyber range
91.
technical cyber exercise
92.
at-risk-of-poverty rates
93.
bank risk-taking
94.
bank-risk taking
95.
bankruptcy risk
96.
cancer risk
97.
cardiovascular risk
98.
Cardiovascular risk assessment
99.
cardiovascular risk factors
100.
climatic risk
101.
coastal risk index
102.
conceptual framework for safety/risk analysis
103.
conditional value at risk (CVaR)
104.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
105.
credit risk
106.
credit risk determinants
107.
disaster risk reduction
108.
ecological risk assessment
109.
Economic risk
110.
elimination of risk
111.
enterprise risk management
112.
environmental risk
113.
environmental risk assessment
114.
ergonomic risk
115.
ESG risk
116.
farmer's risk criterion
117.
fish injury and mortality risk
118.
flood risk management
119.
health risk
120.
heart disease risk factors
121.
infection risk
122.
infection risk-based ventilation
123.
insurance risk
124.
kardiovaskulaarne risk
125.
knowledge risk
126.
knowledge risk management
127.
knowledge risk management (KRM)
128.
knowledge risk management in banking
129.
knowledge risk management in construction
130.
knowledge risk management in SMEs
131.
machinery risk assessment
132.
military environment risk assessment
133.
models for risk assessment
134.
mould growth risk
135.
mould risk
136.
multi-risk/multi-criteria
137.
operational knowledge risk
138.
overheating risk
139.
perceived risk
140.
Polygenic risk score
141.
portfolio risk hedging
142.
potential risk
143.
pre-symptomatic period risk control
144.
proactive risk management
145.
process risk
146.
project risk management
147.
psychosocial risk factors
148.
quantitative risk analysis
149.
reactive risk management
150.
residual cardiovascular risk
151.
risk
152.
risk group for mental disorders
153.
risk allocation
154.
risk analysis
155.
risk assessment
156.
risk assessment chemicals in the air
157.
risk assessments
158.
risk attitudes
159.
risk behavior
160.
risk classification
161.
risk evaluation model
162.
risk evaluation model development
163.
risk event chain analyses
164.
risk factors
165.
risk governance
166.
risk interdependence
167.
risk levels
168.
risk management
169.
risk management culture
170.
risk management in public organizations
171.
risk management model
172.
risk mitigation
173.
risk modelling
174.
risk of failure
175.
risk of mould growth
176.
risk prediction
177.
risk preference analysis
178.
risk prevention
179.
risk reduction
180.
risk stratification
181.
risk transfer
182.
risk-adjusted performance
183.
risk-based laws
184.
risk-based management
185.
risk-taking
186.
rrivacy risk assessment
187.
security risk assessment
188.
security risk management
189.
semi-quantitative risk assessment method
190.
ship collision risk
191.
situational risk awareness
192.
standalone risk
193.
supply chain risk
194.
supply chain risk management
195.
systemic risk
196.
tourists’ perceived travel risk
197.
value at risk
198.
vascular risk factors
199.
3D risk assesment
märksõna
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
kardiovaskulaarne risk
5.
risk
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT