Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber risk (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
4
Vaata veel..
(2/193)
Ekspordi
ekspordi kõik päringu tulemused
(4)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
2
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications
Carlo, Antonio
;
Manti, Nebile Pelin
;
Bintang, A. S. W. A. M.
;
Casamassima, Francesca
;
Boschetti, Nicolo
;
Breda, Paola
;
Rahloff, Tobias
Journal of space safety engineering
2023
/
p. 474-482 : ill
https://doi.org/10.1016/j.jsse.2023.08.002
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
3
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Safeguarding the final frontier : analyzing the legal and technical challenges to mega-constellations
Jha, Devanshu
;
Manti, Nebile Pelin
;
Carlo, Antonio
;
Zarkan, Laetitia Cesari
;
Breda, Paola
;
Jha, Antara
Journal of space safety engineering
2022
/
p. 636-643
https://doi.org/10.1016/j.jsse.2022.08.006
Journal metrics at Scopus
Article at Scopus
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisis
Skierka-Canton, Isabel
Government information quarterly
2023
/
art. 101781, 12 p. : ill
https://doi.org/10.1016/j.giq.2022.101781
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
Kirjeid leitud 4, kuvan
1 - 4
võtmesõna
188
1.
cyber risk
2.
cyber-risks
3.
perceived cyber risks and threats
4.
autonomous vehicle cyber range
5.
cloud-based cyber-physical systems (C2PS)
6.
cognitive cyber warfare
7.
cyber
8.
Cyber “Maastricht”
9.
cyber architecture
10.
cyber attacks
11.
cyber battle damage assessment
12.
Cyber Bio-analytical Physical Systems (CBPSs)
13.
cyber challenge
14.
cyber command
15.
cyber conflict
16.
cyber contingency
17.
cyber crime
18.
cyber crime pathways
19.
cyber crime scripting
20.
Cyber crisis management
21.
cyber defence
22.
cyber defence exercise
23.
cyber defence exercises
24.
cyber defense education
25.
cyber defense exercise
26.
cyber defense exercises
27.
cyber dependence
28.
cyber diplomacy
29.
cyber exercise
30.
cyber hygiene
31.
cyber impact assessment
32.
cyber incidents
33.
cyber insurance
34.
cyber intrusion detection
35.
cyber kill chain
36.
cyber operation
37.
cyber operation officer
38.
cyber operations
39.
cyber physical energy systems
40.
cyber physical power system (CPPS)
41.
Cyber Physical Production System
42.
cyber physical production systems (CPPS)
43.
cyber physical social system
44.
cyber physical social systems (cpss)
45.
cyber physical system
46.
cyber power Europe
47.
cyber ranges
48.
cyber red teaming
49.
cyber resilience
50.
cyber security
51.
cyber security education
52.
cyber security exercises
53.
cyber security strategies
54.
cyber situational awareness
55.
cyber stability
56.
cyber team communication
57.
cyber threat
58.
cyber threat communication
59.
cyber threats
60.
cyber war
61.
cyber warfare
62.
cyber warriors
63.
cyber weapons
64.
cyber-attack
65.
cyber-attack pathways
66.
cyber-insurance
67.
cyber-paternalism
68.
cyber-physical energy systems
69.
cyber-physical social system (CPSS)
70.
cyber-physical system
71.
Cyber-Physical System (CPS)
72.
cyber-physical system logistic robot
73.
cyber-physical systems
74.
Cyber-Physical Systems (CPS)
75.
cyber-security
76.
cyber-vulnerabilities
77.
Defensive Cyber Operations
78.
EU cyber policy
79.
international cyber norms
80.
military cyber
81.
mobile cyber-physical system
82.
national cyber security strategy
83.
NATO Cyber Range
84.
Offensive Cyber Operations
85.
responsive cyber defence
86.
Socio-Cyber-Physical Systems
87.
technical cyber exercise
88.
at-risk-of-poverty rates
89.
bank risk-taking
90.
bank-risk taking
91.
bankruptcy risk
92.
cancer risk
93.
cardiovascular risk
94.
Cardiovascular risk assessment
95.
cardiovascular risk factors
96.
climatic risk
97.
coastal risk index
98.
conditional value at risk (CVaR)
99.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
100.
credit risk
101.
credit risk determinants
102.
disaster risk reduction
103.
ecological risk assessment
104.
Economic risk
105.
elimination of risk
106.
environmental risk
107.
environmental risk assessment
108.
ESG risk
109.
farmer's risk criterion
110.
fish injury and mortality risk
111.
flood risk management
112.
health risk
113.
heart disease risk factors
114.
infection risk
115.
infection risk-based ventilation
116.
insurance risk
117.
kardiovaskulaarne risk
118.
knowledge risk
119.
knowledge risk management
120.
knowledge risk management (KRM)
121.
knowledge risk management in banking
122.
knowledge risk management in construction
123.
knowledge risk management in SMEs
124.
military environment risk assessment
125.
models for risk assessment
126.
mould growth risk
127.
mould risk
128.
multi-risk/multi-criteria
129.
operational knowledge risk
130.
overheating risk
131.
perceived risk
132.
Polygenic risk score
133.
portfolio risk hedging
134.
potential risk
135.
pre-symptomatic period risk control
136.
proactive risk management
137.
process risk
138.
project risk management
139.
psychosocial risk factors
140.
quantitative risk analysis
141.
reactive risk management
142.
residual cardiovascular risk
143.
risk
144.
risk group for mental disorders
145.
risk allocation
146.
risk analysis
147.
risk assessment
148.
risk assessment chemicals in the air
149.
risk assessments
150.
risk attitudes
151.
risk behavior
152.
risk classification
153.
risk evaluation model
154.
risk evaluation model development
155.
risk event chain analyses
156.
risk factors
157.
risk governance
158.
risk interdependence
159.
risk levels
160.
risk management
161.
risk management culture
162.
risk management in public organizations
163.
risk management model
164.
risk mitigation
165.
risk modelling
166.
risk of failure
167.
risk of mould growth
168.
risk prediction
169.
risk preference analysis
170.
risk prevention
171.
risk reduction
172.
risk stratification
173.
risk transfer
174.
risk-adjusted performance
175.
risk-based management
176.
risk-taking
177.
rrivacy risk assessment
178.
security risk assessment
179.
security risk management
180.
semi-quantitative risk assessment method
181.
situational risk awareness
182.
standalone risk
183.
supply chain risk
184.
supply chain risk management
185.
systemic risk
186.
value at risk
187.
vascular risk factors
188.
3D risk assesment
märksõna
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
kardiovaskulaarne risk
5.
risk
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT