Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber risk (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
4
Vaata veel..
(2/187)
Ekspordi
ekspordi kõik päringu tulemused
(4)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
2
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications
Carlo, Antonio
;
Manti, Nebile Pelin
;
Bintang, A. S. W. A. M.
;
Casamassima, Francesca
;
Boschetti, Nicolo
;
Breda, Paola
;
Rahloff, Tobias
Journal of space safety engineering
2023
/
p. 474-482 : ill
https://doi.org/10.1016/j.jsse.2023.08.002
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
3
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Safeguarding the final frontier : analyzing the legal and technical challenges to mega-constellations
Jha, Devanshu
;
Manti, Nebile Pelin
;
Carlo, Antonio
;
Zarkan, Laetitia Cesari
;
Breda, Paola
;
Jha, Antara
Journal of space safety engineering
2022
/
p. 636-643
https://doi.org/10.1016/j.jsse.2022.08.006
Journal metrics at Scopus
Article at Scopus
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisis
Skierka-Canton, Isabel
Government information quarterly
2023
/
art. 101781, 12 p. : ill
https://doi.org/10.1016/j.giq.2022.101781
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
Kirjeid leitud 4, kuvan
1 - 4
võtmesõna
182
1.
cyber risk
2.
perceived cyber risks and threats
3.
autonomous vehicle cyber range
4.
cloud-based cyber-physical systems (C2PS)
5.
cognitive cyber warfare
6.
cyber
7.
Cyber “Maastricht”
8.
cyber architecture
9.
cyber attacks
10.
cyber battle damage assessment
11.
Cyber Bio-analytical Physical Systems (CBPSs)
12.
cyber challenge
13.
cyber command
14.
cyber conflict
15.
cyber contingency
16.
cyber crime
17.
cyber crime pathways
18.
cyber crime scripting
19.
Cyber crisis management
20.
cyber defence
21.
cyber defence exercise
22.
cyber defence exercises
23.
cyber defense education
24.
cyber defense exercise
25.
cyber defense exercises
26.
cyber dependence
27.
cyber diplomacy
28.
cyber exercise
29.
cyber hygiene
30.
cyber impact assessment
31.
cyber incidents
32.
cyber insurance
33.
cyber intrusion detection
34.
cyber kill chain
35.
cyber operation
36.
cyber operations
37.
cyber physical energy systems
38.
cyber physical power system (CPPS)
39.
Cyber Physical Production System
40.
cyber physical production systems (CPPS)
41.
cyber physical social systems (cpss)
42.
cyber physical system
43.
cyber power Europe
44.
cyber ranges
45.
cyber red teaming
46.
cyber resilience
47.
cyber security
48.
cyber security education
49.
cyber security exercises
50.
cyber security strategies
51.
cyber situational awareness
52.
cyber stability
53.
cyber team communication
54.
cyber threat
55.
cyber threat communication
56.
cyber threats
57.
cyber war
58.
cyber warfare
59.
cyber warriors
60.
cyber weapons
61.
cyber-attack
62.
cyber-attack pathways
63.
cyber-insurance
64.
cyber-paternalism
65.
cyber-physical energy systems
66.
cyber-physical social system (CPSS)
67.
cyber-physical system
68.
Cyber-Physical System (CPS)
69.
cyber-physical system logistic robot
70.
cyber-physical systems
71.
Cyber-Physical Systems (CPS)
72.
cyber-security
73.
cyber-vulnerabilities
74.
Defensive Cyber Operations
75.
EU cyber policy
76.
international cyber norms
77.
military cyber
78.
mobile cyber-physical system
79.
national cyber security strategy
80.
NATO Cyber Range
81.
Offensive Cyber Operations
82.
responsive cyber defence
83.
Socio-Cyber-Physical Systems
84.
technical cyber exercise
85.
at-risk-of-poverty rates
86.
bank risk-taking
87.
bank-risk taking
88.
bankruptcy risk
89.
cancer risk
90.
cardiovascular risk
91.
Cardiovascular risk assessment
92.
cardiovascular risk factors
93.
climatic risk
94.
coastal risk index
95.
conditional value at risk (CVaR)
96.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
97.
credit risk
98.
credit risk determinants
99.
disaster risk reduction
100.
ecological risk assessment
101.
Economic risk
102.
elimination of risk
103.
environmental risk
104.
environmental risk assessment
105.
ESG risk
106.
farmer's risk criterion
107.
fish injury and mortality risk
108.
flood risk management
109.
health risk
110.
heart disease risk factors
111.
infection risk
112.
infection risk-based ventilation
113.
insurance risk
114.
kardiovaskulaarne risk
115.
knowledge risk
116.
knowledge risk management
117.
knowledge risk management (KRM)
118.
knowledge risk management in banking
119.
knowledge risk management in construction
120.
knowledge risk management in SMEs
121.
military environment risk assessment
122.
models for risk assessment
123.
mould growth risk
124.
mould risk
125.
multi-risk/multi-criteria
126.
operational knowledge risk
127.
overheating risk
128.
perceived risk
129.
Polygenic risk score
130.
portfolio risk hedging
131.
potential risk
132.
pre-symptomatic period risk control
133.
proactive risk management
134.
process risk
135.
project risk management
136.
psychosocial risk factors
137.
quantitative risk analysis
138.
reactive risk management
139.
residual cardiovascular risk
140.
risk
141.
risk group for mental disorders
142.
risk allocation
143.
risk analysis
144.
risk assessment
145.
risk assessment chemicals in the air
146.
risk assessments
147.
risk attitudes
148.
risk behavior
149.
risk classification
150.
risk evaluation model
151.
risk evaluation model development
152.
risk event chain analyses
153.
risk factors
154.
risk governance
155.
risk interdependence
156.
risk levels
157.
risk management
158.
risk management culture
159.
risk management in public organizations
160.
risk management model
161.
risk mitigation
162.
risk modelling
163.
risk of failure
164.
risk of mould growth
165.
risk prediction
166.
risk preference analysis
167.
risk prevention
168.
risk stratification
169.
risk transfer
170.
risk-adjusted performance
171.
risk-taking
172.
security risk assessment
173.
security risk management
174.
semi-quantitative risk assessment method
175.
situational risk awareness
176.
standalone risk
177.
supply chain risk
178.
supply chain risk management
179.
systemic risk
180.
value at risk
181.
vascular risk factors
182.
3D risk assesment
märksõna
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
kardiovaskulaarne risk
5.
risk
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT