Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
maritime cyber security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/278)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A National Maritime Cyber Security Operations Center (M-SOC) Concept
Oruc, Aybars
;
Bauk, Sanja
;
Zhou, Jianying
Journal of Marine Science and Engineering
2026
/
art. 17
https://doi.org/10.3390/jmse14010017
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
270
1.
maritime cyber security
2.
maritime cyber security operations centers
3.
maritime cybersecurity
4.
maritime cybersecurity certification teaching
5.
Maritime Security Operations Center (M-SOC)
6.
cyber security
7.
cyber security education
8.
cyber security exercises
9.
cyber security monitoring
10.
cyber security strategies
11.
cyber-security
12.
national cyber security strategy
13.
Autonomous Maritime Surveillance System (AMSS)
14.
Estonian maritime cluster
15.
Estonian maritime defence
16.
European Maritime Safety Agency
17.
Global Maritime Distress and Safety system (GMDSS)
18.
higher maritime education institutions
19.
International Maritime Organization (IMO)
20.
maritime
21.
maritime accidents
22.
maritime activities
23.
maritime affairs
24.
Maritime automation
25.
maritime autonomous systems
26.
Maritime cluster
27.
maritime clusters
28.
maritime communications
29.
maritime connectivity
30.
maritime decarbonization
31.
maritime defence
32.
Maritime digital transformation
33.
maritime economics
34.
maritime economy
35.
Maritime education
36.
maritime education and training
37.
maritime education concept
38.
maritime energy contract
39.
maritime environment
40.
maritime environmental governance
41.
maritime fleet management
42.
maritime higher education and training (MHET)
43.
maritime industries
44.
maritime industry
45.
maritime infrastructure
46.
maritime innovation management
47.
maritime investment theory
48.
maritime investments
49.
maritime logistic
50.
maritime logistics
51.
maritime mindset
52.
maritime navigation safety
53.
maritime occupational health
54.
maritime occupational health and safety
55.
maritime policy
56.
maritime pollution
57.
maritime port management
58.
maritime safety
59.
maritime sector
60.
maritime situation awareness
61.
maritime solutions
62.
maritime spatial planning
63.
maritime traffic analytics
64.
maritime transition
65.
maritime transport
66.
maritime transportation
67.
national maritime defence
68.
Swedish Maritime Competence Centre
69.
The Global Maritime Professional
70.
autonomous vehicle cyber range
71.
cloud-based cyber-physical systems (C2PS)
72.
cognitive cyber warfare
73.
cyber
74.
Cyber “Maastricht”
75.
cyber architecture
76.
cyber attacks
77.
cyber battle damage assessment
78.
Cyber Bio-analytical Physical Systems (CBPSs)
79.
cyber challenge
80.
cyber command
81.
Cyber Command organisational structure
82.
cyber conflict
83.
cyber contingency
84.
cyber crime
85.
cyber crime pathways
86.
cyber crime scripting
87.
Cyber crisis management
88.
cyber defence
89.
cyber defence exercise
90.
cyber defence exercises
91.
cyber defense education
92.
cyber defense exercise
93.
cyber defense exercises
94.
cyber dependence
95.
cyber diplomacy
96.
cyber exercise
97.
cyber hygiene
98.
cyber impact assessment
99.
cyber incidents
100.
cyber insurance
101.
cyber intrusion detection
102.
cyber kill chain
103.
cyber operation
104.
cyber operation officer
105.
cyber operations
106.
cyber operations exercises
107.
cyber physical energy systems
108.
cyber physical power system (CPPS)
109.
Cyber Physical Production System
110.
cyber physical production systems (CPPS)
111.
cyber physical social system
112.
cyber physical social systems (cpss)
113.
cyber physical system
114.
Cyber Planning tool
115.
cyber power Europe
116.
cyber ranges
117.
cyber red teaming
118.
cyber resilience
119.
cyber resilience at sea
120.
cyber risk
121.
cyber risk management in shipping
122.
cyber situational awareness
123.
cyber stability
124.
cyber team communication
125.
cyber threat
126.
cyber threat communication
127.
Cyber Threat Intelligence
128.
cyber threats
129.
cyber war
130.
cyber warfare
131.
cyber warriors
132.
cyber weapons
133.
cyber-attack
134.
cyber-attack pathways
135.
Cyber-attacks
136.
cyber-insurance
137.
cyber-paternalism
138.
cyber-physical energy systems
139.
cyber-physical social system (CPSS)
140.
cyber-physical system
141.
Cyber-Physical System (CPS)
142.
cyber-physical system logistic robot
143.
cyber-physical systems
144.
Cyber-Physical Systems (CPS)
145.
cyber-risks
146.
cyber-space nexus
147.
cyber-vulnerabilities
148.
Defensive Cyber Operations
149.
EU cyber policy
150.
international cyber norms
151.
military cyber
152.
mobile cyber-physical system
153.
NATO cyber operations definitions
154.
NATO Cyber Range
155.
Offensive Cyber Operations
156.
perceived cyber risks and threats
157.
responsive cyber defence
158.
Socio-Cyber-Physical Systems
159.
space cyber range
160.
technical cyber exercise
161.
Visualising Cyber Planning
162.
ad-hoc sensor networks security
163.
Automatic Security Verification
164.
Blockchain security
165.
cache security
166.
communication system security
167.
comprehensive system of economic security
168.
computer security
169.
cooperative security dilemma
170.
data and information security
171.
data security
172.
development of security cameras
173.
digital security practices
174.
drinking water security
175.
economic security
176.
economic security of enterprise
177.
emotional security
178.
energy security
179.
energy security indicator
180.
Estonian information security standard
181.
graded security
182.
hardware security
183.
hardware security primitive
184.
high level of security
185.
Homeland security
186.
human security
187.
information security
188.
information security and privacy
189.
initial level of security
190.
internal security
191.
international security
192.
investment and innovation security
193.
IPv6 security
194.
IT security
195.
IT security management
196.
job security
197.
long-term security
198.
medium level of security
199.
metadata model for security measures
200.
Middle Eastern security
201.
Mobile security
202.
national security
203.
NATO. Science for Peace and Security Program
204.
network security
205.
network security monitoring
206.
OSCE (Organization for Security and Co-operation in Europe)
207.
passenger’s security
208.
policy-based routing security
209.
political and security cultures
210.
post-quantum security
211.
power system security
212.
quantitative security
213.
regional security
214.
RISC-V Security Verification
215.
Safety and Security in Sea Transportation
216.
safety and security testing
217.
security
218.
security adaptation
219.
security alert prioritization
220.
security analysis
221.
security and justice (AFSJ)
222.
Security and political science
223.
security and privacy
224.
security and privacy in smart grids
225.
Security Assertion Mining
226.
security closure
227.
Security Coverage
228.
security dataset
229.
security dilemma
230.
Security evaluation
231.
security evaluation instruments
232.
Security limitations
233.
security log analysis
234.
security management
235.
security model
236.
security monitoring
237.
security notion
238.
security objectives
239.
security of data
240.
security of supply
241.
security operation center
242.
security operations center
243.
security patterns
244.
security policy
245.
security problem definition
246.
security proof
247.
security protocols
248.
security requirements
249.
security requirements engineering
250.
security risk assessment
251.
security risk management
252.
security risks
253.
security science and technology
254.
security strategies
255.
security systems for military objects
256.
security testing
257.
security training
258.
security verification
259.
security-by-design
260.
social security planning
261.
societal security
262.
software security
263.
software security level
264.
software security subcharacteristics
265.
sufficient level of security
266.
system of economic security
267.
system security
268.
terrorism security
269.
transmission System Security
270.
voting privacy and security
märksõna
8
1.
Federal Maritime and Hydrographic Agency (BSH)
2.
International Maritime Organization
3.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
4.
Cyber Battle
5.
Telia Cyber Battle of Estonia
6.
Telia Cyber Battle of Nordic-Baltics
7.
National Computer Security Incident Response Teams (N-CSIRTs)
8.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT