Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber risk (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/208)
Export
export all inquiry results
(4)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications
Carlo, Antonio
;
Manti, Nebile Pelin
;
Bintang, A. S. W. A. M.
;
Casamassima, Francesca
;
Boschetti, Nicolo
;
Breda, Paola
;
Rahloff, Tobias
Journal of space safety engineering
2023
/
p. 474-482 : ill
https://doi.org/10.1016/j.jsse.2023.08.002
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
3
journal article EST
/
journal article ENG
Safeguarding the final frontier : analyzing the legal and technical challenges to mega-constellations
Jha, Devanshu
;
Manti, Nebile Pelin
;
Carlo, Antonio
;
Zarkan, Laetitia Cesari
;
Breda, Paola
;
Jha, Antara
Journal of space safety engineering
2022
/
p. 636-643
https://doi.org/10.1016/j.jsse.2022.08.006
Journal metrics at Scopus
Article at Scopus
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
4
journal article EST
/
journal article ENG
When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisis
Skierka-Canton, Isabel
Government information quarterly
2023
/
art. 101781, 12 p. : ill
https://doi.org/10.1016/j.giq.2022.101781
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
Number of records 4, displaying
1 - 4
keyword
203
1.
cyber risk
2.
cyber-risks
3.
perceived cyber risks and threats
4.
autonomous vehicle cyber range
5.
cloud-based cyber-physical systems (C2PS)
6.
cognitive cyber warfare
7.
cyber
8.
Cyber “Maastricht”
9.
cyber architecture
10.
cyber attacks
11.
cyber battle damage assessment
12.
Cyber Bio-analytical Physical Systems (CBPSs)
13.
cyber challenge
14.
cyber command
15.
cyber conflict
16.
cyber contingency
17.
cyber crime
18.
cyber crime pathways
19.
cyber crime scripting
20.
Cyber crisis management
21.
cyber defence
22.
cyber defence exercise
23.
cyber defence exercises
24.
cyber defense education
25.
cyber defense exercise
26.
cyber defense exercises
27.
cyber dependence
28.
cyber diplomacy
29.
cyber exercise
30.
cyber hygiene
31.
cyber impact assessment
32.
cyber incidents
33.
cyber insurance
34.
cyber intrusion detection
35.
cyber kill chain
36.
cyber operation
37.
cyber operation officer
38.
cyber operations
39.
cyber physical energy systems
40.
cyber physical power system (CPPS)
41.
Cyber Physical Production System
42.
cyber physical production systems (CPPS)
43.
cyber physical social system
44.
cyber physical social systems (cpss)
45.
cyber physical system
46.
cyber power Europe
47.
cyber ranges
48.
cyber red teaming
49.
cyber resilience
50.
cyber security
51.
cyber security education
52.
cyber security exercises
53.
cyber security monitoring
54.
cyber security strategies
55.
cyber situational awareness
56.
cyber stability
57.
cyber team communication
58.
cyber threat
59.
cyber threat communication
60.
cyber threats
61.
cyber war
62.
cyber warfare
63.
cyber warriors
64.
cyber weapons
65.
cyber-attack
66.
cyber-attack pathways
67.
cyber-insurance
68.
cyber-paternalism
69.
cyber-physical energy systems
70.
cyber-physical social system (CPSS)
71.
cyber-physical system
72.
Cyber-Physical System (CPS)
73.
cyber-physical system logistic robot
74.
cyber-physical systems
75.
Cyber-Physical Systems (CPS)
76.
cyber-security
77.
cyber-space nexus
78.
cyber-vulnerabilities
79.
Defensive Cyber Operations
80.
EU cyber policy
81.
international cyber norms
82.
military cyber
83.
mobile cyber-physical system
84.
national cyber security strategy
85.
NATO cyber operations definitions
86.
NATO Cyber Range
87.
Offensive Cyber Operations
88.
responsive cyber defence
89.
Socio-Cyber-Physical Systems
90.
space cyber range
91.
technical cyber exercise
92.
accrual-based credit risk model
93.
at-risk-of-poverty rates
94.
bank risk-taking
95.
bank-risk taking
96.
bankruptcy risk
97.
cancer risk
98.
cardiovascular risk
99.
Cardiovascular risk assessment
100.
cardiovascular risk factors
101.
climatic risk
102.
coastal risk index
103.
conceptual framework for safety/risk analysis
104.
conditional value at risk (CVaR)
105.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
106.
credit risk
107.
credit risk determinants
108.
credit risk modelling
109.
disaster risk reduction
110.
ecological risk assessment
111.
Economic risk
112.
elimination of risk
113.
enterprise risk management
114.
environmental risk
115.
environmental risk assessment
116.
ergonomic risk
117.
ESG risk
118.
farmer's risk criterion
119.
fish injury and mortality risk
120.
flood risk management
121.
health risk
122.
heart disease risk factors
123.
infection risk
124.
infection risk-based ventilation
125.
insurance risk
126.
kardiovaskulaarne risk
127.
knowledge risk
128.
knowledge risk management
129.
knowledge risk management (KRM)
130.
knowledge risk management in banking
131.
knowledge risk management in construction
132.
knowledge risk management in SMEs
133.
machinery risk assessment
134.
military environment risk assessment
135.
models for risk assessment
136.
Moisture risk mitigation
137.
mould growth risk
138.
mould risk
139.
multi-risk/multi-criteria
140.
operational knowledge risk
141.
overheating risk
142.
perceived risk
143.
Polygenic risk score
144.
portfolio risk hedging
145.
potential risk
146.
pre-symptomatic period risk control
147.
proactive risk management
148.
process risk
149.
project risk management
150.
psychosocial risk factors
151.
quantitative risk analysis
152.
reactive risk management
153.
residual cardiovascular risk
154.
risk
155.
risk group for mental disorders
156.
risk allocation
157.
risk analysis
158.
risk assessment
159.
risk assessment chemicals in the air
160.
risk assessments
161.
risk attitudes
162.
risk behavior
163.
risk classification
164.
risk evaluation model
165.
risk evaluation model development
166.
risk event chain analyses
167.
risk factors
168.
risk governance
169.
risk interdependence
170.
risk levels
171.
risk management
172.
risk management culture
173.
risk management in public organizations
174.
risk management model
175.
risk mitigation
176.
risk modelling
177.
risk of failure
178.
risk of mould growth
179.
risk prediction
180.
risk preference analysis
181.
risk prevention
182.
risk reduction
183.
risk stratification
184.
risk transfer
185.
risk-adjusted performance
186.
risk-based laws
187.
risk-based management
188.
risk-taking
189.
risk-taking behavior
190.
rrivacy risk assessment
191.
security risk assessment
192.
security risk management
193.
semi-quantitative risk assessment method
194.
ship collision risk
195.
situational risk awareness
196.
standalone risk
197.
supply chain risk
198.
supply chain risk management
199.
systemic risk
200.
tourists’ perceived travel risk
201.
value at risk
202.
vascular risk factors
203.
3D risk assesment
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
kardiovaskulaarne risk
5.
risk
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT