Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber risk (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/234)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications
Carlo, Antonio
;
Manti, Nebile Pelin
;
Bintang, A. S. W. A. M.
;
Casamassima, Francesca
;
Boschetti, Nicolo
;
Breda, Paola
;
Rahloff, Tobias
Journal of space safety engineering
2023
/
p. 474-482 : ill
https://doi.org/10.1016/j.jsse.2023.08.002
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
3
journal article EST
/
journal article ENG
Safeguarding the final frontier : analyzing the legal and technical challenges to mega-constellations
Jha, Devanshu
;
Manti, Nebile Pelin
;
Carlo, Antonio
;
Zarkan, Laetitia Cesari
;
Breda, Paola
;
Jha, Antara
Journal of space safety engineering
2022
/
p. 636-643
https://doi.org/10.1016/j.jsse.2022.08.006
Journal metrics at Scopus
Article at Scopus
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
4
journal article EST
/
journal article ENG
When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisis
Skierka-Canton, Isabel
Government information quarterly
2023
/
art. 101781, 12 p. : ill
https://doi.org/10.1016/j.giq.2022.101781
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
Number of records 4, displaying
1 - 4
keyword
228
1.
cyber risk
2.
cyber risk management in shipping
3.
cyber-risks
4.
perceived cyber risks and threats
5.
automated cyber defense
6.
autonomous vehicle cyber range
7.
cloud-based cyber-physical systems (C2PS)
8.
cognitive cyber warfare
9.
cyber
10.
Cyber “Maastricht”
11.
cyber architecture
12.
cyber attacks
13.
cyber battle damage assessment
14.
Cyber Bio-analytical Physical Systems (CBPSs)
15.
cyber challenge
16.
cyber command
17.
Cyber Command organisational structure
18.
cyber conflict
19.
cyber contingency
20.
cyber crime
21.
cyber crime pathways
22.
cyber crime scripting
23.
Cyber crisis management
24.
cyber defence
25.
cyber defence exercise
26.
cyber defence exercises
27.
cyber defense education
28.
cyber defense exercise
29.
cyber defense exercises
30.
cyber dependence
31.
cyber diplomacy
32.
cyber exercise
33.
cyber hygiene
34.
cyber impact assessment
35.
cyber incidents
36.
cyber insurance
37.
cyber intrusion detection
38.
cyber kill chain
39.
cyber operation
40.
cyber operation officer
41.
cyber operations
42.
cyber operations exercises
43.
cyber physical energy systems
44.
cyber physical power system (CPPS)
45.
Cyber Physical Production System
46.
cyber physical production systems (CPPS)
47.
cyber physical social system
48.
cyber physical social systems (cpss)
49.
cyber physical system
50.
Cyber Planning tool
51.
cyber power Europe
52.
cyber ranges
53.
cyber red teaming
54.
cyber resilience
55.
cyber resilience at sea
56.
cyber security
57.
cyber security education
58.
cyber security exercises
59.
cyber security monitoring
60.
cyber security monitoring in maritime
61.
cyber security strategies
62.
cyber situational awareness
63.
cyber stability
64.
cyber team communication
65.
cyber threat
66.
cyber threat communication
67.
Cyber Threat Intelligence
68.
cyber threats
69.
cyber war
70.
cyber warfare
71.
cyber warriors
72.
cyber weapons
73.
cyber-attack
74.
cyber-attack pathways
75.
Cyber-attacks
76.
cyber-insurance
77.
cyber-paternalism
78.
cyber-physical energy systems
79.
cyber-physical social system (CPSS)
80.
cyber-physical system
81.
Cyber-Physical System (CPS)
82.
cyber-physical system logistic robot
83.
cyber-physical system security
84.
cyber-physical systems
85.
Cyber-Physical Systems (CPS)
86.
cyber-security
87.
cyber-space nexus
88.
cyber-vulnerabilities
89.
Defensive Cyber Operations
90.
EU cyber policy
91.
international cyber norms
92.
maritime cyber security
93.
maritime cyber security operations centers
94.
military cyber
95.
mobile cyber-physical system
96.
national cyber security strategy
97.
NATO cyber operations definitions
98.
NATO Cyber Range
99.
Offensive Cyber Operations
100.
responsive cyber defence
101.
Socio-Cyber-Physical Systems
102.
space cyber range
103.
technical cyber exercise
104.
Visualising Cyber Planning
105.
accrual-based credit risk model
106.
at-risk-of-poverty rates
107.
bank risk-taking
108.
bank-risk taking
109.
bankruptcy risk
110.
cancer risk
111.
cardiovascular risk
112.
Cardiovascular risk assessment
113.
cardiovascular risk factors
114.
climatic risk
115.
coastal risk index
116.
comprehensive climate risk assessment
117.
conceptual framework for safety/risk analysis
118.
conditional value at risk (CVaR)
119.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
120.
credit risk
121.
credit risk determinants
122.
credit risk forecasting
123.
credit risk modelling
124.
disaster risk reduction
125.
ecological risk assessment
126.
Economic risk
127.
elimination of risk
128.
enterprise risk management
129.
environmental risk
130.
environmental risk assessment
131.
ergonomic risk
132.
ESG risk
133.
failure risk assessment
134.
failure risk reduction
135.
farmer's risk criterion
136.
fish injury and mortality risk
137.
flood risk management
138.
flood risk modelling
139.
health risk
140.
heart disease risk factors
141.
infection risk
142.
infection risk calculators
143.
infection risk tools
144.
infection risk-based ventilation
145.
insurance risk
146.
kardiovaskulaarne risk
147.
knowledge risk
148.
knowledge risk management
149.
knowledge risk management (KRM)
150.
knowledge risk management in banking
151.
knowledge risk management in construction
152.
knowledge risk management in SMEs
153.
machinery risk assessment
154.
military environment risk assessment
155.
models for risk assessment
156.
Moisture risk mitigation
157.
mould growth risk
158.
mould risk
159.
multi-risk/multi-criteria
160.
navigation risk
161.
navigation risk management course
162.
operational knowledge risk
163.
overheating risk
164.
perceived risk
165.
policy risk
166.
Polygenic risk
167.
Polygenic risk score
168.
portfolio risk hedging
169.
potential risk
170.
pre-symptomatic period risk control
171.
proactive risk management
172.
process risk
173.
project risk management
174.
psychosocial risk factors
175.
quantitative risk analysis
176.
reactive risk management
177.
residual cardiovascular risk
178.
risk
179.
risk group for mental disorders
180.
risk allocation
181.
risk analysis
182.
risk assessment
183.
risk assessment chemicals in the air
184.
risk assessments
185.
risk attitudes
186.
risk behavior
187.
risk classification
188.
risk coupling effects
189.
risk evaluation model
190.
risk evaluation model development
191.
risk event chain analyses
192.
risk factors
193.
risk governance
194.
risk interdependence
195.
risk levels
196.
risk management
197.
risk management culture
198.
risk management in public organizations
199.
risk management model
200.
risk mitigation
201.
risk modelling
202.
risk of failure
203.
risk of mould growth
204.
risk prediction
205.
risk preference analysis
206.
risk prevention
207.
risk reduction
208.
risk stratification
209.
risk transfer
210.
risk-adjusted performance
211.
risk-based laws
212.
risk-based management
213.
risk-taking
214.
risk-taking behavior
215.
rrivacy risk assessment
216.
security risk assessment
217.
security risk management
218.
semi-quantitative risk assessment method
219.
ship collision risk
220.
situational risk awareness
221.
standalone risk
222.
supply chain risk
223.
supply chain risk management
224.
systemic risk
225.
tourists’ perceived travel risk
226.
value at risk
227.
vascular risk factors
228.
3D risk assesment
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
kardiovaskulaarne risk
6.
risk
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT