Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber risk (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/192)
Export
export all inquiry results
(4)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications
Carlo, Antonio
;
Manti, Nebile Pelin
;
Bintang, A. S. W. A. M.
;
Casamassima, Francesca
;
Boschetti, Nicolo
;
Breda, Paola
;
Rahloff, Tobias
Journal of space safety engineering
2023
/
p. 474-482 : ill
https://doi.org/10.1016/j.jsse.2023.08.002
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
3
journal article EST
/
journal article ENG
Safeguarding the final frontier : analyzing the legal and technical challenges to mega-constellations
Jha, Devanshu
;
Manti, Nebile Pelin
;
Carlo, Antonio
;
Zarkan, Laetitia Cesari
;
Breda, Paola
;
Jha, Antara
Journal of space safety engineering
2022
/
p. 636-643
https://doi.org/10.1016/j.jsse.2022.08.006
Journal metrics at Scopus
Article at Scopus
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
4
journal article EST
/
journal article ENG
When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisis
Skierka-Canton, Isabel
Government information quarterly
2023
/
art. 101781, 12 p. : ill
https://doi.org/10.1016/j.giq.2022.101781
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
Number of records 4, displaying
1 - 4
keyword
187
1.
cyber risk
2.
cyber-risks
3.
perceived cyber risks and threats
4.
autonomous vehicle cyber range
5.
cloud-based cyber-physical systems (C2PS)
6.
cognitive cyber warfare
7.
cyber
8.
Cyber “Maastricht”
9.
cyber architecture
10.
cyber attacks
11.
cyber battle damage assessment
12.
Cyber Bio-analytical Physical Systems (CBPSs)
13.
cyber challenge
14.
cyber command
15.
cyber conflict
16.
cyber contingency
17.
cyber crime
18.
cyber crime pathways
19.
cyber crime scripting
20.
Cyber crisis management
21.
cyber defence
22.
cyber defence exercise
23.
cyber defence exercises
24.
cyber defense education
25.
cyber defense exercise
26.
cyber defense exercises
27.
cyber dependence
28.
cyber diplomacy
29.
cyber exercise
30.
cyber hygiene
31.
cyber impact assessment
32.
cyber incidents
33.
cyber insurance
34.
cyber intrusion detection
35.
cyber kill chain
36.
cyber operation
37.
cyber operations
38.
cyber physical energy systems
39.
cyber physical power system (CPPS)
40.
Cyber Physical Production System
41.
cyber physical production systems (CPPS)
42.
cyber physical social system
43.
cyber physical social systems (cpss)
44.
cyber physical system
45.
cyber power Europe
46.
cyber ranges
47.
cyber red teaming
48.
cyber resilience
49.
cyber security
50.
cyber security education
51.
cyber security exercises
52.
cyber security strategies
53.
cyber situational awareness
54.
cyber stability
55.
cyber team communication
56.
cyber threat
57.
cyber threat communication
58.
cyber threats
59.
cyber war
60.
cyber warfare
61.
cyber warriors
62.
cyber weapons
63.
cyber-attack
64.
cyber-attack pathways
65.
cyber-insurance
66.
cyber-paternalism
67.
cyber-physical energy systems
68.
cyber-physical social system (CPSS)
69.
cyber-physical system
70.
Cyber-Physical System (CPS)
71.
cyber-physical system logistic robot
72.
cyber-physical systems
73.
Cyber-Physical Systems (CPS)
74.
cyber-security
75.
cyber-vulnerabilities
76.
Defensive Cyber Operations
77.
EU cyber policy
78.
international cyber norms
79.
military cyber
80.
mobile cyber-physical system
81.
national cyber security strategy
82.
NATO Cyber Range
83.
Offensive Cyber Operations
84.
responsive cyber defence
85.
Socio-Cyber-Physical Systems
86.
technical cyber exercise
87.
at-risk-of-poverty rates
88.
bank risk-taking
89.
bank-risk taking
90.
bankruptcy risk
91.
cancer risk
92.
cardiovascular risk
93.
Cardiovascular risk assessment
94.
cardiovascular risk factors
95.
climatic risk
96.
coastal risk index
97.
conditional value at risk (CVaR)
98.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
99.
credit risk
100.
credit risk determinants
101.
disaster risk reduction
102.
ecological risk assessment
103.
Economic risk
104.
elimination of risk
105.
environmental risk
106.
environmental risk assessment
107.
ESG risk
108.
farmer's risk criterion
109.
fish injury and mortality risk
110.
flood risk management
111.
health risk
112.
heart disease risk factors
113.
infection risk
114.
infection risk-based ventilation
115.
insurance risk
116.
kardiovaskulaarne risk
117.
knowledge risk
118.
knowledge risk management
119.
knowledge risk management (KRM)
120.
knowledge risk management in banking
121.
knowledge risk management in construction
122.
knowledge risk management in SMEs
123.
military environment risk assessment
124.
models for risk assessment
125.
mould growth risk
126.
mould risk
127.
multi-risk/multi-criteria
128.
operational knowledge risk
129.
overheating risk
130.
perceived risk
131.
Polygenic risk score
132.
portfolio risk hedging
133.
potential risk
134.
pre-symptomatic period risk control
135.
proactive risk management
136.
process risk
137.
project risk management
138.
psychosocial risk factors
139.
quantitative risk analysis
140.
reactive risk management
141.
residual cardiovascular risk
142.
risk
143.
risk group for mental disorders
144.
risk allocation
145.
risk analysis
146.
risk assessment
147.
risk assessment chemicals in the air
148.
risk assessments
149.
risk attitudes
150.
risk behavior
151.
risk classification
152.
risk evaluation model
153.
risk evaluation model development
154.
risk event chain analyses
155.
risk factors
156.
risk governance
157.
risk interdependence
158.
risk levels
159.
risk management
160.
risk management culture
161.
risk management in public organizations
162.
risk management model
163.
risk mitigation
164.
risk modelling
165.
risk of failure
166.
risk of mould growth
167.
risk prediction
168.
risk preference analysis
169.
risk prevention
170.
risk reduction
171.
risk stratification
172.
risk transfer
173.
risk-adjusted performance
174.
risk-based management
175.
risk-taking
176.
rrivacy risk assessment
177.
security risk assessment
178.
security risk management
179.
semi-quantitative risk assessment method
180.
situational risk awareness
181.
standalone risk
182.
supply chain risk
183.
supply chain risk management
184.
systemic risk
185.
value at risk
186.
vascular risk factors
187.
3D risk assesment
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
kardiovaskulaarne risk
5.
risk
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT