Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security monitoring (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/345)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Literature review: Cyber security monitoring in maritime
Vaarandi, Risto
;
Tsiopoulos, Leonidas
;
Visky, Gabor
;
Ur Rehman, Muaan
;
Bahsi, Hayretdin
arXiv.org
2025
/
22 p. : ill
https://doi.org/10.48550/arXiv.2503.18173
journal article
2
journal article EST
/
journal article ENG
A systematic literature review of cyber security monitoring in maritime
Vaarandi, Risto
;
Tsiopoulos, Leonidas
;
Visky, Gabor
;
Rehman, Muaan Ur
;
Bahsi, Hayretdin
IEEE Access
2025
/
p. 85307-85329
https://doi.org/10.1109/ACCESS.2025.3567385
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
Number of records 2, displaying
1 - 2
keyword
334
1.
cyber security monitoring
2.
cyber security monitoring in maritime
3.
cyber security
4.
cyber security education
5.
cyber security exercises
6.
cyber security strategies
7.
cyber-physical system security
8.
cyber-security
9.
maritime cyber security
10.
maritime cyber security operations centers
11.
national cyber security strategy
12.
network security monitoring
13.
security monitoring
14.
automated cyber defense
15.
autonomous vehicle cyber range
16.
cloud-based cyber-physical systems (C2PS)
17.
cognitive cyber warfare
18.
cyber
19.
Cyber “Maastricht”
20.
cyber architecture
21.
cyber attacks
22.
cyber battle damage assessment
23.
Cyber Bio-analytical Physical Systems (CBPSs)
24.
cyber challenge
25.
cyber command
26.
Cyber Command organisational structure
27.
cyber conflict
28.
cyber contingency
29.
cyber crime
30.
cyber crime pathways
31.
cyber crime scripting
32.
Cyber crisis management
33.
cyber defence
34.
cyber defence exercise
35.
cyber defence exercises
36.
cyber defense education
37.
cyber defense exercise
38.
cyber defense exercises
39.
cyber dependence
40.
cyber diplomacy
41.
cyber exercise
42.
cyber hygiene
43.
cyber impact assessment
44.
cyber incidents
45.
cyber insurance
46.
cyber intrusion detection
47.
cyber kill chain
48.
cyber operation
49.
cyber operation officer
50.
cyber operations
51.
cyber operations exercises
52.
cyber physical energy systems
53.
cyber physical power system (CPPS)
54.
Cyber Physical Production System
55.
cyber physical production systems (CPPS)
56.
cyber physical social system
57.
cyber physical social systems (cpss)
58.
cyber physical system
59.
Cyber Planning tool
60.
cyber power Europe
61.
cyber ranges
62.
cyber red teaming
63.
cyber resilience
64.
cyber resilience at sea
65.
cyber risk
66.
cyber risk management in shipping
67.
cyber situational awareness
68.
cyber stability
69.
cyber team communication
70.
cyber threat
71.
cyber threat communication
72.
Cyber Threat Intelligence
73.
cyber threats
74.
cyber war
75.
cyber warfare
76.
cyber warriors
77.
cyber weapons
78.
cyber-attack
79.
cyber-attack pathways
80.
Cyber-attacks
81.
cyber-insurance
82.
cyber-paternalism
83.
cyber-physical energy systems
84.
cyber-physical social system (CPSS)
85.
cyber-physical system
86.
Cyber-Physical System (CPS)
87.
cyber-physical system logistic robot
88.
cyber-physical systems
89.
Cyber-Physical Systems (CPS)
90.
cyber-risks
91.
cyber-space nexus
92.
cyber-vulnerabilities
93.
Defensive Cyber Operations
94.
EU cyber policy
95.
international cyber norms
96.
military cyber
97.
mobile cyber-physical system
98.
NATO cyber operations definitions
99.
NATO Cyber Range
100.
Offensive Cyber Operations
101.
perceived cyber risks and threats
102.
responsive cyber defence
103.
Socio-Cyber-Physical Systems
104.
space cyber range
105.
technical cyber exercise
106.
Visualising Cyber Planning
107.
ad-hoc sensor networks security
108.
Automatic Security Verification
109.
Blockchain security
110.
cache security
111.
cloud security
112.
communication system security
113.
comprehensive system of economic security
114.
computer security
115.
cooperative security dilemma
116.
data and information security
117.
data security
118.
development of security cameras
119.
digital security practices
120.
drinking water security
121.
economic security
122.
economic security of enterprise
123.
emotional security
124.
energy security
125.
energy security indicator
126.
Estonian information security standard
127.
graded security
128.
hardware security
129.
hardware security primitive
130.
high level of security
131.
Homeland security
132.
human security
133.
information security
134.
information security and privacy
135.
initial level of security
136.
internal security
137.
international security
138.
investment and innovation security
139.
IPv6 security
140.
IT security
141.
IT security management
142.
job security
143.
long-term security
144.
Maritime Security Operations Center (M-SOC)
145.
medium level of security
146.
metadata model for security measures
147.
Middle Eastern security
148.
Mobile security
149.
national security
150.
NATO. Science for Peace and Security Program
151.
network security
152.
OSCE (Organization for Security and Co-operation in Europe)
153.
passenger’s security
154.
policy-based routing security
155.
political and security cultures
156.
post-quantum security
157.
power system security
158.
quantitative security
159.
regional security
160.
RISC-V Security Verification
161.
Safety and Security in Sea Transportation
162.
safety and security testing
163.
security
164.
security adaptation
165.
security alert prioritization
166.
security analysis
167.
security and justice (AFSJ)
168.
Security and political science
169.
security and privacy
170.
security and privacy in smart grids
171.
Security Assertion
172.
Security Assertion Mining
173.
security closure
174.
Security Coverage
175.
security dataset
176.
security dilemma
177.
Security evaluation
178.
security evaluation instruments
179.
Security Level Evaluation
180.
Security limitations
181.
security log analysis
182.
security management
183.
security model
184.
security notion
185.
security objectives
186.
security of data
187.
security of supply
188.
security operation center
189.
security operations center
190.
security patterns
191.
security policy
192.
security problem definition
193.
security proof
194.
security protocols
195.
security requirements
196.
security requirements engineering
197.
security research
198.
security risk assessment
199.
security risk management
200.
security risks
201.
security science and technology
202.
security strategies
203.
security systems for military objects
204.
security testing
205.
security training
206.
security verification
207.
security-by-design
208.
social security planning
209.
societal security
210.
software security
211.
software security level
212.
software security subcharacteristics
213.
sufficient level of security
214.
system of economic security
215.
system security
216.
terrorism security
217.
transmission System Security
218.
voting privacy and security
219.
ambulatory blood pressure monitoring
220.
automated decision and monitoring mechanisms
221.
Baltic Sea monitoring
222.
Baltic-wide HELCOM COMBINE monitoring program
223.
bi-directional fault monitoring devices
224.
biological monitoring
225.
biomedical monitoring
226.
biosignal monitoring
227.
cardiac monitoring
228.
CO2 monitoring
229.
coastal monitoring
230.
condition monitoring
231.
condition monitoring system
232.
continuous monitoring
233.
Copernicus Marine Environment Monitoring Service
234.
corporate performance monitoring system
235.
corrosion monitoring
236.
data-driven condition monitoring
237.
deformation monitoring
238.
diagnosis and performance monitoring
239.
Distributed flow monitoring
240.
distributed monitoring
241.
distributed online monitoring
242.
disturbance monitoring
243.
drone-based traffic monitoring
244.
drug monitoring
245.
e-monitoring
246.
Environmental compliance monitoring
247.
environmental monitoring
248.
fault monitoring
249.
field monitoring
250.
fish monitoring
251.
GHB monitoring
252.
groundwater monitoring
253.
haemodialysis monitoring
254.
health monitoring
255.
healthcare monitoring
256.
hemodialysis monitoring
257.
home blood pressure monitoring
258.
home monitoring
259.
industrial monitoring
260.
infrastructure monitoring
261.
in-situ monitoring
262.
integrated hemodynamic monitoring
263.
interactive monitoring
264.
IoT-based monitoring
265.
laboratory monitoring
266.
landfill monitoring
267.
load monitoring
268.
long term monitoring
269.
long-term monitoring
270.
machine condition monitoring
271.
machinery monitoring
272.
Magnetic induction monitoring
273.
marine microplastic monitoring
274.
marine monitoring
275.
monitoring
276.
monitoring and application design
277.
monitoring and detection
278.
monitoring and prognosis
279.
monitoring deformations
280.
monitoring program
281.
monitoring RIS3 observatory
282.
monitoring system
283.
monitoring the health patients
284.
NetFlow based network monitoring
285.
network monitoring
286.
Non-intrusive load monitoring
287.
non-intrusive load monitoring (NILM)
288.
ocean monitoring
289.
online monitoring
290.
on-line monitoring
291.
optical monitoring
292.
passive acoustic monitoring
293.
patient monitoring
294.
performance monitoring
295.
periodic monitoring
296.
pollen monitoring
297.
power quality monitoring
298.
PQM (Power Quality Monitoring)
299.
process monitoring
300.
production monitoring
301.
production monitoring system
302.
production monitoring system (PLM)
303.
production monitoring system (PMS)
304.
production monitoring systems (PMS)
305.
project-monitoring
306.
quality monitoring
307.
real time monitoring process
308.
real-time collision monitoring
309.
real-time monitoring
310.
remote monitoring
311.
remote patient monitoring
312.
respiratory monitoring
313.
RIS3 evaluation and monitoring
314.
road surface condition monitoring
315.
sea monitoring
316.
sensor monitoring
317.
sensor respiratory monitoring
318.
smart materials with structural health monitoring capabilities
319.
smart monitoring
320.
SoC health monitoring
321.
stormwater monitoring
322.
structural health monitoring
323.
surface water monitoring
324.
susceptibility monitoring
325.
system monitoring
326.
terms—production environment monitoring
327.
the accuracy of monitoring in analysis of impact impulses
328.
The Baltic Monitoring and Forecasting Centre (BAL MFC)
329.
traffic behavior monitoring
330.
treatment monitoring
331.
water pollution monitoring
332.
water quality monitoring
333.
wearable health monitoring
334.
wide area monitoring
subject term
11
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
7.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
8.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
9.
Baltic Monitoring and Forecasting Center (BALMFC)
10.
Copernicus Marine Environment Monitoring Service (CMEMS)
11.
MyOcean Baltic Sea Monitoring and Forecasting Centre
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT