Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
cyber security (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
30
Look more..
(2/222)
Export
export all inquiry results
(30)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
26
journal article
The Main challenges and barriers to the successful "Smart Shipping"
Alop, Anatoli
TransNav: International Journal on Marine Navigation and Safety of Sea Transportation
2019
/
p. 521-528
https://doi.org/10.12716/1001.13.03.05
journal article
27
journal article
The regulatory intersections between artificial intelligence, data protection and cyber security : challenges and opportunities for the EU legal framework
Andraško, Jozef
;
Mesarčik, Matuš
;
Hamulak, Ondrej
AI & Society
2021
/
p. 623–636
https://doi.org/10.1007/s00146-020-01125-5
journal article
28
book article
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
book article
29
book article EST
/
book article ENG
Towards an open-source intrusion detection system integration into marine vehicles
Visky, Gabor
;
Khisteva, Dariana
;
Vaarandi, Risto
;
Maennel, Olaf Manuel
2024 International Symposium ELMAR
Proceedings of ELMAR-2024 : 66th International Symposium ELMAR. 16-18 September 2024, Zadar, Croatia
2024
/
p. 263-268
https://doi.org/10.1109/ELMAR62909.2024.10694518
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Related publications
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
30
book article EST
/
book article ENG
Variable self-efficacy as a measurement for behaviors in cyber security operations
Lugo, Ricardo Gregorio
;
Knox, Benjamin James
;
Josok, Oyvind
;
Sütterlin, Stefan
Augmented Cognition. Human Cognition and Behavior : 14th International Conference, AC 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings, Part II
2020
/
p. 395-404
https://doi.org/10.1007/978-3-030-50439-7_27
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Number of records 30, displaying
26 - 30
previous
1
2
next
keyword
216
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security strategies
6.
cyber-security
7.
maritime cyber security
8.
maritime cyber security operations centers
9.
national cyber security strategy
10.
cyber-physical system security
11.
autonomous vehicle cyber range
12.
cloud-based cyber-physical systems (C2PS)
13.
cognitive cyber warfare
14.
cyber
15.
Cyber “Maastricht”
16.
cyber architecture
17.
cyber attacks
18.
cyber battle damage assessment
19.
Cyber Bio-analytical Physical Systems (CBPSs)
20.
cyber challenge
21.
cyber command
22.
Cyber Command organisational structure
23.
cyber conflict
24.
cyber contingency
25.
cyber crime
26.
cyber crime pathways
27.
cyber crime scripting
28.
Cyber crisis management
29.
cyber defence
30.
cyber defence exercise
31.
cyber defence exercises
32.
cyber defense education
33.
cyber defense exercise
34.
cyber defense exercises
35.
cyber dependence
36.
cyber diplomacy
37.
cyber exercise
38.
cyber hygiene
39.
cyber impact assessment
40.
cyber incidents
41.
cyber insurance
42.
cyber intrusion detection
43.
cyber kill chain
44.
cyber operation
45.
cyber operation officer
46.
cyber operations
47.
cyber operations exercises
48.
cyber physical energy systems
49.
cyber physical power system (CPPS)
50.
Cyber Physical Production System
51.
cyber physical production systems (CPPS)
52.
cyber physical social system
53.
cyber physical social systems (cpss)
54.
cyber physical system
55.
Cyber Planning tool
56.
cyber power Europe
57.
cyber ranges
58.
cyber red teaming
59.
cyber resilience
60.
cyber resilience at sea
61.
cyber risk
62.
cyber risk management in shipping
63.
cyber situational awareness
64.
cyber stability
65.
cyber team communication
66.
cyber threat
67.
cyber threat communication
68.
Cyber Threat Intelligence
69.
cyber threats
70.
cyber war
71.
cyber warfare
72.
cyber warriors
73.
cyber weapons
74.
cyber-attack
75.
cyber-attack pathways
76.
Cyber-attacks
77.
cyber-insurance
78.
cyber-paternalism
79.
cyber-physical energy systems
80.
cyber-physical social system (CPSS)
81.
cyber-physical system
82.
Cyber-Physical System (CPS)
83.
cyber-physical system logistic robot
84.
cyber-physical systems
85.
Cyber-Physical Systems (CPS)
86.
cyber-risks
87.
cyber-space nexus
88.
cyber-vulnerabilities
89.
Defensive Cyber Operations
90.
EU cyber policy
91.
international cyber norms
92.
military cyber
93.
mobile cyber-physical system
94.
NATO cyber operations definitions
95.
NATO Cyber Range
96.
Offensive Cyber Operations
97.
perceived cyber risks and threats
98.
responsive cyber defence
99.
Socio-Cyber-Physical Systems
100.
space cyber range
101.
technical cyber exercise
102.
Visualising Cyber Planning
103.
ad-hoc sensor networks security
104.
Automatic Security Verification
105.
Blockchain security
106.
cache security
107.
cloud security
108.
communication system security
109.
comprehensive system of economic security
110.
computer security
111.
cooperative security dilemma
112.
data and information security
113.
data security
114.
development of security cameras
115.
digital security practices
116.
drinking water security
117.
economic security
118.
economic security of enterprise
119.
emotional security
120.
energy security
121.
energy security indicator
122.
Estonian information security standard
123.
graded security
124.
hardware security
125.
hardware security primitive
126.
high level of security
127.
Homeland security
128.
human security
129.
information security
130.
information security and privacy
131.
initial level of security
132.
internal security
133.
international security
134.
investment and innovation security
135.
IPv6 security
136.
IT security
137.
IT security management
138.
job security
139.
long-term security
140.
Maritime Security Operations Center (M-SOC)
141.
medium level of security
142.
metadata model for security measures
143.
Middle Eastern security
144.
Mobile security
145.
national security
146.
NATO. Science for Peace and Security Program
147.
network security
148.
network security monitoring
149.
OSCE (Organization for Security and Co-operation in Europe)
150.
passenger’s security
151.
policy-based routing security
152.
political and security cultures
153.
post-quantum security
154.
power system security
155.
quantitative security
156.
regional security
157.
RISC-V Security Verification
158.
Safety and Security in Sea Transportation
159.
safety and security testing
160.
security
161.
security adaptation
162.
security alert prioritization
163.
security analysis
164.
security and justice (AFSJ)
165.
Security and political science
166.
security and privacy
167.
security and privacy in smart grids
168.
Security Assertion
169.
Security Assertion Mining
170.
security closure
171.
Security Coverage
172.
security dataset
173.
security dilemma
174.
Security evaluation
175.
security evaluation instruments
176.
Security Level Evaluation
177.
Security limitations
178.
security log analysis
179.
security management
180.
security model
181.
security monitoring
182.
security notion
183.
security objectives
184.
security of data
185.
security of supply
186.
security operation center
187.
security operations center
188.
security patterns
189.
security policy
190.
security problem definition
191.
security proof
192.
security protocols
193.
security requirements
194.
security requirements engineering
195.
security research
196.
security risk assessment
197.
security risk management
198.
security risks
199.
security science and technology
200.
security strategies
201.
security systems for military objects
202.
security testing
203.
security training
204.
security verification
205.
security-by-design
206.
social security planning
207.
societal security
208.
software security
209.
software security level
210.
software security subcharacteristics
211.
sufficient level of security
212.
system of economic security
213.
system security
214.
terrorism security
215.
transmission System Security
216.
voting privacy and security
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT