Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
cybersecurity knowledge requirements (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
Ă—
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/187)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Cybersecurity knowledge requirements for strategic level decision makers
Garcia-Granados, F.
;
Bahsi, Hayretdin
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 559-568
https://doi.org/
book article
Number of records 1, displaying
1 - 1
keyword
187
1.
cybersecurity knowledge requirements
2.
automotive cybersecurity
3.
cybersecurity
4.
cybersecurity (CS)
5.
cybersecurity awareness
6.
cybersecurity behaviors
7.
cybersecurity breach
8.
cybersecurity components
9.
cybersecurity education
10.
cybersecurity exercises
11.
cybersecurity gender balance
12.
cybersecurity governance
13.
cybersecurity in shipping
14.
cybersecurity incident response
15.
cybersecurity law
16.
cybersecurity market demand
17.
cybersecurity maturity tool development for schools
18.
cybersecurity policy
19.
cybersecurity practical training
20.
cybersecurity simulations
21.
cybersecurity skills gap
22.
cybersecurity standards
23.
cybersecurity test bed
24.
cybersecurity testing
25.
cybersecurity training
26.
cybersecurity workforce development
27.
cybersecurity vulnerability
28.
EU cybersecurity policy
29.
European cybersecurity capacity building
30.
European Cybersecurity Skills Framework (ECSF)
31.
European Union Agency for Cybersecurity (ENISA)
32.
human factor of cybersecurity
33.
human factors in cybersecurity
34.
maritime cybersecurity
35.
maritime cybersecurity certification teaching
36.
organising cybersecurity exercises
37.
port cybersecurity
38.
responsibility/penalty for a cybersecurity breach
39.
set of possible cybersecurity breaches
40.
core ontology requirements
41.
energy performance minimum requirements
42.
functional requirements
43.
grid connection requirements
44.
industrial IT requirements
45.
isolation requirements
46.
min. requirements
47.
minimum requirements
48.
national requirements
49.
nZEB requirements
50.
nutrient requirements
51.
ontology requirements
52.
requirements
53.
requirements bazaar
54.
requirements elicitation
55.
requirements engineering
56.
requirements feedback
57.
requirements gathering
58.
requirements modelling
59.
security requirements
60.
security requirements engineering
61.
User Requirements
62.
absolutist knowledge
63.
Actionable knowledge
64.
collaborative knowledge production
65.
computerised knowledge work
66.
customer knowledge sharing
67.
data mining and knowledge discovery
68.
differentiated knowledge base
69.
diffusion of knowledge
70.
diffusion of knowledge
71.
expert knowledge
72.
global knowledge warfare
73.
hiding knowledge
74.
inclusiv knowledge management
75.
Indigenous knowledge systems
76.
integrated and networked knowledge generating systems
77.
international knowledge transfer
78.
knowledge
79.
knowledge absorptive capacity
80.
knowledge abstraction
81.
knowledge and innovation
82.
knowledge and skills
83.
knowledge base
84.
knowledge based economy
85.
knowledge based manufacturing
86.
knowledge based systems
87.
knowledge bases
88.
knowledge brokering
89.
knowledge challenges
90.
knowledge contribution
91.
knowledge creation
92.
knowledge diffusion
93.
knowledge discovery
94.
knowledge discovery and data mining
95.
knowledge discovery in databases
96.
knowledge distillation
97.
knowledge driven manufacturing
98.
knowledge economy
99.
knowledge employees
100.
knowledge engineering
101.
knowledge exchange
102.
knowledge exploitation
103.
knowledge extraction
104.
knowledge flows
105.
knowledge fusion
106.
knowledge gathering
107.
knowledge generation
108.
knowledge graph
109.
knowledge graph embeddings
110.
knowledge hiding
111.
knowledge hiding behavior
112.
knowledge integration
113.
knowledge intensive enterprises
114.
knowledge leakage
115.
knowledge loss
116.
knowledge management
117.
knowledge management (KM)
118.
knowledge management in production
119.
Knowledge management system
120.
knowledge management systems (KMS)
121.
knowledge map
122.
knowledge network
123.
knowledge networks
124.
knowledge of brand origins
125.
knowledge overload
126.
knowledge perception
127.
knowledge processing
128.
knowledge recovery
129.
knowledge representation
130.
knowledge retention
131.
knowledge retention and higher education
132.
Knowledge retrieval
133.
knowledge risk
134.
knowledge risk management
135.
knowledge risk management (KRM)
136.
knowledge risk management in banking
137.
knowledge risk management in construction
138.
knowledge risk management in SMEs
139.
knowledge risks
140.
knowledge risks in health-care organizations
141.
knowledge sharing
142.
knowledge sourcing
143.
knowledge systems
144.
knowledge transfer
145.
knowledge translation
146.
knowledge warfare
147.
knowledge withholding
148.
knowledge workers
149.
knowledge-based design
150.
knowledge-based economy
151.
knowledge-based manufacturing
152.
knowledge-based system
153.
knowledge-based systems
154.
knowledge-basedfirms
155.
knowledge-inquiry
156.
knowledge-intensive business service (KIBS)
157.
knowledge-intensive business services
158.
knowledge-intensive service activities (KISA)
159.
knowledge-intensivefirms
160.
knowledge-management
161.
Local ecological knowledge
162.
logistics knowledge areas
163.
management knowledge
164.
nursing knowledge
165.
operational knowledge risk
166.
organisational knowledge
167.
organizations knowledge
168.
personal health knowledge graph
169.
personal knowledge management
170.
policy-relevant knowledge
171.
responsible knowledge
172.
responsible knowledge management
173.
risks knowledge risks
174.
safety knowledge
175.
scientific knowledge
176.
shared knowledge authentication
177.
symbolic knowledge
178.
symbolic knowledge in Husserlian pure logic
179.
zero-knowledge
180.
zero-knowledge proof
181.
Zero-knowledge proofs
182.
task knowledge patterns
183.
teachers’ knowledge base
184.
Traditional ecological knowledge
185.
traditional knowledge
186.
transfer of knowledge
187.
withholding knowledge
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT