Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
maritime cyber security (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(3/282)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
A National Maritime Cyber Security Operations Center (M-SOC) Concept
Oruc, Aybars
;
Bauk, Sanja
;
Zhou, Jianying
Journal of Marine Science and Engineering
2026
/
art. 17
https://doi.org/10.3390/jmse14010017
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
273
1.
maritime cyber security
2.
maritime cyber security operations centers
3.
maritime cybersecurity
4.
maritime cybersecurity certification teaching
5.
Maritime Security Operations Center (M-SOC)
6.
cyber security
7.
cyber security education
8.
cyber security exercises
9.
cyber security monitoring
10.
cyber security strategies
11.
cyber-security
12.
national cyber security strategy
13.
Autonomous Maritime Surveillance System (AMSS)
14.
Estonian maritime cluster
15.
Estonian maritime defence
16.
European Maritime Safety Agency
17.
Global Maritime Distress and Safety system (GMDSS)
18.
higher maritime education institutions
19.
International Maritime Organization (IMO)
20.
maritime
21.
maritime accidents
22.
maritime activities
23.
maritime affairs
24.
Maritime automation
25.
maritime autonomous systems
26.
Maritime cluster
27.
maritime clusters
28.
maritime communications
29.
maritime connectivity
30.
maritime decarbonization
31.
maritime defence
32.
Maritime digital transformation
33.
maritime economics
34.
maritime economy
35.
Maritime education
36.
maritime education and training
37.
maritime education concept
38.
maritime energy contract
39.
maritime environment
40.
maritime environmental governance
41.
maritime fleet management
42.
maritime higher education and training (MHET)
43.
maritime industries
44.
maritime industry
45.
maritime infrastructure
46.
maritime innovation management
47.
maritime investment theory
48.
maritime investments
49.
maritime logistic
50.
maritime logistics
51.
maritime mindset
52.
maritime navigation
53.
maritime navigation safety
54.
maritime occupational health
55.
maritime occupational health and safety
56.
maritime policy
57.
maritime pollution
58.
maritime port management
59.
maritime regulation
60.
maritime safety
61.
maritime sector
62.
maritime situation awareness
63.
maritime solutions
64.
maritime spatial planning
65.
maritime traffic analytics
66.
maritime transition
67.
maritime transport
68.
maritime transportation
69.
national maritime defence
70.
Swedish Maritime Competence Centre
71.
The Global Maritime Professional
72.
autonomous vehicle cyber range
73.
cloud-based cyber-physical systems (C2PS)
74.
cognitive cyber warfare
75.
cyber
76.
Cyber “Maastricht”
77.
cyber architecture
78.
cyber attacks
79.
cyber battle damage assessment
80.
Cyber Bio-analytical Physical Systems (CBPSs)
81.
cyber challenge
82.
cyber command
83.
Cyber Command organisational structure
84.
cyber conflict
85.
cyber contingency
86.
cyber crime
87.
cyber crime pathways
88.
cyber crime scripting
89.
Cyber crisis management
90.
cyber defence
91.
cyber defence exercise
92.
cyber defence exercises
93.
cyber defense education
94.
cyber defense exercise
95.
cyber defense exercises
96.
cyber dependence
97.
cyber diplomacy
98.
cyber exercise
99.
cyber hygiene
100.
cyber impact assessment
101.
cyber incidents
102.
cyber insurance
103.
cyber intrusion detection
104.
cyber kill chain
105.
cyber operation
106.
cyber operation officer
107.
cyber operations
108.
cyber operations exercises
109.
cyber physical energy systems
110.
cyber physical power system (CPPS)
111.
Cyber Physical Production System
112.
cyber physical production systems (CPPS)
113.
cyber physical social system
114.
cyber physical social systems (cpss)
115.
cyber physical system
116.
Cyber Planning tool
117.
cyber power Europe
118.
cyber ranges
119.
cyber red teaming
120.
cyber resilience
121.
cyber resilience at sea
122.
cyber risk
123.
cyber risk management in shipping
124.
cyber situational awareness
125.
cyber stability
126.
cyber team communication
127.
cyber threat
128.
cyber threat communication
129.
Cyber Threat Intelligence
130.
cyber threats
131.
cyber war
132.
cyber warfare
133.
cyber warriors
134.
cyber weapons
135.
cyber-attack
136.
cyber-attack pathways
137.
Cyber-attacks
138.
cyber-insurance
139.
cyber-paternalism
140.
cyber-physical energy systems
141.
cyber-physical social system (CPSS)
142.
cyber-physical system
143.
Cyber-Physical System (CPS)
144.
cyber-physical system logistic robot
145.
cyber-physical systems
146.
Cyber-Physical Systems (CPS)
147.
cyber-risks
148.
cyber-space nexus
149.
cyber-vulnerabilities
150.
Defensive Cyber Operations
151.
EU cyber policy
152.
international cyber norms
153.
military cyber
154.
mobile cyber-physical system
155.
NATO cyber operations definitions
156.
NATO Cyber Range
157.
Offensive Cyber Operations
158.
perceived cyber risks and threats
159.
responsive cyber defence
160.
Socio-Cyber-Physical Systems
161.
space cyber range
162.
technical cyber exercise
163.
Visualising Cyber Planning
164.
ad-hoc sensor networks security
165.
Automatic Security Verification
166.
Blockchain security
167.
cache security
168.
communication system security
169.
comprehensive system of economic security
170.
computer security
171.
cooperative security dilemma
172.
data and information security
173.
data security
174.
development of security cameras
175.
digital security practices
176.
drinking water security
177.
economic security
178.
economic security of enterprise
179.
emotional security
180.
energy security
181.
energy security indicator
182.
Estonian information security standard
183.
graded security
184.
hardware security
185.
hardware security primitive
186.
high level of security
187.
Homeland security
188.
human security
189.
information security
190.
information security and privacy
191.
initial level of security
192.
internal security
193.
international security
194.
investment and innovation security
195.
IPv6 security
196.
IT security
197.
IT security management
198.
job security
199.
long-term security
200.
medium level of security
201.
metadata model for security measures
202.
Middle Eastern security
203.
Mobile security
204.
national security
205.
NATO. Science for Peace and Security Program
206.
network security
207.
network security monitoring
208.
OSCE (Organization for Security and Co-operation in Europe)
209.
passenger’s security
210.
policy-based routing security
211.
political and security cultures
212.
post-quantum security
213.
power system security
214.
quantitative security
215.
regional security
216.
RISC-V Security Verification
217.
Safety and Security in Sea Transportation
218.
safety and security testing
219.
security
220.
security adaptation
221.
security alert prioritization
222.
security analysis
223.
security and justice (AFSJ)
224.
Security and political science
225.
security and privacy
226.
security and privacy in smart grids
227.
Security Assertion Mining
228.
security closure
229.
Security Coverage
230.
security dataset
231.
security dilemma
232.
Security evaluation
233.
security evaluation instruments
234.
Security limitations
235.
security log analysis
236.
security management
237.
security model
238.
security monitoring
239.
security notion
240.
security objectives
241.
security of data
242.
security of supply
243.
security operation center
244.
security operations center
245.
security patterns
246.
security policy
247.
security problem definition
248.
security proof
249.
security protocols
250.
security requirements
251.
security requirements engineering
252.
security research
253.
security risk assessment
254.
security risk management
255.
security risks
256.
security science and technology
257.
security strategies
258.
security systems for military objects
259.
security testing
260.
security training
261.
security verification
262.
security-by-design
263.
social security planning
264.
societal security
265.
software security
266.
software security level
267.
software security subcharacteristics
268.
sufficient level of security
269.
system of economic security
270.
system security
271.
terrorism security
272.
transmission System Security
273.
voting privacy and security
subject term
8
1.
Federal Maritime and Hydrographic Agency (BSH)
2.
International Maritime Organization
3.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
4.
Cyber Battle
5.
Telia Cyber Battle of Estonia
6.
Telia Cyber Battle of Nordic-Baltics
7.
National Computer Security Incident Response Teams (N-CSIRTs)
8.
USS Security Eesti AS
TalTech department
1
1.
Estonian Maritime Academy
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT