Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
30
Look more..
(2/224)
Export
export all inquiry results
(30)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
26
journal article
The Main challenges and barriers to the successful "Smart Shipping"
Alop, Anatoli
TransNav: International Journal on Marine Navigation and Safety of Sea Transportation
2019
/
p. 521-528
https://doi.org/10.12716/1001.13.03.05
journal article
27
journal article
The regulatory intersections between artificial intelligence, data protection and cyber security : challenges and opportunities for the EU legal framework
Andraško, Jozef
;
Mesarčik, Matuš
;
Hamulak, Ondrej
AI & Society
2021
/
p. 623–636
https://doi.org/10.1007/s00146-020-01125-5
journal article
28
book article
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
book article
29
book article EST
/
book article ENG
Towards an open-source intrusion detection system integration into marine vehicles
Visky, Gabor
;
Khisteva, Dariana
;
Vaarandi, Risto
;
Maennel, Olaf Manuel
2024 International Symposium ELMAR
Proceedings of ELMAR-2024 : 66th International Symposium ELMAR. 16-18 September 2024, Zadar, Croatia
2024
/
p. 263-268
https://doi.org/10.1109/ELMAR62909.2024.10694518
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Related publications
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
30
book article EST
/
book article ENG
Variable self-efficacy as a measurement for behaviors in cyber security operations
Lugo, Ricardo Gregorio
;
Knox, Benjamin James
;
Josok, Oyvind
;
Sütterlin, Stefan
Augmented Cognition. Human Cognition and Behavior : 14th International Conference, AC 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings, Part II
2020
/
p. 395-404
https://doi.org/10.1007/978-3-030-50439-7_27
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Number of records 30, displaying
26 - 30
previous
1
2
next
keyword
218
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security monitoring in maritime
6.
cyber security strategies
7.
cyber-security
8.
maritime cyber security
9.
maritime cyber security operations centers
10.
national cyber security strategy
11.
cyber-physical system security
12.
automated cyber defense
13.
autonomous vehicle cyber range
14.
cloud-based cyber-physical systems (C2PS)
15.
cognitive cyber warfare
16.
cyber
17.
Cyber “Maastricht”
18.
cyber architecture
19.
cyber attacks
20.
cyber battle damage assessment
21.
Cyber Bio-analytical Physical Systems (CBPSs)
22.
cyber challenge
23.
cyber command
24.
Cyber Command organisational structure
25.
cyber conflict
26.
cyber contingency
27.
cyber crime
28.
cyber crime pathways
29.
cyber crime scripting
30.
Cyber crisis management
31.
cyber defence
32.
cyber defence exercise
33.
cyber defence exercises
34.
cyber defense education
35.
cyber defense exercise
36.
cyber defense exercises
37.
cyber dependence
38.
cyber diplomacy
39.
cyber exercise
40.
cyber hygiene
41.
cyber impact assessment
42.
cyber incidents
43.
cyber insurance
44.
cyber intrusion detection
45.
cyber kill chain
46.
cyber operation
47.
cyber operation officer
48.
cyber operations
49.
cyber operations exercises
50.
cyber physical energy systems
51.
cyber physical power system (CPPS)
52.
Cyber Physical Production System
53.
cyber physical production systems (CPPS)
54.
cyber physical social system
55.
cyber physical social systems (cpss)
56.
cyber physical system
57.
Cyber Planning tool
58.
cyber power Europe
59.
cyber ranges
60.
cyber red teaming
61.
cyber resilience
62.
cyber resilience at sea
63.
cyber risk
64.
cyber risk management in shipping
65.
cyber situational awareness
66.
cyber stability
67.
cyber team communication
68.
cyber threat
69.
cyber threat communication
70.
Cyber Threat Intelligence
71.
cyber threats
72.
cyber war
73.
cyber warfare
74.
cyber warriors
75.
cyber weapons
76.
cyber-attack
77.
cyber-attack pathways
78.
Cyber-attacks
79.
cyber-insurance
80.
cyber-paternalism
81.
cyber-physical energy systems
82.
cyber-physical social system (CPSS)
83.
cyber-physical system
84.
Cyber-Physical System (CPS)
85.
cyber-physical system logistic robot
86.
cyber-physical systems
87.
Cyber-Physical Systems (CPS)
88.
cyber-risks
89.
cyber-space nexus
90.
cyber-vulnerabilities
91.
Defensive Cyber Operations
92.
EU cyber policy
93.
international cyber norms
94.
military cyber
95.
mobile cyber-physical system
96.
NATO cyber operations definitions
97.
NATO Cyber Range
98.
Offensive Cyber Operations
99.
perceived cyber risks and threats
100.
responsive cyber defence
101.
Socio-Cyber-Physical Systems
102.
space cyber range
103.
technical cyber exercise
104.
Visualising Cyber Planning
105.
ad-hoc sensor networks security
106.
Automatic Security Verification
107.
Blockchain security
108.
cache security
109.
cloud security
110.
communication system security
111.
comprehensive system of economic security
112.
computer security
113.
cooperative security dilemma
114.
data and information security
115.
data security
116.
development of security cameras
117.
digital security practices
118.
drinking water security
119.
economic security
120.
economic security of enterprise
121.
emotional security
122.
energy security
123.
energy security indicator
124.
Estonian information security standard
125.
graded security
126.
hardware security
127.
hardware security primitive
128.
high level of security
129.
Homeland security
130.
human security
131.
information security
132.
information security and privacy
133.
initial level of security
134.
internal security
135.
international security
136.
investment and innovation security
137.
IPv6 security
138.
IT security
139.
IT security management
140.
job security
141.
long-term security
142.
Maritime Security Operations Center (M-SOC)
143.
medium level of security
144.
metadata model for security measures
145.
Middle Eastern security
146.
Mobile security
147.
national security
148.
NATO. Science for Peace and Security Program
149.
network security
150.
network security monitoring
151.
OSCE (Organization for Security and Co-operation in Europe)
152.
passenger’s security
153.
policy-based routing security
154.
political and security cultures
155.
post-quantum security
156.
power system security
157.
quantitative security
158.
regional security
159.
RISC-V Security Verification
160.
Safety and Security in Sea Transportation
161.
safety and security testing
162.
security
163.
security adaptation
164.
security alert prioritization
165.
security analysis
166.
security and justice (AFSJ)
167.
Security and political science
168.
security and privacy
169.
security and privacy in smart grids
170.
Security Assertion
171.
Security Assertion Mining
172.
security closure
173.
Security Coverage
174.
security dataset
175.
security dilemma
176.
Security evaluation
177.
security evaluation instruments
178.
Security Level Evaluation
179.
Security limitations
180.
security log analysis
181.
security management
182.
security model
183.
security monitoring
184.
security notion
185.
security objectives
186.
security of data
187.
security of supply
188.
security operation center
189.
security operations center
190.
security patterns
191.
security policy
192.
security problem definition
193.
security proof
194.
security protocols
195.
security requirements
196.
security requirements engineering
197.
security research
198.
security risk assessment
199.
security risk management
200.
security risks
201.
security science and technology
202.
security strategies
203.
security systems for military objects
204.
security testing
205.
security training
206.
security verification
207.
security-by-design
208.
social security planning
209.
societal security
210.
software security
211.
software security level
212.
software security subcharacteristics
213.
sufficient level of security
214.
system of economic security
215.
system security
216.
terrorism security
217.
transmission System Security
218.
voting privacy and security
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT