Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
29
Look more..
(2/202)
Export
export all inquiry results
(29)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
26
journal article
The regulatory intersections between artificial intelligence, data protection and cyber security : challenges and opportunities for the EU legal framework
Andraško, Jozef
;
Mesarčik, Matuš
;
Hamulak, Ondrej
AI & Society
2021
/
p. 623–636
https://doi.org/10.1007/s00146-020-01125-5
journal article
27
book article
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
book article
28
book article EST
/
book article ENG
Towards an open-source intrusion detection system integration into marine vehicles
Visky, Gabor
;
Khisteva, Dariana
;
Vaarandi, Risto
;
Maennel, Olaf Manuel
2024 International Symposium ELMAR
Proceedings of ELMAR-2024 : 66th International Symposium ELMAR. 16-18 September 2024, Zadar, Croatia
2024
/
p. 263-268
https://doi.org/10.1109/ELMAR62909.2024.10694518
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Related publications
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
29
book article EST
/
book article ENG
Variable self-efficacy as a measurement for behaviors in cyber security operations
Lugo, Ricardo Gregorio
;
Knox, Benjamin James
;
Josok, Oyvind
;
Sütterlin, Stefan
Augmented Cognition. Human Cognition and Behavior : 14th International Conference, AC 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings, Part II
2020
/
p. 395-404
https://doi.org/10.1007/978-3-030-50439-7_27
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Number of records 29, displaying
26 - 29
previous
1
2
next
keyword
197
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security strategies
6.
cyber-security
7.
national cyber security strategy
8.
autonomous vehicle cyber range
9.
cloud-based cyber-physical systems (C2PS)
10.
cognitive cyber warfare
11.
cyber
12.
Cyber “Maastricht”
13.
cyber architecture
14.
cyber attacks
15.
cyber battle damage assessment
16.
Cyber Bio-analytical Physical Systems (CBPSs)
17.
cyber challenge
18.
cyber command
19.
Cyber Command organisational structure
20.
cyber conflict
21.
cyber contingency
22.
cyber crime
23.
cyber crime pathways
24.
cyber crime scripting
25.
Cyber crisis management
26.
cyber defence
27.
cyber defence exercise
28.
cyber defence exercises
29.
cyber defense education
30.
cyber defense exercise
31.
cyber defense exercises
32.
cyber dependence
33.
cyber diplomacy
34.
cyber exercise
35.
cyber hygiene
36.
cyber impact assessment
37.
cyber incidents
38.
cyber insurance
39.
cyber intrusion detection
40.
cyber kill chain
41.
cyber operation
42.
cyber operation officer
43.
cyber operations
44.
cyber operations exercises
45.
cyber physical energy systems
46.
cyber physical power system (CPPS)
47.
Cyber Physical Production System
48.
cyber physical production systems (CPPS)
49.
cyber physical social system
50.
cyber physical social systems (cpss)
51.
cyber physical system
52.
cyber power Europe
53.
cyber ranges
54.
cyber red teaming
55.
cyber resilience
56.
cyber risk
57.
cyber situational awareness
58.
cyber stability
59.
cyber team communication
60.
cyber threat
61.
cyber threat communication
62.
Cyber Threat Intelligence
63.
cyber threats
64.
cyber war
65.
cyber warfare
66.
cyber warriors
67.
cyber weapons
68.
cyber-attack
69.
cyber-attack pathways
70.
Cyber-attacks
71.
cyber-insurance
72.
cyber-paternalism
73.
cyber-physical energy systems
74.
cyber-physical social system (CPSS)
75.
cyber-physical system
76.
Cyber-Physical System (CPS)
77.
cyber-physical system logistic robot
78.
cyber-physical systems
79.
Cyber-Physical Systems (CPS)
80.
cyber-risks
81.
cyber-space nexus
82.
cyber-vulnerabilities
83.
Defensive Cyber Operations
84.
EU cyber policy
85.
international cyber norms
86.
military cyber
87.
mobile cyber-physical system
88.
NATO cyber operations definitions
89.
NATO Cyber Range
90.
Offensive Cyber Operations
91.
perceived cyber risks and threats
92.
responsive cyber defence
93.
Socio-Cyber-Physical Systems
94.
space cyber range
95.
technical cyber exercise
96.
ad-hoc sensor networks security
97.
Automatic Security Verification
98.
Blockchain security
99.
cache security
100.
communication system security
101.
comprehensive system of economic security
102.
computer security
103.
cooperative security dilemma
104.
data and information security
105.
data security
106.
development of security cameras
107.
digital security practices
108.
drinking water security
109.
economic security
110.
economic security of enterprise
111.
emotional security
112.
energy security
113.
energy security indicator
114.
Estonian information security standard
115.
graded security
116.
hardware security
117.
hardware security primitive
118.
Homeland security
119.
human security
120.
information security
121.
information security and privacy
122.
internal security
123.
international security
124.
investment and innovation security
125.
IPv6 security
126.
IT security
127.
IT security management
128.
job security
129.
long-term security
130.
metadata model for security measures
131.
Middle Eastern security
132.
Mobile security
133.
national security
134.
NATO. Science for Peace and Security Program
135.
network security
136.
network security monitoring
137.
OSCE (Organization for Security and Co-operation in Europe)
138.
passenger’s security
139.
policy-based routing security
140.
political and security cultures
141.
post-quantum security
142.
power system security
143.
quantitative security
144.
regional security
145.
RISC-V Security Verification
146.
Safety and Security in Sea Transportation
147.
safety and security testing
148.
security
149.
security adaptation
150.
security alert prioritization
151.
security analysis
152.
security and justice (AFSJ)
153.
Security and political science
154.
security and privacy
155.
security and privacy in smart grids
156.
Security Assertion Mining
157.
security closure
158.
Security Coverage
159.
security dataset
160.
security dilemma
161.
Security evaluation
162.
security evaluation instruments
163.
Security limitations
164.
security log analysis
165.
security management
166.
security model
167.
security monitoring
168.
security notion
169.
security objectives
170.
security of data
171.
security of supply
172.
security operation center
173.
security operations center
174.
security patterns
175.
security policy
176.
security problem definition
177.
security proof
178.
security protocols
179.
security requirements
180.
security requirements engineering
181.
security risk assessment
182.
security risk management
183.
security risks
184.
security science and technology
185.
security strategies
186.
security systems for military objects
187.
security testing
188.
security training
189.
security verification
190.
security-by-design
191.
social security planning
192.
societal security
193.
system of economic security
194.
system security
195.
terrorism security
196.
transmission System Security
197.
voting privacy and security
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT