Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber risk (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/197)
Export
export all inquiry results
(4)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications
Carlo, Antonio
;
Manti, Nebile Pelin
;
Bintang, A. S. W. A. M.
;
Casamassima, Francesca
;
Boschetti, Nicolo
;
Breda, Paola
;
Rahloff, Tobias
Journal of space safety engineering
2023
/
p. 474-482 : ill
https://doi.org/10.1016/j.jsse.2023.08.002
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
3
journal article EST
/
journal article ENG
Safeguarding the final frontier : analyzing the legal and technical challenges to mega-constellations
Jha, Devanshu
;
Manti, Nebile Pelin
;
Carlo, Antonio
;
Zarkan, Laetitia Cesari
;
Breda, Paola
;
Jha, Antara
Journal of space safety engineering
2022
/
p. 636-643
https://doi.org/10.1016/j.jsse.2022.08.006
Journal metrics at Scopus
Article at Scopus
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
4
journal article EST
/
journal article ENG
When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisis
Skierka-Canton, Isabel
Government information quarterly
2023
/
art. 101781, 12 p. : ill
https://doi.org/10.1016/j.giq.2022.101781
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
Number of records 4, displaying
1 - 4
keyword
192
1.
cyber risk
2.
cyber-risks
3.
perceived cyber risks and threats
4.
autonomous vehicle cyber range
5.
cloud-based cyber-physical systems (C2PS)
6.
cognitive cyber warfare
7.
cyber
8.
Cyber “Maastricht”
9.
cyber architecture
10.
cyber attacks
11.
cyber battle damage assessment
12.
Cyber Bio-analytical Physical Systems (CBPSs)
13.
cyber challenge
14.
cyber command
15.
cyber conflict
16.
cyber contingency
17.
cyber crime
18.
cyber crime pathways
19.
cyber crime scripting
20.
Cyber crisis management
21.
cyber defence
22.
cyber defence exercise
23.
cyber defence exercises
24.
cyber defense education
25.
cyber defense exercise
26.
cyber defense exercises
27.
cyber dependence
28.
cyber diplomacy
29.
cyber exercise
30.
cyber hygiene
31.
cyber impact assessment
32.
cyber incidents
33.
cyber insurance
34.
cyber intrusion detection
35.
cyber kill chain
36.
cyber operation
37.
cyber operation officer
38.
cyber operations
39.
cyber physical energy systems
40.
cyber physical power system (CPPS)
41.
Cyber Physical Production System
42.
cyber physical production systems (CPPS)
43.
cyber physical social system
44.
cyber physical social systems (cpss)
45.
cyber physical system
46.
cyber power Europe
47.
cyber ranges
48.
cyber red teaming
49.
cyber resilience
50.
cyber security
51.
cyber security education
52.
cyber security exercises
53.
cyber security strategies
54.
cyber situational awareness
55.
cyber stability
56.
cyber team communication
57.
cyber threat
58.
cyber threat communication
59.
cyber threats
60.
cyber war
61.
cyber warfare
62.
cyber warriors
63.
cyber weapons
64.
cyber-attack
65.
cyber-attack pathways
66.
cyber-insurance
67.
cyber-paternalism
68.
cyber-physical energy systems
69.
cyber-physical social system (CPSS)
70.
cyber-physical system
71.
Cyber-Physical System (CPS)
72.
cyber-physical system logistic robot
73.
cyber-physical systems
74.
Cyber-Physical Systems (CPS)
75.
cyber-security
76.
cyber-vulnerabilities
77.
Defensive Cyber Operations
78.
EU cyber policy
79.
international cyber norms
80.
military cyber
81.
mobile cyber-physical system
82.
national cyber security strategy
83.
NATO Cyber Range
84.
Offensive Cyber Operations
85.
responsive cyber defence
86.
Socio-Cyber-Physical Systems
87.
technical cyber exercise
88.
at-risk-of-poverty rates
89.
bank risk-taking
90.
bank-risk taking
91.
bankruptcy risk
92.
cancer risk
93.
cardiovascular risk
94.
Cardiovascular risk assessment
95.
cardiovascular risk factors
96.
climatic risk
97.
coastal risk index
98.
conceptual framework for safety/risk analysis
99.
conditional value at risk (CVaR)
100.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
101.
credit risk
102.
credit risk determinants
103.
disaster risk reduction
104.
ecological risk assessment
105.
Economic risk
106.
elimination of risk
107.
environmental risk
108.
environmental risk assessment
109.
ESG risk
110.
farmer's risk criterion
111.
fish injury and mortality risk
112.
flood risk management
113.
health risk
114.
heart disease risk factors
115.
infection risk
116.
infection risk-based ventilation
117.
insurance risk
118.
kardiovaskulaarne risk
119.
knowledge risk
120.
knowledge risk management
121.
knowledge risk management (KRM)
122.
knowledge risk management in banking
123.
knowledge risk management in construction
124.
knowledge risk management in SMEs
125.
machinery risk assessment
126.
military environment risk assessment
127.
models for risk assessment
128.
mould growth risk
129.
mould risk
130.
multi-risk/multi-criteria
131.
operational knowledge risk
132.
overheating risk
133.
perceived risk
134.
Polygenic risk score
135.
portfolio risk hedging
136.
potential risk
137.
pre-symptomatic period risk control
138.
proactive risk management
139.
process risk
140.
project risk management
141.
psychosocial risk factors
142.
quantitative risk analysis
143.
reactive risk management
144.
residual cardiovascular risk
145.
risk
146.
risk group for mental disorders
147.
risk allocation
148.
risk analysis
149.
risk assessment
150.
risk assessment chemicals in the air
151.
risk assessments
152.
risk attitudes
153.
risk behavior
154.
risk classification
155.
risk evaluation model
156.
risk evaluation model development
157.
risk event chain analyses
158.
risk factors
159.
risk governance
160.
risk interdependence
161.
risk levels
162.
risk management
163.
risk management culture
164.
risk management in public organizations
165.
risk management model
166.
risk mitigation
167.
risk modelling
168.
risk of failure
169.
risk of mould growth
170.
risk prediction
171.
risk preference analysis
172.
risk prevention
173.
risk reduction
174.
risk stratification
175.
risk transfer
176.
risk-adjusted performance
177.
risk-based management
178.
risk-taking
179.
rrivacy risk assessment
180.
security risk assessment
181.
security risk management
182.
semi-quantitative risk assessment method
183.
ship collision risk
184.
situational risk awareness
185.
standalone risk
186.
supply chain risk
187.
supply chain risk management
188.
systemic risk
189.
tourists’ perceived travel risk
190.
value at risk
191.
vascular risk factors
192.
3D risk assesment
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
kardiovaskulaarne risk
5.
risk
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT