Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cybersecurity knowledge requirements (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
Ă—
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/184)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Cybersecurity knowledge requirements for strategic level decision makers
Garcia-Granados, F.
;
Bahsi, Hayretdin
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 559-568
https://doi.org/
book article
Number of records 1, displaying
1 - 1
keyword
184
1.
cybersecurity knowledge requirements
2.
automotive cybersecurity
3.
cybersecurity
4.
cybersecurity (CS)
5.
cybersecurity awareness
6.
cybersecurity behaviors
7.
cybersecurity breach
8.
cybersecurity components
9.
cybersecurity education
10.
cybersecurity exercises
11.
cybersecurity gender balance
12.
cybersecurity governance
13.
cybersecurity in shipping
14.
cybersecurity incident response
15.
cybersecurity law
16.
cybersecurity market demand
17.
cybersecurity maturity tool development for schools
18.
cybersecurity policy
19.
cybersecurity practical training
20.
cybersecurity simulations
21.
cybersecurity skills gap
22.
cybersecurity standards
23.
cybersecurity test bed
24.
cybersecurity testing
25.
cybersecurity training
26.
cybersecurity workforce development
27.
cybersecurity vulnerability
28.
EU cybersecurity policy
29.
European cybersecurity capacity building
30.
European Cybersecurity Skills Framework (ECSF)
31.
European Union Agency for Cybersecurity (ENISA)
32.
human factor of cybersecurity
33.
human factors in cybersecurity
34.
maritime cybersecurity
35.
maritime cybersecurity certification teaching
36.
organising cybersecurity exercises
37.
port cybersecurity
38.
responsibility/penalty for a cybersecurity breach
39.
set of possible cybersecurity breaches
40.
energy performance minimum requirements
41.
functional requirements
42.
grid connection requirements
43.
isolation requirements
44.
min. requirements
45.
minimum requirements
46.
national requirements
47.
nZEB requirements
48.
nutrient requirements
49.
ontology requirements
50.
requirements
51.
requirements bazaar
52.
requirements elicitation
53.
requirements engineering
54.
requirements feedback
55.
requirements gathering
56.
requirements modelling
57.
security requirements
58.
security requirements engineering
59.
User Requirements
60.
absolutist knowledge
61.
Actionable knowledge
62.
collaborative knowledge production
63.
computerised knowledge work
64.
customer knowledge sharing
65.
data mining and knowledge discovery
66.
differentiated knowledge base
67.
diffusion of knowledge
68.
diffusion of knowledge
69.
expert knowledge
70.
global knowledge warfare
71.
hiding knowledge
72.
inclusiv knowledge management
73.
Indigenous knowledge systems
74.
integrated and networked knowledge generating systems
75.
international knowledge transfer
76.
knowledge
77.
knowledge absorptive capacity
78.
knowledge abstraction
79.
knowledge and innovation
80.
knowledge and skills
81.
knowledge base
82.
knowledge based economy
83.
knowledge based manufacturing
84.
knowledge based systems
85.
knowledge bases
86.
knowledge brokering
87.
knowledge challenges
88.
knowledge contribution
89.
knowledge creation
90.
knowledge diffusion
91.
knowledge discovery
92.
knowledge discovery and data mining
93.
knowledge discovery in databases
94.
knowledge distillation
95.
knowledge driven manufacturing
96.
knowledge economy
97.
knowledge employees
98.
knowledge engineering
99.
knowledge exchange
100.
knowledge exploitation
101.
knowledge extraction
102.
knowledge flows
103.
knowledge fusion
104.
knowledge gathering
105.
knowledge generation
106.
knowledge graph
107.
knowledge graph embeddings
108.
knowledge hiding
109.
knowledge hiding behavior
110.
knowledge intensive enterprises
111.
knowledge leakage
112.
knowledge loss
113.
knowledge management
114.
knowledge management (KM)
115.
knowledge management in production
116.
Knowledge management system
117.
knowledge management systems (KMS)
118.
knowledge map
119.
knowledge network
120.
knowledge networks
121.
knowledge of brand origins
122.
knowledge overload
123.
knowledge perception
124.
knowledge processing
125.
knowledge recovery
126.
knowledge representation
127.
knowledge retention
128.
knowledge retention and higher education
129.
Knowledge retrieval
130.
knowledge risk
131.
knowledge risk management
132.
knowledge risk management (KRM)
133.
knowledge risk management in banking
134.
knowledge risk management in construction
135.
knowledge risk management in SMEs
136.
knowledge risks
137.
knowledge risks in health-care organizations
138.
knowledge sharing
139.
knowledge sourcing
140.
knowledge systems
141.
knowledge transfer
142.
knowledge translation
143.
knowledge warfare
144.
knowledge withholding
145.
knowledge workers
146.
knowledge-based design
147.
knowledge-based economy
148.
knowledge-based manufacturing
149.
knowledge-based system
150.
knowledge-based systems
151.
knowledge-basedfirms
152.
knowledge-inquiry
153.
knowledge-intensive business service (KIBS)
154.
knowledge-intensive business services
155.
knowledge-intensive service activities (KISA)
156.
knowledge-intensivefirms
157.
knowledge-management
158.
Local ecological knowledge
159.
logistics knowledge areas
160.
management knowledge
161.
nursing knowledge
162.
operational knowledge risk
163.
organisational knowledge
164.
organizations knowledge
165.
personal health knowledge graph
166.
personal knowledge management
167.
policy-relevant knowledge
168.
responsible knowledge
169.
responsible knowledge management
170.
risks knowledge risks
171.
safety knowledge
172.
scientific knowledge
173.
shared knowledge authentication
174.
symbolic knowledge
175.
symbolic knowledge in Husserlian pure logic
176.
zero-knowledge
177.
zero-knowledge proof
178.
Zero-knowledge proofs
179.
task knowledge patterns
180.
teachers’ knowledge base
181.
Traditional ecological knowledge
182.
traditional knowledge
183.
transfer of knowledge
184.
withholding knowledge
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT