Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Journal of cyber security and mobility (source)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/257)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Blockchain-based medical decision support system
Hovorushchenko, Tetiana
;
Hnatchuk, Yelyzaveta
;
Osyadlyi, Vitaliy
;
Kapustian, Mariia
;
Boyarchuk, Artem
Journal of cyber security and mobility
2023
/
p. 253-274 : ill
https://doi.org/10.13052/jcsm2245-1439.123.1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
248
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security strategies
6.
cyber-security
7.
maritime cyber security
8.
maritime cyber security operations centers
9.
national cyber security strategy
10.
academic mobility
11.
automated mobility
12.
automated mobility and delivery industry
13.
carrier mobility
14.
connected and automated mobility
15.
connected-and-automated mobility
16.
connected-automated mobility
17.
corporate mobility
18.
E-mobility
19.
Finest Smart Mobility
20.
human mobility
21.
impaired physical mobility
22.
interfirm mobility
23.
ion mobility
24.
ion mobility separation
25.
ion mobility spectroscopy
26.
labour mobility
27.
micro-mobility
28.
mobility
29.
Mobility Anisotropy
30.
mobility as a service
31.
mobility modeling
32.
smart and sustainable mobility
33.
smart mobility
34.
spatial mobility
35.
suburban mobility
36.
sustainable mobility
37.
Sustainable Urban Mobility Plans (SUMP)
38.
TOF mobility
39.
transportation and mobility competences
40.
urban air mobility (UAM)
41.
urban mobility
42.
urban mobility education
43.
virtual mobility
44.
(im)mobility
45.
autonomous vehicle cyber range
46.
cloud-based cyber-physical systems (C2PS)
47.
cognitive cyber warfare
48.
cyber
49.
Cyber “Maastricht”
50.
cyber architecture
51.
cyber attacks
52.
cyber battle damage assessment
53.
Cyber Bio-analytical Physical Systems (CBPSs)
54.
cyber challenge
55.
cyber command
56.
Cyber Command organisational structure
57.
cyber conflict
58.
cyber contingency
59.
cyber crime
60.
cyber crime pathways
61.
cyber crime scripting
62.
Cyber crisis management
63.
cyber defence
64.
cyber defence exercise
65.
cyber defence exercises
66.
cyber defense education
67.
cyber defense exercise
68.
cyber defense exercises
69.
cyber dependence
70.
cyber diplomacy
71.
cyber exercise
72.
cyber hygiene
73.
cyber impact assessment
74.
cyber incidents
75.
cyber insurance
76.
cyber intrusion detection
77.
cyber kill chain
78.
cyber operation
79.
cyber operation officer
80.
cyber operations
81.
cyber operations exercises
82.
cyber physical energy systems
83.
cyber physical power system (CPPS)
84.
Cyber Physical Production System
85.
cyber physical production systems (CPPS)
86.
cyber physical social system
87.
cyber physical social systems (cpss)
88.
cyber physical system
89.
Cyber Planning tool
90.
cyber power Europe
91.
cyber ranges
92.
cyber red teaming
93.
cyber resilience
94.
cyber resilience at sea
95.
cyber risk
96.
cyber risk management in shipping
97.
cyber situational awareness
98.
cyber stability
99.
cyber team communication
100.
cyber threat
101.
cyber threat communication
102.
Cyber Threat Intelligence
103.
cyber threats
104.
cyber war
105.
cyber warfare
106.
cyber warriors
107.
cyber weapons
108.
cyber-attack
109.
cyber-attack pathways
110.
Cyber-attacks
111.
cyber-insurance
112.
cyber-paternalism
113.
cyber-physical energy systems
114.
cyber-physical social system (CPSS)
115.
cyber-physical system
116.
Cyber-Physical System (CPS)
117.
cyber-physical system logistic robot
118.
cyber-physical systems
119.
Cyber-Physical Systems (CPS)
120.
cyber-risks
121.
cyber-space nexus
122.
cyber-vulnerabilities
123.
Defensive Cyber Operations
124.
EU cyber policy
125.
international cyber norms
126.
military cyber
127.
mobile cyber-physical system
128.
NATO cyber operations definitions
129.
NATO Cyber Range
130.
Offensive Cyber Operations
131.
perceived cyber risks and threats
132.
responsive cyber defence
133.
Socio-Cyber-Physical Systems
134.
space cyber range
135.
technical cyber exercise
136.
Visualising Cyber Planning
137.
ad-hoc sensor networks security
138.
Automatic Security Verification
139.
Blockchain security
140.
cache security
141.
communication system security
142.
comprehensive system of economic security
143.
computer security
144.
cooperative security dilemma
145.
data and information security
146.
data security
147.
development of security cameras
148.
digital security practices
149.
drinking water security
150.
economic security
151.
economic security of enterprise
152.
emotional security
153.
energy security
154.
energy security indicator
155.
Estonian information security standard
156.
graded security
157.
hardware security
158.
hardware security primitive
159.
high level of security
160.
Homeland security
161.
human security
162.
information security
163.
information security and privacy
164.
initial level of security
165.
internal security
166.
international security
167.
investment and innovation security
168.
IPv6 security
169.
IT security
170.
IT security management
171.
job security
172.
long-term security
173.
Maritime Security Operations Center (M-SOC)
174.
medium level of security
175.
metadata model for security measures
176.
Middle Eastern security
177.
Mobile security
178.
national security
179.
NATO. Science for Peace and Security Program
180.
network security
181.
network security monitoring
182.
OSCE (Organization for Security and Co-operation in Europe)
183.
passenger’s security
184.
policy-based routing security
185.
political and security cultures
186.
post-quantum security
187.
power system security
188.
quantitative security
189.
regional security
190.
RISC-V Security Verification
191.
Safety and Security in Sea Transportation
192.
safety and security testing
193.
security
194.
security adaptation
195.
security alert prioritization
196.
security analysis
197.
security and justice (AFSJ)
198.
Security and political science
199.
security and privacy
200.
security and privacy in smart grids
201.
Security Assertion Mining
202.
security closure
203.
Security Coverage
204.
security dataset
205.
security dilemma
206.
Security evaluation
207.
security evaluation instruments
208.
Security Level Evaluation
209.
Security limitations
210.
security log analysis
211.
security management
212.
security model
213.
security monitoring
214.
security notion
215.
security objectives
216.
security of data
217.
security of supply
218.
security operation center
219.
security operations center
220.
security patterns
221.
security policy
222.
security problem definition
223.
security proof
224.
security protocols
225.
security requirements
226.
security requirements engineering
227.
security research
228.
security risk assessment
229.
security risk management
230.
security risks
231.
security science and technology
232.
security strategies
233.
security systems for military objects
234.
security testing
235.
security training
236.
security verification
237.
security-by-design
238.
social security planning
239.
societal security
240.
software security
241.
software security level
242.
software security subcharacteristics
243.
sufficient level of security
244.
system of economic security
245.
system security
246.
terrorism security
247.
transmission System Security
248.
voting privacy and security
subject term
9
1.
Bosch Future Mobility Challenge, 2025
2.
Kõu Mobility
3.
Urban Mobility Hub
4.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
5.
Cyber Battle
6.
Telia Cyber Battle of Estonia
7.
Telia Cyber Battle of Nordic-Baltics
8.
National Computer Security Incident Response Teams (N-CSIRTs)
9.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT