Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Journal of cyber security and mobility (source)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/231)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Blockchain-based medical decision support system
Hovorushchenko, Tetiana
;
Hnatchuk, Yelyzaveta
;
Osyadlyi, Vitaliy
;
Kapustian, Mariia
;
Boyarchuk, Artem
Journal of cyber security and mobility
2023
/
p. 253-274 : ill
https://doi.org/10.13052/jcsm2245-1439.123.1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
224
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security strategies
6.
cyber-security
7.
national cyber security strategy
8.
academic mobility
9.
automated mobility
10.
automated mobility and delivery industry
11.
carrier mobility
12.
connected and automated mobility
13.
connected-and-automated mobility
14.
connected-automated mobility
15.
corporate mobility
16.
E-mobility
17.
Finest Smart Mobility
18.
human mobility
19.
impaired physical mobility
20.
interfirm mobility
21.
ion mobility
22.
ion mobility separation
23.
ion mobility spectroscopy
24.
labour mobility
25.
micro-mobility
26.
mobility
27.
Mobility Anisotropy
28.
mobility as a service
29.
mobility modeling
30.
smart and sustainable mobility
31.
smart mobility
32.
spatial mobility
33.
suburban mobility
34.
sustainable mobility
35.
Sustainable Urban Mobility Plans (SUMP)
36.
TOF mobility
37.
transportation and mobility competences
38.
urban air mobility (UAM)
39.
urban mobility
40.
urban mobility education
41.
virtual mobility
42.
(im)mobility
43.
autonomous vehicle cyber range
44.
cloud-based cyber-physical systems (C2PS)
45.
cognitive cyber warfare
46.
cyber
47.
Cyber “Maastricht”
48.
cyber architecture
49.
cyber attacks
50.
cyber battle damage assessment
51.
Cyber Bio-analytical Physical Systems (CBPSs)
52.
cyber challenge
53.
cyber command
54.
cyber conflict
55.
cyber contingency
56.
cyber crime
57.
cyber crime pathways
58.
cyber crime scripting
59.
Cyber crisis management
60.
cyber defence
61.
cyber defence exercise
62.
cyber defence exercises
63.
cyber defense education
64.
cyber defense exercise
65.
cyber defense exercises
66.
cyber dependence
67.
cyber diplomacy
68.
cyber exercise
69.
cyber hygiene
70.
cyber impact assessment
71.
cyber incidents
72.
cyber insurance
73.
cyber intrusion detection
74.
cyber kill chain
75.
cyber operation
76.
cyber operation officer
77.
cyber operations
78.
cyber physical energy systems
79.
cyber physical power system (CPPS)
80.
Cyber Physical Production System
81.
cyber physical production systems (CPPS)
82.
cyber physical social system
83.
cyber physical social systems (cpss)
84.
cyber physical system
85.
cyber power Europe
86.
cyber ranges
87.
cyber red teaming
88.
cyber resilience
89.
cyber risk
90.
cyber situational awareness
91.
cyber stability
92.
cyber team communication
93.
cyber threat
94.
cyber threat communication
95.
cyber threats
96.
cyber war
97.
cyber warfare
98.
cyber warriors
99.
cyber weapons
100.
cyber-attack
101.
cyber-attack pathways
102.
cyber-insurance
103.
cyber-paternalism
104.
cyber-physical energy systems
105.
cyber-physical social system (CPSS)
106.
cyber-physical system
107.
Cyber-Physical System (CPS)
108.
cyber-physical system logistic robot
109.
cyber-physical systems
110.
Cyber-Physical Systems (CPS)
111.
cyber-risks
112.
cyber-space nexus
113.
cyber-vulnerabilities
114.
Defensive Cyber Operations
115.
EU cyber policy
116.
international cyber norms
117.
military cyber
118.
mobile cyber-physical system
119.
NATO cyber operations definitions
120.
NATO Cyber Range
121.
Offensive Cyber Operations
122.
perceived cyber risks and threats
123.
responsive cyber defence
124.
Socio-Cyber-Physical Systems
125.
space cyber range
126.
technical cyber exercise
127.
ad-hoc sensor networks security
128.
Automatic Security Verification
129.
Blockchain security
130.
cache security
131.
communication system security
132.
comprehensive system of economic security
133.
computer security
134.
cooperative security dilemma
135.
data security
136.
development of security cameras
137.
digital security practices
138.
drinking water security
139.
economic security
140.
economic security of enterprise
141.
emotional security
142.
energy security
143.
energy security indicator
144.
Estonian information security standard
145.
graded security
146.
hardware security
147.
hardware security primitive
148.
human security
149.
information security
150.
information security and privacy
151.
internal security
152.
international security
153.
investment and innovation security
154.
IPv6 security
155.
IT security
156.
IT security management
157.
job security
158.
long-term security
159.
metadata model for security measures
160.
Middle Eastern security
161.
Mobile security
162.
national security
163.
NATO. Science for Peace and Security Program
164.
network security
165.
network security monitoring
166.
OSCE (Organization for Security and Co-operation in Europe)
167.
passenger’s security
168.
policy-based routing security
169.
political and security cultures
170.
post-quantum security
171.
power system security
172.
quantitative security
173.
regional security
174.
RISC-V Security Verification
175.
safety and security testing
176.
security
177.
security adaptation
178.
security alert prioritization
179.
security analysis
180.
security and justice (AFSJ)
181.
Security and political science
182.
security and privacy
183.
security and privacy in smart grids
184.
Security Assertion Mining
185.
security closure
186.
Security Coverage
187.
security dataset
188.
security dilemma
189.
Security evaluation
190.
security evaluation instruments
191.
Security limitations
192.
security log analysis
193.
security management
194.
security model
195.
security monitoring
196.
security notion
197.
security objectives
198.
security of data
199.
security of supply
200.
security operation center
201.
security operations center
202.
security patterns
203.
security policy
204.
security problem definition
205.
security proof
206.
security protocols
207.
security requirements
208.
security requirements engineering
209.
security risk assessment
210.
security risk management
211.
security risks
212.
security strategies
213.
security systems for military objects
214.
security testing
215.
security training
216.
security verification
217.
security-by-design
218.
social security planning
219.
societal security
220.
system of economic security
221.
system security
222.
terrorism security
223.
transmission System Security
224.
voting privacy and security
subject term
7
1.
Kõu Mobility
2.
Urban Mobility Hub
3.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
4.
Cyber Battle
5.
Telia Cyber Battle of Nordic-Baltics
6.
National Computer Security Incident Response Teams (N-CSIRTs)
7.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT