Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security monitoring (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/341)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Literature review: Cyber security monitoring in maritime
Vaarandi, Risto
;
Tsiopoulos, Leonidas
;
Visky, Gabor
;
Ur Rehman, Muaan
;
Bahsi, Hayretdin
arXiv.org
2025
/
22 p. : ill
https://doi.org/10.48550/arXiv.2503.18173
journal article
2
journal article EST
/
journal article ENG
A systematic literature review of cyber security monitoring in maritime
Vaarandi, Risto
;
Tsiopoulos, Leonidas
;
Visky, Gabor
;
Rehman, Muaan Ur
;
Bahsi, Hayretdin
IEEE Access
2025
/
p. 85307-85329
https://doi.org/10.1109/ACCESS.2025.3567385
journal article EST
/
journal article ENG
Related publications
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
Number of records 2, displaying
1 - 2
keyword
330
1.
cyber security monitoring
2.
cyber security monitoring in maritime
3.
cyber security
4.
cyber security education
5.
cyber security exercises
6.
cyber security strategies
7.
cyber-physical system security
8.
cyber-security
9.
maritime cyber security
10.
maritime cyber security operations centers
11.
national cyber security strategy
12.
network security monitoring
13.
security monitoring
14.
autonomous vehicle cyber range
15.
cloud-based cyber-physical systems (C2PS)
16.
cognitive cyber warfare
17.
cyber
18.
Cyber “Maastricht”
19.
cyber architecture
20.
cyber attacks
21.
cyber battle damage assessment
22.
Cyber Bio-analytical Physical Systems (CBPSs)
23.
cyber challenge
24.
cyber command
25.
Cyber Command organisational structure
26.
cyber conflict
27.
cyber contingency
28.
cyber crime
29.
cyber crime pathways
30.
cyber crime scripting
31.
Cyber crisis management
32.
cyber defence
33.
cyber defence exercise
34.
cyber defence exercises
35.
cyber defense education
36.
cyber defense exercise
37.
cyber defense exercises
38.
cyber dependence
39.
cyber diplomacy
40.
cyber exercise
41.
cyber hygiene
42.
cyber impact assessment
43.
cyber incidents
44.
cyber insurance
45.
cyber intrusion detection
46.
cyber kill chain
47.
cyber operation
48.
cyber operation officer
49.
cyber operations
50.
cyber operations exercises
51.
cyber physical energy systems
52.
cyber physical power system (CPPS)
53.
Cyber Physical Production System
54.
cyber physical production systems (CPPS)
55.
cyber physical social system
56.
cyber physical social systems (cpss)
57.
cyber physical system
58.
Cyber Planning tool
59.
cyber power Europe
60.
cyber ranges
61.
cyber red teaming
62.
cyber resilience
63.
cyber resilience at sea
64.
cyber risk
65.
cyber risk management in shipping
66.
cyber situational awareness
67.
cyber stability
68.
cyber team communication
69.
cyber threat
70.
cyber threat communication
71.
Cyber Threat Intelligence
72.
cyber threats
73.
cyber war
74.
cyber warfare
75.
cyber warriors
76.
cyber weapons
77.
cyber-attack
78.
cyber-attack pathways
79.
Cyber-attacks
80.
cyber-insurance
81.
cyber-paternalism
82.
cyber-physical energy systems
83.
cyber-physical social system (CPSS)
84.
cyber-physical system
85.
Cyber-Physical System (CPS)
86.
cyber-physical system logistic robot
87.
cyber-physical systems
88.
Cyber-Physical Systems (CPS)
89.
cyber-risks
90.
cyber-space nexus
91.
cyber-vulnerabilities
92.
Defensive Cyber Operations
93.
EU cyber policy
94.
international cyber norms
95.
military cyber
96.
mobile cyber-physical system
97.
NATO cyber operations definitions
98.
NATO Cyber Range
99.
Offensive Cyber Operations
100.
perceived cyber risks and threats
101.
responsive cyber defence
102.
Socio-Cyber-Physical Systems
103.
space cyber range
104.
technical cyber exercise
105.
Visualising Cyber Planning
106.
ad-hoc sensor networks security
107.
Automatic Security Verification
108.
Blockchain security
109.
cache security
110.
cloud security
111.
communication system security
112.
comprehensive system of economic security
113.
computer security
114.
cooperative security dilemma
115.
data and information security
116.
data security
117.
development of security cameras
118.
digital security practices
119.
drinking water security
120.
economic security
121.
economic security of enterprise
122.
emotional security
123.
energy security
124.
energy security indicator
125.
Estonian information security standard
126.
graded security
127.
hardware security
128.
hardware security primitive
129.
high level of security
130.
Homeland security
131.
human security
132.
information security
133.
information security and privacy
134.
initial level of security
135.
internal security
136.
international security
137.
investment and innovation security
138.
IPv6 security
139.
IT security
140.
IT security management
141.
job security
142.
long-term security
143.
Maritime Security Operations Center (M-SOC)
144.
medium level of security
145.
metadata model for security measures
146.
Middle Eastern security
147.
Mobile security
148.
national security
149.
NATO. Science for Peace and Security Program
150.
network security
151.
OSCE (Organization for Security and Co-operation in Europe)
152.
passenger’s security
153.
policy-based routing security
154.
political and security cultures
155.
post-quantum security
156.
power system security
157.
quantitative security
158.
regional security
159.
RISC-V Security Verification
160.
Safety and Security in Sea Transportation
161.
safety and security testing
162.
security
163.
security adaptation
164.
security alert prioritization
165.
security analysis
166.
security and justice (AFSJ)
167.
Security and political science
168.
security and privacy
169.
security and privacy in smart grids
170.
Security Assertion
171.
Security Assertion Mining
172.
security closure
173.
Security Coverage
174.
security dataset
175.
security dilemma
176.
Security evaluation
177.
security evaluation instruments
178.
Security Level Evaluation
179.
Security limitations
180.
security log analysis
181.
security management
182.
security model
183.
security notion
184.
security objectives
185.
security of data
186.
security of supply
187.
security operation center
188.
security operations center
189.
security patterns
190.
security policy
191.
security problem definition
192.
security proof
193.
security protocols
194.
security requirements
195.
security requirements engineering
196.
security research
197.
security risk assessment
198.
security risk management
199.
security risks
200.
security science and technology
201.
security strategies
202.
security systems for military objects
203.
security testing
204.
security training
205.
security verification
206.
security-by-design
207.
social security planning
208.
societal security
209.
software security
210.
software security level
211.
software security subcharacteristics
212.
sufficient level of security
213.
system of economic security
214.
system security
215.
terrorism security
216.
transmission System Security
217.
voting privacy and security
218.
ambulatory blood pressure monitoring
219.
automated decision and monitoring mechanisms
220.
Baltic-wide HELCOM COMBINE monitoring program
221.
bi-directional fault monitoring devices
222.
biological monitoring
223.
biomedical monitoring
224.
biosignal monitoring
225.
cardiac monitoring
226.
CO2 monitoring
227.
coastal monitoring
228.
condition monitoring
229.
condition monitoring system
230.
continuous monitoring
231.
Copernicus Marine Environment Monitoring Service
232.
corporate performance monitoring system
233.
corrosion monitoring
234.
data-driven condition monitoring
235.
deformation monitoring
236.
diagnosis and performance monitoring
237.
Distributed flow monitoring
238.
distributed monitoring
239.
distributed online monitoring
240.
disturbance monitoring
241.
drone-based traffic monitoring
242.
drug monitoring
243.
e-monitoring
244.
Environmental compliance monitoring
245.
environmental monitoring
246.
fault monitoring
247.
field monitoring
248.
fish monitoring
249.
GHB monitoring
250.
groundwater monitoring
251.
haemodialysis monitoring
252.
health monitoring
253.
healthcare monitoring
254.
hemodialysis monitoring
255.
home blood pressure monitoring
256.
home monitoring
257.
industrial monitoring
258.
infrastructure monitoring
259.
in-situ monitoring
260.
integrated hemodynamic monitoring
261.
interactive monitoring
262.
IoT-based monitoring
263.
laboratory monitoring
264.
landfill monitoring
265.
load monitoring
266.
long term monitoring
267.
long-term monitoring
268.
machine condition monitoring
269.
machinery monitoring
270.
Magnetic induction monitoring
271.
marine microplastic monitoring
272.
marine monitoring
273.
monitoring
274.
monitoring and application design
275.
monitoring and detection
276.
monitoring and prognosis
277.
monitoring deformations
278.
monitoring program
279.
monitoring RIS3 observatory
280.
monitoring system
281.
monitoring the health patients
282.
NetFlow based network monitoring
283.
network monitoring
284.
Non-intrusive load monitoring
285.
non-intrusive load monitoring (NILM)
286.
ocean monitoring
287.
online monitoring
288.
on-line monitoring
289.
optical monitoring
290.
passive acoustic monitoring
291.
patient monitoring
292.
performance monitoring
293.
periodic monitoring
294.
pollen monitoring
295.
power quality monitoring
296.
PQM (Power Quality Monitoring)
297.
process monitoring
298.
production monitoring
299.
production monitoring system
300.
production monitoring system (PLM)
301.
production monitoring system (PMS)
302.
production monitoring systems (PMS)
303.
project-monitoring
304.
quality monitoring
305.
real time monitoring process
306.
real-time collision monitoring
307.
real-time monitoring
308.
remote monitoring
309.
remote patient monitoring
310.
respiratory monitoring
311.
RIS3 evaluation and monitoring
312.
road surface condition monitoring
313.
sea monitoring
314.
sensor respiratory monitoring
315.
smart materials with structural health monitoring capabilities
316.
SoC health monitoring
317.
stormwater monitoring
318.
structural health monitoring
319.
surface water monitoring
320.
susceptibility monitoring
321.
system monitoring
322.
terms—production environment monitoring
323.
the accuracy of monitoring in analysis of impact impulses
324.
The Baltic Monitoring and Forecasting Centre (BAL MFC)
325.
traffic behavior monitoring
326.
treatment monitoring
327.
water pollution monitoring
328.
water quality monitoring
329.
wearable health monitoring
330.
wide area monitoring
subject term
11
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
7.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
8.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
9.
Baltic Monitoring and Forecasting Center (BALMFC)
10.
Copernicus Marine Environment Monitoring Service (CMEMS)
11.
MyOcean Baltic Sea Monitoring and Forecasting Centre
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT