Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security monitoring in maritime (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(3/292)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Literature review: Cyber security monitoring in maritime
Vaarandi, Risto
;
Tsiopoulos, Leonidas
;
Visky, Gabor
;
Ur Rehman, Muaan
;
Bahsi, Hayretdin
arXiv.org
2025
/
22 p. : ill
https://doi.org/10.48550/arXiv.2503.18173
journal article
Number of records 1, displaying
1 - 1
keyword
283
1.
cyber security monitoring in maritime
2.
maritime cyber security
3.
maritime cyber security operations centers
4.
cyber security monitoring
5.
Maritime Security Operations Center (M-SOC)
6.
cyber security
7.
cyber security education
8.
cyber security exercises
9.
cyber security strategies
10.
cyber-physical system security
11.
cyber-security
12.
national cyber security strategy
13.
network security monitoring
14.
security monitoring
15.
Autonomous Maritime Surveillance System (AMSS)
16.
decarbonization of maritime industry
17.
Estonian maritime cluster
18.
Estonian maritime defence
19.
Estonian Maritime Industry
20.
European Maritime Safety Agency
21.
Global Maritime Distress and Safety system (GMDSS)
22.
higher maritime education institutions
23.
International Maritime Organization (IMO)
24.
maritime
25.
maritime accidents
26.
maritime activities
27.
maritime affairs
28.
Maritime automation
29.
maritime autonomous surface ships (MASSs)
30.
maritime autonomous systems
31.
Maritime cluster
32.
maritime clusters
33.
maritime communications
34.
maritime connectivity
35.
maritime cybersecurity
36.
maritime cybersecurity certification teaching
37.
maritime decarbonization
38.
maritime defence
39.
Maritime digital transformation
40.
maritime economics
41.
maritime economy
42.
Maritime education
43.
maritime education and training
44.
maritime education concept
45.
maritime energy contract
46.
maritime environment
47.
maritime environmental governance
48.
maritime fleet management
49.
maritime higher education and training (MHET)
50.
maritime industries
51.
maritime industry
52.
maritime infrastructure
53.
maritime innovation management
54.
maritime investment theory
55.
maritime investments
56.
maritime logistic
57.
maritime logistics
58.
maritime mindset
59.
maritime navigation
60.
maritime navigation safety
61.
maritime occupational health
62.
maritime occupational health and safety
63.
maritime operations
64.
maritime policy
65.
maritime pollution
66.
maritime port management
67.
maritime regulation
68.
maritime safety
69.
maritime sector
70.
maritime situation awareness
71.
maritime solutions
72.
maritime spatial planning
73.
maritime traffic analytics
74.
maritime transition
75.
maritime transport
76.
maritime transportation
77.
national maritime defence
78.
Swedish Maritime Competence Centre
79.
The Global Maritime Professional
80.
automated cyber defense
81.
autonomous vehicle cyber range
82.
cloud-based cyber-physical systems (C2PS)
83.
cognitive cyber warfare
84.
cyber
85.
Cyber “Maastricht”
86.
cyber architecture
87.
cyber attacks
88.
cyber battle damage assessment
89.
Cyber Bio-analytical Physical Systems (CBPSs)
90.
cyber challenge
91.
cyber command
92.
Cyber Command organisational structure
93.
cyber conflict
94.
cyber contingency
95.
cyber crime
96.
cyber crime pathways
97.
cyber crime scripting
98.
Cyber crisis management
99.
cyber defence
100.
cyber defence exercise
101.
cyber defence exercises
102.
cyber defense education
103.
cyber defense exercise
104.
cyber defense exercises
105.
cyber dependence
106.
cyber diplomacy
107.
cyber exercise
108.
cyber hygiene
109.
cyber impact assessment
110.
cyber incidents
111.
cyber insurance
112.
cyber intrusion detection
113.
cyber kill chain
114.
cyber operation
115.
cyber operation officer
116.
cyber operations
117.
cyber operations exercises
118.
cyber physical energy systems
119.
cyber physical power system (CPPS)
120.
Cyber Physical Production System
121.
cyber physical production systems (CPPS)
122.
cyber physical social system
123.
cyber physical social systems (cpss)
124.
cyber physical system
125.
Cyber Planning tool
126.
cyber power Europe
127.
cyber ranges
128.
cyber red teaming
129.
cyber resilience
130.
cyber resilience at sea
131.
cyber risk
132.
cyber risk management in shipping
133.
cyber situational awareness
134.
cyber stability
135.
cyber team communication
136.
cyber threat
137.
cyber threat communication
138.
Cyber Threat Intelligence
139.
cyber threats
140.
cyber war
141.
cyber warfare
142.
cyber warriors
143.
cyber weapons
144.
cyber-attack
145.
cyber-attack pathways
146.
Cyber-attacks
147.
cyber-insurance
148.
cyber-paternalism
149.
cyber-physical energy systems
150.
cyber-physical social system (CPSS)
151.
cyber-physical system
152.
Cyber-Physical System (CPS)
153.
cyber-physical system logistic robot
154.
cyber-physical systems
155.
Cyber-Physical Systems (CPS)
156.
cyber-risks
157.
cyber-space nexus
158.
cyber-vulnerabilities
159.
Defensive Cyber Operations
160.
EU cyber policy
161.
international cyber norms
162.
military cyber
163.
mobile cyber-physical system
164.
NATO cyber operations definitions
165.
NATO Cyber Range
166.
Offensive Cyber Operations
167.
perceived cyber risks and threats
168.
responsive cyber defence
169.
Socio-Cyber-Physical Systems
170.
space cyber range
171.
technical cyber exercise
172.
Visualising Cyber Planning
173.
ad-hoc sensor networks security
174.
Automatic Security Verification
175.
Blockchain security
176.
cache security
177.
cloud security
178.
communication system security
179.
comprehensive system of economic security
180.
computer security
181.
cooperative security dilemma
182.
data and information security
183.
data security
184.
development of security cameras
185.
digital security practices
186.
drinking water security
187.
economic security
188.
economic security of enterprise
189.
emotional security
190.
energy security
191.
energy security indicator
192.
Estonian information security standard
193.
graded security
194.
hardware security
195.
hardware security primitive
196.
high level of security
197.
Homeland security
198.
human security
199.
information security
200.
information security and privacy
201.
initial level of security
202.
internal security
203.
international security
204.
investment and innovation security
205.
IPv6 security
206.
IT security
207.
IT security management
208.
job security
209.
long-term security
210.
medium level of security
211.
metadata model for security measures
212.
Middle Eastern security
213.
Mobile security
214.
national security
215.
NATO. Science for Peace and Security Program
216.
network security
217.
OSCE (Organization for Security and Co-operation in Europe)
218.
passenger’s security
219.
policy-based routing security
220.
political and security cultures
221.
post-quantum security
222.
power system security
223.
quantitative security
224.
regional security
225.
RISC-V Security Verification
226.
Safety and Security in Sea Transportation
227.
safety and security testing
228.
security
229.
security adaptation
230.
security alert prioritization
231.
security analysis
232.
security and justice (AFSJ)
233.
Security and political science
234.
security and privacy
235.
security and privacy in smart grids
236.
Security Assertion
237.
Security Assertion Mining
238.
security closure
239.
Security Coverage
240.
security dataset
241.
security dilemma
242.
Security evaluation
243.
security evaluation instruments
244.
Security Level Evaluation
245.
Security limitations
246.
security log analysis
247.
security management
248.
security model
249.
security notion
250.
security objectives
251.
security of data
252.
security of supply
253.
security operation center
254.
security operations center
255.
security patterns
256.
security policy
257.
security problem definition
258.
security proof
259.
security protocols
260.
security requirements
261.
security requirements engineering
262.
security research
263.
security risk assessment
264.
security risk management
265.
security risks
266.
security science and technology
267.
security strategies
268.
security systems for military objects
269.
security testing
270.
security training
271.
security verification
272.
security-by-design
273.
social security planning
274.
societal security
275.
software security
276.
software security level
277.
software security subcharacteristics
278.
sufficient level of security
279.
system of economic security
280.
system security
281.
terrorism security
282.
transmission System Security
283.
voting privacy and security
subject term
8
1.
Federal Maritime and Hydrographic Agency (BSH)
2.
International Maritime Organization
3.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
4.
Cyber Battle
5.
Telia Cyber Battle of Estonia
6.
Telia Cyber Battle of Nordic-Baltics
7.
National Computer Security Incident Response Teams (N-CSIRTs)
8.
USS Security Eesti AS
TalTech department
1
1.
Estonian Maritime Academy
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT