Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
29
Vaata veel..
(2/217)
Ekspordi
ekspordi kõik päringu tulemused
(29)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
26
artikkel ajakirjas
The regulatory intersections between artificial intelligence, data protection and cyber security : challenges and opportunities for the EU legal framework
Andraško, Jozef
;
Mesarčik, Matuš
;
Hamulak, Ondrej
AI & Society
2021
/
p. 623–636
https://doi.org/10.1007/s00146-020-01125-5
artikkel ajakirjas
27
artikkel kogumikus
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
artikkel kogumikus
28
artikkel kogumikus EST
/
artikkel kogumikus ENG
Towards an open-source intrusion detection system integration into marine vehicles
Visky, Gabor
;
Khisteva, Dariana
;
Vaarandi, Risto
;
Maennel, Olaf Manuel
2024 International Symposium ELMAR
Proceedings of ELMAR-2024 : 66th International Symposium ELMAR. 16-18 September 2024, Zadar, Croatia
2024
/
p. 263-268
https://doi.org/10.1109/ELMAR62909.2024.10694518
Conference proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
Seotud publikatsioonid
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
29
artikkel kogumikus EST
/
artikkel kogumikus ENG
Variable self-efficacy as a measurement for behaviors in cyber security operations
Lugo, Ricardo Gregorio
;
Knox, Benjamin James
;
Josok, Oyvind
;
Sütterlin, Stefan
Augmented Cognition. Human Cognition and Behavior : 14th International Conference, AC 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings, Part II
2020
/
p. 395-404
https://doi.org/10.1007/978-3-030-50439-7_27
Conference proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 29, kuvan
26 - 29
eelmine
1
2
järgmine
võtmesõna
211
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security strategies
6.
cyber-security
7.
maritime cyber security
8.
maritime cyber security operations centers
9.
national cyber security strategy
10.
autonomous vehicle cyber range
11.
cloud-based cyber-physical systems (C2PS)
12.
cognitive cyber warfare
13.
cyber
14.
Cyber “Maastricht”
15.
cyber architecture
16.
cyber attacks
17.
cyber battle damage assessment
18.
Cyber Bio-analytical Physical Systems (CBPSs)
19.
cyber challenge
20.
cyber command
21.
Cyber Command organisational structure
22.
cyber conflict
23.
cyber contingency
24.
cyber crime
25.
cyber crime pathways
26.
cyber crime scripting
27.
Cyber crisis management
28.
cyber defence
29.
cyber defence exercise
30.
cyber defence exercises
31.
cyber defense education
32.
cyber defense exercise
33.
cyber defense exercises
34.
cyber dependence
35.
cyber diplomacy
36.
cyber exercise
37.
cyber hygiene
38.
cyber impact assessment
39.
cyber incidents
40.
cyber insurance
41.
cyber intrusion detection
42.
cyber kill chain
43.
cyber operation
44.
cyber operation officer
45.
cyber operations
46.
cyber operations exercises
47.
cyber physical energy systems
48.
cyber physical power system (CPPS)
49.
Cyber Physical Production System
50.
cyber physical production systems (CPPS)
51.
cyber physical social system
52.
cyber physical social systems (cpss)
53.
cyber physical system
54.
Cyber Planning tool
55.
cyber power Europe
56.
cyber ranges
57.
cyber red teaming
58.
cyber resilience
59.
cyber resilience at sea
60.
cyber risk
61.
cyber risk management in shipping
62.
cyber situational awareness
63.
cyber stability
64.
cyber team communication
65.
cyber threat
66.
cyber threat communication
67.
Cyber Threat Intelligence
68.
cyber threats
69.
cyber war
70.
cyber warfare
71.
cyber warriors
72.
cyber weapons
73.
cyber-attack
74.
cyber-attack pathways
75.
Cyber-attacks
76.
cyber-insurance
77.
cyber-paternalism
78.
cyber-physical energy systems
79.
cyber-physical social system (CPSS)
80.
cyber-physical system
81.
Cyber-Physical System (CPS)
82.
cyber-physical system logistic robot
83.
cyber-physical systems
84.
Cyber-Physical Systems (CPS)
85.
cyber-risks
86.
cyber-space nexus
87.
cyber-vulnerabilities
88.
Defensive Cyber Operations
89.
EU cyber policy
90.
international cyber norms
91.
military cyber
92.
mobile cyber-physical system
93.
NATO cyber operations definitions
94.
NATO Cyber Range
95.
Offensive Cyber Operations
96.
perceived cyber risks and threats
97.
responsive cyber defence
98.
Socio-Cyber-Physical Systems
99.
space cyber range
100.
technical cyber exercise
101.
Visualising Cyber Planning
102.
ad-hoc sensor networks security
103.
Automatic Security Verification
104.
Blockchain security
105.
cache security
106.
communication system security
107.
comprehensive system of economic security
108.
computer security
109.
cooperative security dilemma
110.
data and information security
111.
data security
112.
development of security cameras
113.
digital security practices
114.
drinking water security
115.
economic security
116.
economic security of enterprise
117.
emotional security
118.
energy security
119.
energy security indicator
120.
Estonian information security standard
121.
graded security
122.
hardware security
123.
hardware security primitive
124.
high level of security
125.
Homeland security
126.
human security
127.
information security
128.
information security and privacy
129.
initial level of security
130.
internal security
131.
international security
132.
investment and innovation security
133.
IPv6 security
134.
IT security
135.
IT security management
136.
job security
137.
long-term security
138.
Maritime Security Operations Center (M-SOC)
139.
medium level of security
140.
metadata model for security measures
141.
Middle Eastern security
142.
Mobile security
143.
national security
144.
NATO. Science for Peace and Security Program
145.
network security
146.
network security monitoring
147.
OSCE (Organization for Security and Co-operation in Europe)
148.
passenger’s security
149.
policy-based routing security
150.
political and security cultures
151.
post-quantum security
152.
power system security
153.
quantitative security
154.
regional security
155.
RISC-V Security Verification
156.
Safety and Security in Sea Transportation
157.
safety and security testing
158.
security
159.
security adaptation
160.
security alert prioritization
161.
security analysis
162.
security and justice (AFSJ)
163.
Security and political science
164.
security and privacy
165.
security and privacy in smart grids
166.
Security Assertion Mining
167.
security closure
168.
Security Coverage
169.
security dataset
170.
security dilemma
171.
Security evaluation
172.
security evaluation instruments
173.
Security limitations
174.
security log analysis
175.
security management
176.
security model
177.
security monitoring
178.
security notion
179.
security objectives
180.
security of data
181.
security of supply
182.
security operation center
183.
security operations center
184.
security patterns
185.
security policy
186.
security problem definition
187.
security proof
188.
security protocols
189.
security requirements
190.
security requirements engineering
191.
security risk assessment
192.
security risk management
193.
security risks
194.
security science and technology
195.
security strategies
196.
security systems for military objects
197.
security testing
198.
security training
199.
security verification
200.
security-by-design
201.
social security planning
202.
societal security
203.
software security
204.
software security level
205.
software security subcharacteristics
206.
sufficient level of security
207.
system of economic security
208.
system security
209.
terrorism security
210.
transmission System Security
211.
voting privacy and security
märksõna
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT