Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber-attack (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(2/125)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
An overview of the functions of smart grids associated with virtual power plants including cybersecurity measures
Alvi, Anas Abdullah
;
Romero-Cadaval, Enrique
;
González-Romera, Eva
;
Hassan, Jamil
;
Vinnikov, Dmitri
Technological innovation for connected cyber physical spaces : 14th IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2023, Caparica, Portugal, July 5-7, 2023 : proceedings
2023
/
p. 95 - 107
https://doi.org/10.1007/978-3-031-36007-7_7
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
2
book article
Simulating a cyber-attack on an autonomous sea surface vessel's rudder controller
Astrov, Igor
;
Bauk, Sanja
2024 13th Mediterranean Conference on Embedded Computing (MECO), 11-14 June 2024, Budva, Montenegro
2024
/
7 p. : ill
https://doi.org/10.1109/MECO62516.2024.10577872
Article at Scopus
Article at WOS
book article
3
journal article EST
/
journal article ENG
Simulating a cyber-attack on the mass thruster controllers at low-speed motion
Astrov, Igor
;
Bauk, Sanja
Promet - Traffic and Transportation
2024
/
p. 1006 - 1021
https://doi.org/10.7307/ptt.v36i6.797
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
book article
Simulating Cyber-Attacks on the Unmanned Sea-Surface Vessel’s Rudder Controller
Astrov, Igor
;
Bauk, Sanja
Maritime Cybersecurity
2025
/
p. 83-102
https://doi.org/10.1007/978-3-031-87290-7_5
book article
5
journal article
Utilising journey mapping and crime scripting to combat cybercrime and cyber warfare attacks
Sõmer, Tiia
;
Hallaq, Bil
;
Watson, Tim
Journal of information warfare
2016
/
p. 39-49
https://www.jinfowar.com/journal-issue/volume-15-issue-4
journal article
Related publications
1
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
Number of records 5, displaying
1 - 5
keyword
122
1.
cyber-attack
2.
cyber-attack pathways
3.
attack detection
4.
attack graphs
5.
attack model
6.
attack sophistication
7.
attack trees
8.
attack vectors
9.
attack visualisation
10.
botnet attack
11.
corrosive attack
12.
Denial of Service (DoS) attack
13.
discovery of attack scenarios
14.
DoS attack
15.
false data injection attack
16.
fault-injection attack
17.
ghost injection attack
18.
highly targeted attack
19.
iming side-channel attack
20.
Low-and-Slow DoS attack
21.
manufacturing-time attack
22.
oracle-less attack
23.
quantum attack
24.
ransomware attack
25.
removal attack
26.
Return of the Coppersmith’s Attack (ROCA)
27.
return of the Coppersmith’s attack vulnerability
28.
SAT attack
29.
SAT-based attack
30.
side-channel attack
31.
autonomous vehicle cyber range
32.
cloud-based cyber-physical systems (C2PS)
33.
cognitive cyber warfare
34.
cyber
35.
Cyber “Maastricht”
36.
cyber architecture
37.
cyber attacks
38.
cyber battle damage assessment
39.
Cyber Bio-analytical Physical Systems (CBPSs)
40.
cyber challenge
41.
cyber command
42.
Cyber Command organisational structure
43.
cyber conflict
44.
cyber contingency
45.
cyber crime
46.
cyber crime pathways
47.
cyber crime scripting
48.
Cyber crisis management
49.
cyber defence
50.
cyber defence exercise
51.
cyber defence exercises
52.
cyber defense education
53.
cyber defense exercise
54.
cyber defense exercises
55.
cyber dependence
56.
cyber diplomacy
57.
cyber exercise
58.
cyber hygiene
59.
cyber impact assessment
60.
cyber incidents
61.
cyber insurance
62.
cyber intrusion detection
63.
cyber kill chain
64.
cyber operation
65.
cyber operation officer
66.
cyber operations
67.
cyber operations exercises
68.
cyber physical energy systems
69.
cyber physical power system (CPPS)
70.
Cyber Physical Production System
71.
cyber physical production systems (CPPS)
72.
cyber physical social system
73.
cyber physical social systems (cpss)
74.
cyber physical system
75.
cyber power Europe
76.
cyber ranges
77.
cyber red teaming
78.
cyber resilience
79.
cyber risk
80.
cyber security
81.
cyber security education
82.
cyber security exercises
83.
cyber security monitoring
84.
cyber security strategies
85.
cyber situational awareness
86.
cyber stability
87.
cyber team communication
88.
cyber threat
89.
cyber threat communication
90.
Cyber Threat Intelligence
91.
cyber threats
92.
cyber war
93.
cyber warfare
94.
cyber warriors
95.
cyber weapons
96.
cyber-insurance
97.
cyber-paternalism
98.
cyber-physical energy systems
99.
cyber-physical social system (CPSS)
100.
cyber-physical system
101.
Cyber-Physical System (CPS)
102.
cyber-physical system logistic robot
103.
cyber-physical systems
104.
Cyber-Physical Systems (CPS)
105.
cyber-risks
106.
cyber-security
107.
cyber-space nexus
108.
cyber-vulnerabilities
109.
Defensive Cyber Operations
110.
EU cyber policy
111.
international cyber norms
112.
military cyber
113.
mobile cyber-physical system
114.
national cyber security strategy
115.
NATO cyber operations definitions
116.
NATO Cyber Range
117.
Offensive Cyber Operations
118.
perceived cyber risks and threats
119.
responsive cyber defence
120.
Socio-Cyber-Physical Systems
121.
space cyber range
122.
technical cyber exercise
subject term
3
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT