Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber warfare (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/100)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Application of journey mapping and crime scripting to the phenomenon of trolling
Sõmer, Tiia
;
Tiido, Anna
;
Sample, Char
;
Mitchener-Nissen, Timothy
Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018 : National Defence University, Washington DC, USA, 6-9 March 2018
2018
/
p. 465–473 : ill
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051737104&partnerID=40&md5=7bed8e3a8250f0083f8c7702e27c6839
https://www.proceedings.com/38822.html
book article
Seotud publikatsioonid
1
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
2
book article
Artificial intelligence within the military domain and cyber warfare
Hallaq, Bil
;
Sõmer, Tiia
;
Osula, Anna-Maria
;
Ngo, Kim
;
Mitchener-Nissen, Timothy
Proceedings of the 16th European Conference on Cyber Warfare and Security, ECCWS 2017 : hosted by University College Dublin, Ireland, 29-30 June 2017
2017
/
p. 153-156
https://www.scopus.com/record/display.uri?eid=2-s2.0-85028013021&origin=resultslist&zone=contextBox
book article
3
journal article
Utilising journey mapping and crime scripting to combat cybercrime and cyber warfare attacks
Sõmer, Tiia
;
Hallaq, Bil
;
Watson, Tim
Journal of information warfare
2016
/
p. 39-49
https://www.jinfowar.com/journal-issue/volume-15-issue-4
journal article
Seotud publikatsioonid
1
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
Number of records 3, displaying
1 - 3
keyword
97
1.
cognitive cyber warfare
2.
cyber warfare
3.
chemical warfare agent
4.
chemical warfare agent degradation products
5.
chemical warfare agents
6.
global knowledge warfare
7.
hybrid warfare
8.
ideological warfare
9.
information warfare
10.
knowledge warfare
11.
psychological warfare
12.
warfare
13.
autonomous vehicle cyber range
14.
cloud-based cyber-physical systems (C2PS)
15.
cyber
16.
Cyber “Maastricht”
17.
cyber architecture
18.
cyber attacks
19.
cyber battle damage assessment
20.
Cyber Bio-analytical Physical Systems (CBPSs)
21.
cyber challenge
22.
cyber command
23.
cyber conflict
24.
cyber contingency
25.
cyber crime
26.
cyber crime pathways
27.
cyber crime scripting
28.
Cyber crisis management
29.
cyber defence
30.
cyber defence exercise
31.
cyber defence exercises
32.
cyber defense education
33.
cyber defense exercise
34.
cyber defense exercises
35.
cyber dependence
36.
cyber diplomacy
37.
cyber exercise
38.
cyber hygiene
39.
cyber impact assessment
40.
cyber incidents
41.
cyber insurance
42.
cyber intrusion detection
43.
cyber kill chain
44.
cyber operation
45.
cyber operation officer
46.
cyber operations
47.
cyber physical energy systems
48.
cyber physical power system (CPPS)
49.
Cyber Physical Production System
50.
cyber physical production systems (CPPS)
51.
cyber physical social system
52.
cyber physical social systems (cpss)
53.
cyber physical system
54.
cyber power Europe
55.
cyber ranges
56.
cyber red teaming
57.
cyber resilience
58.
cyber risk
59.
cyber security
60.
cyber security education
61.
cyber security exercises
62.
cyber security strategies
63.
cyber situational awareness
64.
cyber stability
65.
cyber team communication
66.
cyber threat
67.
cyber threat communication
68.
cyber threats
69.
cyber war
70.
cyber warriors
71.
cyber weapons
72.
cyber-attack
73.
cyber-attack pathways
74.
cyber-insurance
75.
cyber-paternalism
76.
cyber-physical energy systems
77.
cyber-physical social system (CPSS)
78.
cyber-physical system
79.
Cyber-Physical System (CPS)
80.
cyber-physical system logistic robot
81.
cyber-physical systems
82.
Cyber-Physical Systems (CPS)
83.
cyber-risks
84.
cyber-security
85.
cyber-vulnerabilities
86.
Defensive Cyber Operations
87.
EU cyber policy
88.
international cyber norms
89.
military cyber
90.
mobile cyber-physical system
91.
national cyber security strategy
92.
NATO Cyber Range
93.
Offensive Cyber Operations
94.
perceived cyber risks and threats
95.
responsive cyber defence
96.
Socio-Cyber-Physical Systems
97.
technical cyber exercise
subject term
3
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT