Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber attacks (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
6
Look more..
(2/109)
Export
export all inquiry results
(6)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
A cyber attack taxonomy for microgrid systems
Bahsi, Hayretdin
;
Dola, Henry Ochieng
;
Khalil, Shaymaa Mamdouh
;
Korõtko, Tarmo
2022 17th Annual System of Systems Engineering Conference (SOSE)
2022
/
p. 324-331
https://doi.org/10.1109/SOSE55472.2022.9812642
book article
2
book article
Cyber attacks on power system automation and protection and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Presekal, Alfan
;
Palensky, Peter
Proceedings of 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 26-28 October, 2020
2020
/
p. 247–254
https://doi.org/10.1109/ISGT-Europe47291.2020.9248840
book article
3
book article
Cyber attacks on protective relays in digital substations and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Palensky, Peter
8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems(MSCPES), Virtual Workshop, online, from April 21, 2020 : proceedings
2020
/
6 p. : ill
https://doi.org/10.1109/MSCPES49613.2020.9133698
book article
4
book article
Cyber operations during the conflict in Ukraine and the role of international law
Valuch, Josef
;
Hamulak, Ondrej
The use of force against Ukraine and international law : jus ad bellum, jus in bello, jus post bellum
2018
/
p. 215-235
https://doi.org/10.1007/978-94-6265-222-4_10
book article
5
journal article EST
/
journal article ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
6
newspaper article
In search of a coherent international approach to governing technologies [online resource]
Osula, Anna-Maria
Digital frontiers
2021
In search of a coherent international approach to governing technologies
newspaper article
Number of records 6, displaying
1 - 6
keyword
106
1.
cyber attacks
2.
architectural attacks
3.
attacks
4.
cache attacks
5.
data attacks
6.
DDoS attacks
7.
denial of service attacks
8.
functionality attacks
9.
IP attacks
10.
jamming attacks
11.
offline guessing attacks
12.
oracle-guided (OG) attacks
13.
oracle-guided attacks
14.
oracle-less (OL) and oracle-guided (OG) attacks
15.
oracle-less (OL) attacks
16.
oracle-less attacks
17.
process-aware attacks
18.
side-channel attacks
19.
targeted attacks
20.
autonomous vehicle cyber range
21.
cloud-based cyber-physical systems (C2PS)
22.
cognitive cyber warfare
23.
cyber
24.
Cyber “Maastricht”
25.
cyber architecture
26.
cyber battle damage assessment
27.
Cyber Bio-analytical Physical Systems (CBPSs)
28.
cyber challenge
29.
cyber command
30.
cyber conflict
31.
cyber contingency
32.
cyber crime
33.
cyber crime pathways
34.
cyber crime scripting
35.
Cyber crisis management
36.
cyber defence
37.
cyber defence exercise
38.
cyber defence exercises
39.
cyber defense education
40.
cyber defense exercise
41.
cyber defense exercises
42.
cyber dependence
43.
cyber diplomacy
44.
cyber exercise
45.
cyber hygiene
46.
cyber impact assessment
47.
cyber incidents
48.
cyber insurance
49.
cyber intrusion detection
50.
cyber kill chain
51.
cyber operation
52.
cyber operation officer
53.
cyber operations
54.
cyber physical energy systems
55.
cyber physical power system (CPPS)
56.
Cyber Physical Production System
57.
cyber physical production systems (CPPS)
58.
cyber physical social system
59.
cyber physical social systems (cpss)
60.
cyber physical system
61.
cyber power Europe
62.
cyber ranges
63.
cyber red teaming
64.
cyber resilience
65.
cyber risk
66.
cyber security
67.
cyber security education
68.
cyber security exercises
69.
cyber security monitoring
70.
cyber security strategies
71.
cyber situational awareness
72.
cyber stability
73.
cyber team communication
74.
cyber threat
75.
cyber threat communication
76.
cyber threats
77.
cyber war
78.
cyber warfare
79.
cyber warriors
80.
cyber weapons
81.
cyber-attack
82.
cyber-attack pathways
83.
cyber-insurance
84.
cyber-paternalism
85.
cyber-physical energy systems
86.
cyber-physical social system (CPSS)
87.
cyber-physical system
88.
Cyber-Physical System (CPS)
89.
cyber-physical system logistic robot
90.
cyber-physical systems
91.
Cyber-Physical Systems (CPS)
92.
cyber-risks
93.
cyber-security
94.
cyber-vulnerabilities
95.
Defensive Cyber Operations
96.
EU cyber policy
97.
international cyber norms
98.
military cyber
99.
mobile cyber-physical system
100.
national cyber security strategy
101.
NATO Cyber Range
102.
Offensive Cyber Operations
103.
perceived cyber risks and threats
104.
responsive cyber defence
105.
Socio-Cyber-Physical Systems
106.
technical cyber exercise
subject term
3
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT