Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber attacks (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
6
Look more..
(2/119)
Export
export all inquiry results
(6)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
A cyber attack taxonomy for microgrid systems
Bahsi, Hayretdin
;
Dola, Henry Ochieng
;
Khalil, Shaymaa Mamdouh
;
Korõtko, Tarmo
2022 17th Annual System of Systems Engineering Conference (SOSE)
2022
/
p. 324-331
https://doi.org/10.1109/SOSE55472.2022.9812642
book article
2
book article
Cyber attacks on power system automation and protection and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Presekal, Alfan
;
Palensky, Peter
Proceedings of 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 26-28 October, 2020
2020
/
p. 247–254
https://doi.org/10.1109/ISGT-Europe47291.2020.9248840
book article
3
book article
Cyber attacks on protective relays in digital substations and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Palensky, Peter
8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems(MSCPES), Virtual Workshop, online, from April 21, 2020 : proceedings
2020
/
6 p. : ill
https://doi.org/10.1109/MSCPES49613.2020.9133698
book article
4
book article
Cyber operations during the conflict in Ukraine and the role of international law
Valuch, Josef
;
Hamulak, Ondrej
The use of force against Ukraine and international law : jus ad bellum, jus in bello, jus post bellum
2018
/
p. 215-235
https://doi.org/10.1007/978-94-6265-222-4_10
book article
5
journal article EST
/
journal article ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
6
newspaper article
In search of a coherent international approach to governing technologies [online resource]
Osula, Anna-Maria
Digital frontiers
2021
In search of a coherent international approach to governing technologies
newspaper article
Number of records 6, displaying
1 - 6
keyword
116
1.
cyber attacks
2.
Cyber-attacks
3.
amplification attacks
4.
architectural attacks
5.
attacks
6.
cache attacks
7.
data attacks
8.
DDoS attacks
9.
denial of service attacks
10.
functionality attacks
11.
IP attacks
12.
jamming attacks
13.
offline guessing attacks
14.
oracle-guided (OG) attacks
15.
oracle-guided attacks
16.
oracle-less (OL) and oracle-guided (OG) attacks
17.
oracle-less (OL) attacks
18.
oracle-less attacks
19.
process-aware attacks
20.
side-channel attacks
21.
targeted attacks
22.
autonomous vehicle cyber range
23.
cloud-based cyber-physical systems (C2PS)
24.
cognitive cyber warfare
25.
cyber
26.
Cyber “Maastricht”
27.
cyber architecture
28.
cyber battle damage assessment
29.
Cyber Bio-analytical Physical Systems (CBPSs)
30.
cyber challenge
31.
cyber command
32.
Cyber Command organisational structure
33.
cyber conflict
34.
cyber contingency
35.
cyber crime
36.
cyber crime pathways
37.
cyber crime scripting
38.
Cyber crisis management
39.
cyber defence
40.
cyber defence exercise
41.
cyber defence exercises
42.
cyber defense education
43.
cyber defense exercise
44.
cyber defense exercises
45.
cyber dependence
46.
cyber diplomacy
47.
cyber exercise
48.
cyber hygiene
49.
cyber impact assessment
50.
cyber incidents
51.
cyber insurance
52.
cyber intrusion detection
53.
cyber kill chain
54.
cyber operation
55.
cyber operation officer
56.
cyber operations
57.
cyber operations exercises
58.
cyber physical energy systems
59.
cyber physical power system (CPPS)
60.
Cyber Physical Production System
61.
cyber physical production systems (CPPS)
62.
cyber physical social system
63.
cyber physical social systems (cpss)
64.
cyber physical system
65.
Cyber Planning tool
66.
cyber power Europe
67.
cyber ranges
68.
cyber red teaming
69.
cyber resilience
70.
cyber risk
71.
cyber security
72.
cyber security education
73.
cyber security exercises
74.
cyber security monitoring
75.
cyber security strategies
76.
cyber situational awareness
77.
cyber stability
78.
cyber team communication
79.
cyber threat
80.
cyber threat communication
81.
Cyber Threat Intelligence
82.
cyber threats
83.
cyber war
84.
cyber warfare
85.
cyber warriors
86.
cyber weapons
87.
cyber-attack
88.
cyber-attack pathways
89.
cyber-insurance
90.
cyber-paternalism
91.
cyber-physical energy systems
92.
cyber-physical social system (CPSS)
93.
cyber-physical system
94.
Cyber-Physical System (CPS)
95.
cyber-physical system logistic robot
96.
cyber-physical systems
97.
Cyber-Physical Systems (CPS)
98.
cyber-risks
99.
cyber-security
100.
cyber-space nexus
101.
cyber-vulnerabilities
102.
Defensive Cyber Operations
103.
EU cyber policy
104.
international cyber norms
105.
military cyber
106.
mobile cyber-physical system
107.
national cyber security strategy
108.
NATO cyber operations definitions
109.
NATO Cyber Range
110.
Offensive Cyber Operations
111.
perceived cyber risks and threats
112.
responsive cyber defence
113.
Socio-Cyber-Physical Systems
114.
space cyber range
115.
technical cyber exercise
116.
Visualising Cyber Planning
subject term
3
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT