Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
cyber-security (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/204)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Governance of cyber-security in Internet-based elections [Online resource]
Krimmer, Robert Johannes
;
Rincon Mendez, Angelica Marina
;
Meyerhoff Nielsen, Morten
Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology
2015
/
p. 7-9
http://cybercentre.cs.ttu.ee/en/icr2015/
book article
Number of records 1, displaying
1 - 1
keyword
199
1.
cyber-security
2.
cyber security
3.
cyber security education
4.
cyber security exercises
5.
cyber security monitoring
6.
cyber security strategies
7.
national cyber security strategy
8.
autonomous vehicle cyber range
9.
cloud-based cyber-physical systems (C2PS)
10.
cognitive cyber warfare
11.
cyber
12.
Cyber “Maastricht”
13.
cyber architecture
14.
cyber attacks
15.
cyber battle damage assessment
16.
Cyber Bio-analytical Physical Systems (CBPSs)
17.
cyber challenge
18.
cyber command
19.
Cyber Command organisational structure
20.
cyber conflict
21.
cyber contingency
22.
cyber crime
23.
cyber crime pathways
24.
cyber crime scripting
25.
Cyber crisis management
26.
cyber defence
27.
cyber defence exercise
28.
cyber defence exercises
29.
cyber defense education
30.
cyber defense exercise
31.
cyber defense exercises
32.
cyber dependence
33.
cyber diplomacy
34.
cyber exercise
35.
cyber hygiene
36.
cyber impact assessment
37.
cyber incidents
38.
cyber insurance
39.
cyber intrusion detection
40.
cyber kill chain
41.
cyber operation
42.
cyber operation officer
43.
cyber operations
44.
cyber operations exercises
45.
cyber physical energy systems
46.
cyber physical power system (CPPS)
47.
Cyber Physical Production System
48.
cyber physical production systems (CPPS)
49.
cyber physical social system
50.
cyber physical social systems (cpss)
51.
cyber physical system
52.
Cyber Planning tool
53.
cyber power Europe
54.
cyber ranges
55.
cyber red teaming
56.
cyber resilience
57.
cyber risk
58.
cyber situational awareness
59.
cyber stability
60.
cyber team communication
61.
cyber threat
62.
cyber threat communication
63.
Cyber Threat Intelligence
64.
cyber threats
65.
cyber war
66.
cyber warfare
67.
cyber warriors
68.
cyber weapons
69.
cyber-attack
70.
cyber-attack pathways
71.
Cyber-attacks
72.
cyber-insurance
73.
cyber-paternalism
74.
cyber-physical energy systems
75.
cyber-physical social system (CPSS)
76.
cyber-physical system
77.
Cyber-Physical System (CPS)
78.
cyber-physical system logistic robot
79.
cyber-physical systems
80.
Cyber-Physical Systems (CPS)
81.
cyber-risks
82.
cyber-space nexus
83.
cyber-vulnerabilities
84.
Defensive Cyber Operations
85.
EU cyber policy
86.
international cyber norms
87.
military cyber
88.
mobile cyber-physical system
89.
NATO cyber operations definitions
90.
NATO Cyber Range
91.
Offensive Cyber Operations
92.
perceived cyber risks and threats
93.
responsive cyber defence
94.
Socio-Cyber-Physical Systems
95.
space cyber range
96.
technical cyber exercise
97.
Visualising Cyber Planning
98.
ad-hoc sensor networks security
99.
Automatic Security Verification
100.
Blockchain security
101.
cache security
102.
communication system security
103.
comprehensive system of economic security
104.
computer security
105.
cooperative security dilemma
106.
data and information security
107.
data security
108.
development of security cameras
109.
digital security practices
110.
drinking water security
111.
economic security
112.
economic security of enterprise
113.
emotional security
114.
energy security
115.
energy security indicator
116.
Estonian information security standard
117.
graded security
118.
hardware security
119.
hardware security primitive
120.
Homeland security
121.
human security
122.
information security
123.
information security and privacy
124.
internal security
125.
international security
126.
investment and innovation security
127.
IPv6 security
128.
IT security
129.
IT security management
130.
job security
131.
long-term security
132.
metadata model for security measures
133.
Middle Eastern security
134.
Mobile security
135.
national security
136.
NATO. Science for Peace and Security Program
137.
network security
138.
network security monitoring
139.
OSCE (Organization for Security and Co-operation in Europe)
140.
passenger’s security
141.
policy-based routing security
142.
political and security cultures
143.
post-quantum security
144.
power system security
145.
quantitative security
146.
regional security
147.
RISC-V Security Verification
148.
Safety and Security in Sea Transportation
149.
safety and security testing
150.
security
151.
security adaptation
152.
security alert prioritization
153.
security analysis
154.
security and justice (AFSJ)
155.
Security and political science
156.
security and privacy
157.
security and privacy in smart grids
158.
Security Assertion Mining
159.
security closure
160.
Security Coverage
161.
security dataset
162.
security dilemma
163.
Security evaluation
164.
security evaluation instruments
165.
Security limitations
166.
security log analysis
167.
security management
168.
security model
169.
security monitoring
170.
security notion
171.
security objectives
172.
security of data
173.
security of supply
174.
security operation center
175.
security operations center
176.
security patterns
177.
security policy
178.
security problem definition
179.
security proof
180.
security protocols
181.
security requirements
182.
security requirements engineering
183.
security risk assessment
184.
security risk management
185.
security risks
186.
security science and technology
187.
security strategies
188.
security systems for military objects
189.
security testing
190.
security training
191.
security verification
192.
security-by-design
193.
social security planning
194.
societal security
195.
system of economic security
196.
system security
197.
terrorism security
198.
transmission System Security
199.
voting privacy and security
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT