Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
cyber security (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
26
Look more..
(2/194)
Export
export all inquiry results
(26)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
26
book article EST
/
book article ENG
Variable self-efficacy as a measurement for behaviors in cyber security operations
Lugo, Ricardo Gregorio
;
Knox, Benjamin James
;
Josok, Oyvind
;
Sütterlin, Stefan
Augmented Cognition. Human Cognition and Behavior : 14th International Conference, AC 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings, Part II
2020
/
p. 395-404
https://doi.org/10.1007/978-3-030-50439-7_27
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Number of records 26, displaying
26 - 26
previous
1
2
next
keyword
189
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security strategies
6.
cyber-security
7.
national cyber security strategy
8.
autonomous vehicle cyber range
9.
cloud-based cyber-physical systems (C2PS)
10.
cognitive cyber warfare
11.
cyber
12.
Cyber “Maastricht”
13.
cyber architecture
14.
cyber attacks
15.
cyber battle damage assessment
16.
Cyber Bio-analytical Physical Systems (CBPSs)
17.
cyber challenge
18.
cyber command
19.
cyber conflict
20.
cyber contingency
21.
cyber crime
22.
cyber crime pathways
23.
cyber crime scripting
24.
Cyber crisis management
25.
cyber defence
26.
cyber defence exercise
27.
cyber defence exercises
28.
cyber defense education
29.
cyber defense exercise
30.
cyber defense exercises
31.
cyber dependence
32.
cyber diplomacy
33.
cyber exercise
34.
cyber hygiene
35.
cyber impact assessment
36.
cyber incidents
37.
cyber insurance
38.
cyber intrusion detection
39.
cyber kill chain
40.
cyber operation
41.
cyber operation officer
42.
cyber operations
43.
cyber physical energy systems
44.
cyber physical power system (CPPS)
45.
Cyber Physical Production System
46.
cyber physical production systems (CPPS)
47.
cyber physical social system
48.
cyber physical social systems (cpss)
49.
cyber physical system
50.
cyber power Europe
51.
cyber ranges
52.
cyber red teaming
53.
cyber resilience
54.
cyber risk
55.
cyber situational awareness
56.
cyber stability
57.
cyber team communication
58.
cyber threat
59.
cyber threat communication
60.
cyber threats
61.
cyber war
62.
cyber warfare
63.
cyber warriors
64.
cyber weapons
65.
cyber-attack
66.
cyber-attack pathways
67.
cyber-insurance
68.
cyber-paternalism
69.
cyber-physical energy systems
70.
cyber-physical social system (CPSS)
71.
cyber-physical system
72.
Cyber-Physical System (CPS)
73.
cyber-physical system logistic robot
74.
cyber-physical systems
75.
Cyber-Physical Systems (CPS)
76.
cyber-risks
77.
cyber-space nexus
78.
cyber-vulnerabilities
79.
Defensive Cyber Operations
80.
EU cyber policy
81.
international cyber norms
82.
military cyber
83.
mobile cyber-physical system
84.
NATO cyber operations definitions
85.
NATO Cyber Range
86.
Offensive Cyber Operations
87.
perceived cyber risks and threats
88.
responsive cyber defence
89.
Socio-Cyber-Physical Systems
90.
space cyber range
91.
technical cyber exercise
92.
ad-hoc sensor networks security
93.
Automatic Security Verification
94.
Blockchain security
95.
cache security
96.
communication system security
97.
comprehensive system of economic security
98.
computer security
99.
cooperative security dilemma
100.
data security
101.
development of security cameras
102.
digital security practices
103.
drinking water security
104.
economic security
105.
economic security of enterprise
106.
emotional security
107.
energy security
108.
energy security indicator
109.
Estonian information security standard
110.
graded security
111.
hardware security
112.
hardware security primitive
113.
human security
114.
information security
115.
information security and privacy
116.
internal security
117.
international security
118.
investment and innovation security
119.
IPv6 security
120.
IT security
121.
IT security management
122.
job security
123.
long-term security
124.
metadata model for security measures
125.
Middle Eastern security
126.
Mobile security
127.
national security
128.
NATO. Science for Peace and Security Program
129.
network security
130.
network security monitoring
131.
OSCE (Organization for Security and Co-operation in Europe)
132.
passenger’s security
133.
policy-based routing security
134.
political and security cultures
135.
post-quantum security
136.
power system security
137.
quantitative security
138.
regional security
139.
RISC-V Security Verification
140.
safety and security testing
141.
security
142.
security adaptation
143.
security alert prioritization
144.
security analysis
145.
security and justice (AFSJ)
146.
Security and political science
147.
security and privacy
148.
security and privacy in smart grids
149.
Security Assertion Mining
150.
security closure
151.
Security Coverage
152.
security dataset
153.
security dilemma
154.
Security evaluation
155.
security evaluation instruments
156.
Security limitations
157.
security log analysis
158.
security management
159.
security model
160.
security monitoring
161.
security notion
162.
security objectives
163.
security of data
164.
security of supply
165.
security operation center
166.
security operations center
167.
security patterns
168.
security policy
169.
security problem definition
170.
security proof
171.
security protocols
172.
security requirements
173.
security requirements engineering
174.
security risk assessment
175.
security risk management
176.
security risks
177.
security strategies
178.
security systems for military objects
179.
security testing
180.
security training
181.
security verification
182.
security-by-design
183.
social security planning
184.
societal security
185.
system of economic security
186.
system security
187.
terrorism security
188.
transmission System Security
189.
voting privacy and security
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT