Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
cyber kill chain (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/151)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
A case study about the use and evaluation of cyber deceptive methods against highly targeted attacks
Farar, Alexandria Elaine
;
Bahsi, Hayretdin
;
Blumbergs, Bernhards
2017 International Conference On Cyber Incident Response, Coordination, Containment and Control, Cyber Incident 2017 : London, United Kingdom, 19 June 2017 through 20 June 2017
2017
/
[7] p. : ill
https://doi.org/10.1109/CYBERINCIDENT.2017.8054640
book article
Number of records 1, displaying
1 - 1
keyword
148
1.
cyber kill chain
2.
alkyl ester chain length
3.
ascending chain condition
4.
block chain
5.
block-chain
6.
chain model
7.
chain of check points
8.
chain of key factors (KFs)
9.
concept chain
10.
Continuous Time Markov Chain
11.
demand & supply chain management
12.
digital supply chain
13.
global value chain
14.
green supply chain management
15.
legume supply chain
16.
Logistics and supply chain management
17.
long chain fatty acid (LCFA) inhibition
18.
Markov chain
19.
Markov chain process
20.
multi-chain blockchains
21.
oil shale value chain
22.
receiver chain
23.
reconfigurable scan-chain
24.
respiratory chain
25.
reverse transcription polymerase chain reaction
26.
risk event chain analyses
27.
road construction supply chain
28.
service supply chain
29.
services value chain collaboration
30.
short chain branching (SCB)
31.
short chain fatty acids
32.
short chain fatty acids (SCFA)
33.
short-chain fatty acids
34.
supplay chain
35.
supply chain
36.
supply chain (SC)
37.
supply chain competences
38.
supply chain curricula
39.
supply chain engineering
40.
supply chain integration
41.
supply chain management
42.
supply chain model framework
43.
supply chain operations reference (SCOR)
44.
supply chain operations reference (SCOR) model
45.
supply chain planning
46.
supply chain risk
47.
supply chain risk management
48.
supply chain simulation
49.
supply chain skills
50.
supply chain traceability
51.
sustainable supply chain management
52.
sustainalble supply chain management
53.
teaching supply chain management
54.
transmit chain
55.
transparent supply chain
56.
trophic chain
57.
value adding REE chain
58.
value chain
59.
autonomous vehicle cyber range
60.
cloud-based cyber-physical systems (C2PS)
61.
cognitive cyber warfare
62.
cyber
63.
Cyber “Maastricht”
64.
cyber architecture
65.
cyber attacks
66.
cyber battle damage assessment
67.
Cyber Bio-analytical Physical Systems (CBPSs)
68.
cyber challenge
69.
cyber command
70.
cyber conflict
71.
cyber contingency
72.
cyber crime
73.
cyber crime pathways
74.
cyber crime scripting
75.
Cyber crisis management
76.
cyber defence
77.
cyber defence exercise
78.
cyber defence exercises
79.
cyber defense education
80.
cyber defense exercise
81.
cyber defense exercises
82.
cyber dependence
83.
cyber diplomacy
84.
cyber exercise
85.
cyber hygiene
86.
cyber impact assessment
87.
cyber incidents
88.
cyber insurance
89.
cyber intrusion detection
90.
cyber operation
91.
cyber operation officer
92.
cyber operations
93.
cyber physical energy systems
94.
cyber physical power system (CPPS)
95.
Cyber Physical Production System
96.
cyber physical production systems (CPPS)
97.
cyber physical social system
98.
cyber physical social systems (cpss)
99.
cyber physical system
100.
cyber power Europe
101.
cyber ranges
102.
cyber red teaming
103.
cyber resilience
104.
cyber risk
105.
cyber security
106.
cyber security education
107.
cyber security exercises
108.
cyber security monitoring
109.
cyber security strategies
110.
cyber situational awareness
111.
cyber stability
112.
cyber team communication
113.
cyber threat
114.
cyber threat communication
115.
cyber threats
116.
cyber war
117.
cyber warfare
118.
cyber warriors
119.
cyber weapons
120.
cyber-attack
121.
cyber-attack pathways
122.
cyber-insurance
123.
cyber-paternalism
124.
cyber-physical energy systems
125.
cyber-physical social system (CPSS)
126.
cyber-physical system
127.
Cyber-Physical System (CPS)
128.
cyber-physical system logistic robot
129.
cyber-physical systems
130.
Cyber-Physical Systems (CPS)
131.
cyber-risks
132.
cyber-security
133.
cyber-space nexus
134.
cyber-vulnerabilities
135.
Defensive Cyber Operations
136.
EU cyber policy
137.
international cyber norms
138.
military cyber
139.
mobile cyber-physical system
140.
national cyber security strategy
141.
NATO cyber operations definitions
142.
NATO Cyber Range
143.
Offensive Cyber Operations
144.
perceived cyber risks and threats
145.
responsive cyber defence
146.
Socio-Cyber-Physical Systems
147.
space cyber range
148.
technical cyber exercise
subject term
3
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT