Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
cyber threat (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/105)
Export
export all inquiry results
(3)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Aligning Estonian and Japanese efforts in building norms in cyberspace
Osula, Anna-Maria
So Far, Yet So Close : Japanese and Estonian cybersecurity : policy perspectives and cooperations : report
2021
/
p. 22-29
https://icds.ee/wp-content/uploads/2021/05/ICDS_Report_So_Far_Yet_So_Close_Roigas_Jermalavicius_May_2021.pdf
book article
2
book article
Expert knowledge elicitation for skill level categorization of attack paths
Mezešova, Terezia
;
Bahsi, Hayretdin
2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
2019
/
8 p. : tab
https://doi.org/10.1109/CyberSecPODS.2019.8885192
book article
3
book article EST
/
book article ENG
System for determination of legal responsibility/penalty for a cybersecurity breach
Hovorushchenko, Tetiana
;
Herts, Alla
;
Boyarchuk, Artem
;
Pavlova, Olga
ITTAP 2022 - Proceedings of the 2nd International Workshop on Information Technologies: Theoretical and Applied Problems
2022
/
p. 233-240
https://ceur-ws.org/Vol-3309/short9.pdf
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Number of records 3, displaying
1 - 3
keyword
102
1.
cyber threat
2.
cyber threat communication
3.
Cyber Threat Intelligence
4.
cyber threats
5.
perceived cyber risks and threats
6.
asymmetric threat
7.
group threat theory
8.
hybrid threat
9.
military threat
10.
threat identification
11.
Threat modeling
12.
threat modeling (TM)
13.
threat modelling
14.
autonomous vehicle cyber range
15.
cloud-based cyber-physical systems (C2PS)
16.
cognitive cyber warfare
17.
cyber
18.
Cyber “Maastricht”
19.
cyber architecture
20.
cyber attacks
21.
cyber battle damage assessment
22.
Cyber Bio-analytical Physical Systems (CBPSs)
23.
cyber challenge
24.
cyber command
25.
Cyber Command organisational structure
26.
cyber conflict
27.
cyber contingency
28.
cyber crime
29.
cyber crime pathways
30.
cyber crime scripting
31.
Cyber crisis management
32.
cyber defence
33.
cyber defence exercise
34.
cyber defence exercises
35.
cyber defense education
36.
cyber defense exercise
37.
cyber defense exercises
38.
cyber dependence
39.
cyber diplomacy
40.
cyber exercise
41.
cyber hygiene
42.
cyber impact assessment
43.
cyber incidents
44.
cyber insurance
45.
cyber intrusion detection
46.
cyber kill chain
47.
cyber operation
48.
cyber operation officer
49.
cyber operations
50.
cyber operations exercises
51.
cyber physical energy systems
52.
cyber physical power system (CPPS)
53.
Cyber Physical Production System
54.
cyber physical production systems (CPPS)
55.
cyber physical social system
56.
cyber physical social systems (cpss)
57.
cyber physical system
58.
cyber power Europe
59.
cyber ranges
60.
cyber red teaming
61.
cyber resilience
62.
cyber risk
63.
cyber security
64.
cyber security education
65.
cyber security exercises
66.
cyber security monitoring
67.
cyber security strategies
68.
cyber situational awareness
69.
cyber stability
70.
cyber team communication
71.
cyber war
72.
cyber warfare
73.
cyber warriors
74.
cyber weapons
75.
cyber-attack
76.
cyber-attack pathways
77.
cyber-insurance
78.
cyber-paternalism
79.
cyber-physical energy systems
80.
cyber-physical social system (CPSS)
81.
cyber-physical system
82.
Cyber-Physical System (CPS)
83.
cyber-physical system logistic robot
84.
cyber-physical systems
85.
Cyber-Physical Systems (CPS)
86.
cyber-risks
87.
cyber-security
88.
cyber-space nexus
89.
cyber-vulnerabilities
90.
Defensive Cyber Operations
91.
EU cyber policy
92.
international cyber norms
93.
military cyber
94.
mobile cyber-physical system
95.
national cyber security strategy
96.
NATO cyber operations definitions
97.
NATO Cyber Range
98.
Offensive Cyber Operations
99.
responsive cyber defence
100.
Socio-Cyber-Physical Systems
101.
space cyber range
102.
technical cyber exercise
subject term
3
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT