Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
cyber security strategies (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/240)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
book article
Number of records 1, displaying
1 - 1
keyword
235
1.
cyber security strategies
2.
security strategies
3.
cyber security
4.
cyber security education
5.
cyber security exercises
6.
cyber security monitoring
7.
cyber-security
8.
national cyber security strategy
9.
airport strategies
10.
co-design strategies
11.
collaboration strategies
12.
coping strategies
13.
course development strategies
14.
cultural adjustment strategies
15.
cultural tourism strategies
16.
digital strategies
17.
Educational strategies
18.
e-Government policies and strategies
19.
energy management strategies (EMS)
20.
enterprise strategies
21.
EoL strategies
22.
EU policies and strategies
23.
European firefighting strategies
24.
graph and tree search strategies
25.
hybrid strategies
26.
innovation in processing strategies
27.
management strategies
28.
marketing strategies
29.
mitigation strategies
30.
mitigation strategies of UHI effect
31.
passive design strategies
32.
portfolio of strategies
33.
questioning strategies
34.
regional innovation strategies on smart specialization (RIS3)
35.
research strategies
36.
smart specialization strategies (S3)
37.
strategies
38.
strategies and concepts of bioinspired designs
39.
strategies for human resource and local policies
40.
strategies of inquiry
41.
suboptimal feedback strategies
42.
sub-optimal feedback strategies
43.
synthesis strategies
44.
teaching strategies
45.
autonomous vehicle cyber range
46.
cloud-based cyber-physical systems (C2PS)
47.
cognitive cyber warfare
48.
cyber
49.
Cyber “Maastricht”
50.
cyber architecture
51.
cyber attacks
52.
cyber battle damage assessment
53.
Cyber Bio-analytical Physical Systems (CBPSs)
54.
cyber challenge
55.
cyber command
56.
Cyber Command organisational structure
57.
cyber conflict
58.
cyber contingency
59.
cyber crime
60.
cyber crime pathways
61.
cyber crime scripting
62.
Cyber crisis management
63.
cyber defence
64.
cyber defence exercise
65.
cyber defence exercises
66.
cyber defense education
67.
cyber defense exercise
68.
cyber defense exercises
69.
cyber dependence
70.
cyber diplomacy
71.
cyber exercise
72.
cyber hygiene
73.
cyber impact assessment
74.
cyber incidents
75.
cyber insurance
76.
cyber intrusion detection
77.
cyber kill chain
78.
cyber operation
79.
cyber operation officer
80.
cyber operations
81.
cyber operations exercises
82.
cyber physical energy systems
83.
cyber physical power system (CPPS)
84.
Cyber Physical Production System
85.
cyber physical production systems (CPPS)
86.
cyber physical social system
87.
cyber physical social systems (cpss)
88.
cyber physical system
89.
Cyber Planning tool
90.
cyber power Europe
91.
cyber ranges
92.
cyber red teaming
93.
cyber resilience
94.
cyber risk
95.
cyber situational awareness
96.
cyber stability
97.
cyber team communication
98.
cyber threat
99.
cyber threat communication
100.
Cyber Threat Intelligence
101.
cyber threats
102.
cyber war
103.
cyber warfare
104.
cyber warriors
105.
cyber weapons
106.
cyber-attack
107.
cyber-attack pathways
108.
Cyber-attacks
109.
cyber-insurance
110.
cyber-paternalism
111.
cyber-physical energy systems
112.
cyber-physical social system (CPSS)
113.
cyber-physical system
114.
Cyber-Physical System (CPS)
115.
cyber-physical system logistic robot
116.
cyber-physical systems
117.
Cyber-Physical Systems (CPS)
118.
cyber-risks
119.
cyber-space nexus
120.
cyber-vulnerabilities
121.
Defensive Cyber Operations
122.
EU cyber policy
123.
international cyber norms
124.
military cyber
125.
mobile cyber-physical system
126.
NATO cyber operations definitions
127.
NATO Cyber Range
128.
Offensive Cyber Operations
129.
perceived cyber risks and threats
130.
responsive cyber defence
131.
Socio-Cyber-Physical Systems
132.
space cyber range
133.
technical cyber exercise
134.
Visualising Cyber Planning
135.
ad-hoc sensor networks security
136.
Automatic Security Verification
137.
Blockchain security
138.
cache security
139.
communication system security
140.
comprehensive system of economic security
141.
computer security
142.
cooperative security dilemma
143.
data and information security
144.
data security
145.
development of security cameras
146.
digital security practices
147.
drinking water security
148.
economic security
149.
economic security of enterprise
150.
emotional security
151.
energy security
152.
energy security indicator
153.
Estonian information security standard
154.
graded security
155.
hardware security
156.
hardware security primitive
157.
Homeland security
158.
human security
159.
information security
160.
information security and privacy
161.
internal security
162.
international security
163.
investment and innovation security
164.
IPv6 security
165.
IT security
166.
IT security management
167.
job security
168.
long-term security
169.
metadata model for security measures
170.
Middle Eastern security
171.
Mobile security
172.
national security
173.
NATO. Science for Peace and Security Program
174.
network security
175.
network security monitoring
176.
OSCE (Organization for Security and Co-operation in Europe)
177.
passenger’s security
178.
policy-based routing security
179.
political and security cultures
180.
post-quantum security
181.
power system security
182.
quantitative security
183.
regional security
184.
RISC-V Security Verification
185.
Safety and Security in Sea Transportation
186.
safety and security testing
187.
security
188.
security adaptation
189.
security alert prioritization
190.
security analysis
191.
security and justice (AFSJ)
192.
Security and political science
193.
security and privacy
194.
security and privacy in smart grids
195.
Security Assertion Mining
196.
security closure
197.
Security Coverage
198.
security dataset
199.
security dilemma
200.
Security evaluation
201.
security evaluation instruments
202.
Security limitations
203.
security log analysis
204.
security management
205.
security model
206.
security monitoring
207.
security notion
208.
security objectives
209.
security of data
210.
security of supply
211.
security operation center
212.
security operations center
213.
security patterns
214.
security policy
215.
security problem definition
216.
security proof
217.
security protocols
218.
security requirements
219.
security requirements engineering
220.
security risk assessment
221.
security risk management
222.
security risks
223.
security science and technology
224.
security systems for military objects
225.
security testing
226.
security training
227.
security verification
228.
security-by-design
229.
social security planning
230.
societal security
231.
system of economic security
232.
system security
233.
terrorism security
234.
transmission System Security
235.
voting privacy and security
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT