Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
national cyber security strategy (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/278)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
NCSS: A global census of national positions on conflict, neutrality and cooperation
Serrano-Iova, Radu-Antonio
;
Watashiba, Tomoe
Proceedings of the 22nd European Conference on Cyber Warfare and Security
2023
/
p. 420-428 : ill
https://papers.academic-conferences.org/index.php/eccws/issue/view/20/23
https://doi.org/10.34190/eccws.22.1.1168
book article
Related publications
1
Knowledge transfer for public administrations : the case of elections and cybersecurity = Haldusasutuste teadmussiire : valimiste ja küberturvalisuse juhtum
Number of records 1, displaying
1 - 1
keyword
272
1.
national cyber security strategy
2.
cyber security
3.
cyber security education
4.
cyber security exercises
5.
cyber security monitoring
6.
cyber security monitoring in maritime
7.
cyber security strategies
8.
cyber-physical system security
9.
cyber-security
10.
maritime cyber security
11.
maritime cyber security operations centers
12.
national security
13.
adaptive test strategy generation
14.
AI strategy
15.
behavioural strategy
16.
BESS Control Strategy
17.
branding strategy
18.
business strategy
19.
control strategy
20.
diffusion strategy
21.
education strategy
22.
educational strategy
23.
efficient control strategy
24.
electrode placement strategy
25.
end-of-life (EOL) strategy
26.
enterprise strategy
27.
EU heating and cooling strategy
28.
EU post-2020 biodiversity strategy
29.
EU regulatory strategy
30.
European institutions digital strategy
31.
fault handling strategy
32.
human resource and Strategy Europe 2020
33.
long term renovation strategy
34.
management strategy
35.
manufacturing strategy
36.
marine strategy framework directive
37.
Marine Strategy Framework Directive (MSFD)
38.
market strategy
39.
marketing strategy
40.
modulation strategy
41.
nonlinear control strategy
42.
optimal operation strategy
43.
optimal storage strategy
44.
outsourcing strategy
45.
ownership strategy
46.
passive design strategy
47.
PLM implementation strategy
48.
PLM strategy
49.
port strategy
50.
Power leveling strategy
51.
pricing strategy
52.
proactive strategy
53.
Renovation strategy
54.
scan strategy
55.
scanning strategy
56.
Smart Specialization Strategy
57.
strategy
58.
strategy building
59.
strategy definition
60.
strategy Europe 2020
61.
strategy focus
62.
strategy formation
63.
strategy map
64.
sustainability strategy
65.
sustainable strategy
66.
teaching strategy
67.
waste management strategy
68.
autonomous vehicle cyber range
69.
cloud-based cyber-physical systems (C2PS)
70.
cognitive cyber warfare
71.
cyber
72.
Cyber “Maastricht”
73.
cyber architecture
74.
cyber attacks
75.
cyber battle damage assessment
76.
Cyber Bio-analytical Physical Systems (CBPSs)
77.
cyber challenge
78.
cyber command
79.
Cyber Command organisational structure
80.
cyber conflict
81.
cyber contingency
82.
cyber crime
83.
cyber crime pathways
84.
cyber crime scripting
85.
Cyber crisis management
86.
cyber defence
87.
cyber defence exercise
88.
cyber defence exercises
89.
cyber defense education
90.
cyber defense exercise
91.
cyber defense exercises
92.
cyber dependence
93.
cyber diplomacy
94.
cyber exercise
95.
cyber hygiene
96.
cyber impact assessment
97.
cyber incidents
98.
cyber insurance
99.
cyber intrusion detection
100.
cyber kill chain
101.
cyber operation
102.
cyber operation officer
103.
cyber operations
104.
cyber operations exercises
105.
cyber physical energy systems
106.
cyber physical power system (CPPS)
107.
Cyber Physical Production System
108.
cyber physical production systems (CPPS)
109.
cyber physical social system
110.
cyber physical social systems (cpss)
111.
cyber physical system
112.
Cyber Planning tool
113.
cyber power Europe
114.
cyber ranges
115.
cyber red teaming
116.
cyber resilience
117.
cyber resilience at sea
118.
cyber risk
119.
cyber risk management in shipping
120.
cyber situational awareness
121.
cyber stability
122.
cyber team communication
123.
cyber threat
124.
cyber threat communication
125.
Cyber Threat Intelligence
126.
cyber threats
127.
cyber war
128.
cyber warfare
129.
cyber warriors
130.
cyber weapons
131.
cyber-attack
132.
cyber-attack pathways
133.
Cyber-attacks
134.
cyber-insurance
135.
cyber-paternalism
136.
cyber-physical energy systems
137.
cyber-physical social system (CPSS)
138.
cyber-physical system
139.
Cyber-Physical System (CPS)
140.
cyber-physical system logistic robot
141.
cyber-physical systems
142.
Cyber-Physical Systems (CPS)
143.
cyber-risks
144.
cyber-space nexus
145.
cyber-vulnerabilities
146.
Defensive Cyber Operations
147.
EU cyber policy
148.
international cyber norms
149.
military cyber
150.
mobile cyber-physical system
151.
NATO cyber operations definitions
152.
NATO Cyber Range
153.
Offensive Cyber Operations
154.
perceived cyber risks and threats
155.
responsive cyber defence
156.
Socio-Cyber-Physical Systems
157.
space cyber range
158.
technical cyber exercise
159.
Visualising Cyber Planning
160.
ad-hoc sensor networks security
161.
Automatic Security Verification
162.
Blockchain security
163.
cache security
164.
cloud security
165.
communication system security
166.
comprehensive system of economic security
167.
computer security
168.
cooperative security dilemma
169.
data and information security
170.
data security
171.
development of security cameras
172.
digital security practices
173.
drinking water security
174.
economic security
175.
economic security of enterprise
176.
emotional security
177.
energy security
178.
energy security indicator
179.
Estonian information security standard
180.
graded security
181.
hardware security
182.
hardware security primitive
183.
high level of security
184.
Homeland security
185.
human security
186.
information security
187.
information security and privacy
188.
initial level of security
189.
internal security
190.
international security
191.
investment and innovation security
192.
IPv6 security
193.
IT security
194.
IT security management
195.
job security
196.
long-term security
197.
Maritime Security Operations Center (M-SOC)
198.
medium level of security
199.
metadata model for security measures
200.
Middle Eastern security
201.
Mobile security
202.
NATO. Science for Peace and Security Program
203.
network security
204.
network security monitoring
205.
OSCE (Organization for Security and Co-operation in Europe)
206.
passenger’s security
207.
policy-based routing security
208.
political and security cultures
209.
post-quantum security
210.
power system security
211.
quantitative security
212.
regional security
213.
RISC-V Security Verification
214.
Safety and Security in Sea Transportation
215.
safety and security testing
216.
security
217.
security adaptation
218.
security alert prioritization
219.
security analysis
220.
security and justice (AFSJ)
221.
Security and political science
222.
security and privacy
223.
security and privacy in smart grids
224.
Security Assertion
225.
Security Assertion Mining
226.
security closure
227.
Security Coverage
228.
security dataset
229.
security dilemma
230.
Security evaluation
231.
security evaluation instruments
232.
Security Level Evaluation
233.
Security limitations
234.
security log analysis
235.
security management
236.
security model
237.
security monitoring
238.
security notion
239.
security objectives
240.
security of data
241.
security of supply
242.
security operation center
243.
security operations center
244.
security patterns
245.
security policy
246.
security problem definition
247.
security proof
248.
security protocols
249.
security requirements
250.
security requirements engineering
251.
security research
252.
security risk assessment
253.
security risk management
254.
security risks
255.
security science and technology
256.
security strategies
257.
security systems for military objects
258.
security testing
259.
security training
260.
security verification
261.
security-by-design
262.
social security planning
263.
societal security
264.
software security
265.
software security level
266.
software security subcharacteristics
267.
sufficient level of security
268.
system of economic security
269.
system security
270.
terrorism security
271.
transmission System Security
272.
voting privacy and security
subject term
6
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
3.
Cyber Battle
4.
Telia Cyber Battle of Estonia
5.
Telia Cyber Battle of Nordic-Baltics
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT