Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
national cyber security strategy (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/272)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
NCSS: A global census of national positions on conflict, neutrality and cooperation
Serrano-Iova, Radu-Antonio
;
Watashiba, Tomoe
Proceedings of the 22nd European Conference on Cyber Warfare and Security
2023
/
p. 420-428 : ill
https://papers.academic-conferences.org/index.php/eccws/issue/view/20/23
https://doi.org/10.34190/eccws.22.1.1168
book article
Related publications
1
Knowledge transfer for public administrations : the case of elections and cybersecurity = Haldusasutuste teadmussiire : valimiste ja küberturvalisuse juhtum
Number of records 1, displaying
1 - 1
keyword
266
1.
national cyber security strategy
2.
cyber security
3.
cyber security education
4.
cyber security exercises
5.
cyber security monitoring
6.
cyber security strategies
7.
cyber-security
8.
maritime cyber security
9.
maritime cyber security operations centers
10.
national security
11.
adaptive test strategy generation
12.
AI strategy
13.
behavioural strategy
14.
BESS Control Strategy
15.
branding strategy
16.
business strategy
17.
control strategy
18.
diffusion strategy
19.
education strategy
20.
educational strategy
21.
efficient control strategy
22.
electrode placement strategy
23.
end-of-life (EOL) strategy
24.
enterprise strategy
25.
EU heating and cooling strategy
26.
EU post-2020 biodiversity strategy
27.
EU regulatory strategy
28.
European institutions digital strategy
29.
fault handling strategy
30.
human resource and Strategy Europe 2020
31.
long term renovation strategy
32.
management strategy
33.
manufacturing strategy
34.
marine strategy framework directive
35.
Marine Strategy Framework Directive (MSFD)
36.
market strategy
37.
marketing strategy
38.
modulation strategy
39.
nonlinear control strategy
40.
optimal operation strategy
41.
optimal storage strategy
42.
outsourcing strategy
43.
ownership strategy
44.
passive design strategy
45.
PLM implementation strategy
46.
PLM strategy
47.
port strategy
48.
Power leveling strategy
49.
pricing strategy
50.
proactive strategy
51.
Renovation strategy
52.
scan strategy
53.
scanning strategy
54.
Smart Specialization Strategy
55.
strategy
56.
strategy building
57.
strategy definition
58.
strategy Europe 2020
59.
strategy focus
60.
strategy formation
61.
strategy map
62.
sustainability strategy
63.
sustainable strategy
64.
teaching strategy
65.
waste management strategy
66.
autonomous vehicle cyber range
67.
cloud-based cyber-physical systems (C2PS)
68.
cognitive cyber warfare
69.
cyber
70.
Cyber “Maastricht”
71.
cyber architecture
72.
cyber attacks
73.
cyber battle damage assessment
74.
Cyber Bio-analytical Physical Systems (CBPSs)
75.
cyber challenge
76.
cyber command
77.
Cyber Command organisational structure
78.
cyber conflict
79.
cyber contingency
80.
cyber crime
81.
cyber crime pathways
82.
cyber crime scripting
83.
Cyber crisis management
84.
cyber defence
85.
cyber defence exercise
86.
cyber defence exercises
87.
cyber defense education
88.
cyber defense exercise
89.
cyber defense exercises
90.
cyber dependence
91.
cyber diplomacy
92.
cyber exercise
93.
cyber hygiene
94.
cyber impact assessment
95.
cyber incidents
96.
cyber insurance
97.
cyber intrusion detection
98.
cyber kill chain
99.
cyber operation
100.
cyber operation officer
101.
cyber operations
102.
cyber operations exercises
103.
cyber physical energy systems
104.
cyber physical power system (CPPS)
105.
Cyber Physical Production System
106.
cyber physical production systems (CPPS)
107.
cyber physical social system
108.
cyber physical social systems (cpss)
109.
cyber physical system
110.
Cyber Planning tool
111.
cyber power Europe
112.
cyber ranges
113.
cyber red teaming
114.
cyber resilience
115.
cyber resilience at sea
116.
cyber risk
117.
cyber risk management in shipping
118.
cyber situational awareness
119.
cyber stability
120.
cyber team communication
121.
cyber threat
122.
cyber threat communication
123.
Cyber Threat Intelligence
124.
cyber threats
125.
cyber war
126.
cyber warfare
127.
cyber warriors
128.
cyber weapons
129.
cyber-attack
130.
cyber-attack pathways
131.
Cyber-attacks
132.
cyber-insurance
133.
cyber-paternalism
134.
cyber-physical energy systems
135.
cyber-physical social system (CPSS)
136.
cyber-physical system
137.
Cyber-Physical System (CPS)
138.
cyber-physical system logistic robot
139.
cyber-physical systems
140.
Cyber-Physical Systems (CPS)
141.
cyber-risks
142.
cyber-space nexus
143.
cyber-vulnerabilities
144.
Defensive Cyber Operations
145.
EU cyber policy
146.
international cyber norms
147.
military cyber
148.
mobile cyber-physical system
149.
NATO cyber operations definitions
150.
NATO Cyber Range
151.
Offensive Cyber Operations
152.
perceived cyber risks and threats
153.
responsive cyber defence
154.
Socio-Cyber-Physical Systems
155.
space cyber range
156.
technical cyber exercise
157.
Visualising Cyber Planning
158.
ad-hoc sensor networks security
159.
Automatic Security Verification
160.
Blockchain security
161.
cache security
162.
communication system security
163.
comprehensive system of economic security
164.
computer security
165.
cooperative security dilemma
166.
data and information security
167.
data security
168.
development of security cameras
169.
digital security practices
170.
drinking water security
171.
economic security
172.
economic security of enterprise
173.
emotional security
174.
energy security
175.
energy security indicator
176.
Estonian information security standard
177.
graded security
178.
hardware security
179.
hardware security primitive
180.
high level of security
181.
Homeland security
182.
human security
183.
information security
184.
information security and privacy
185.
initial level of security
186.
internal security
187.
international security
188.
investment and innovation security
189.
IPv6 security
190.
IT security
191.
IT security management
192.
job security
193.
long-term security
194.
Maritime Security Operations Center (M-SOC)
195.
medium level of security
196.
metadata model for security measures
197.
Middle Eastern security
198.
Mobile security
199.
NATO. Science for Peace and Security Program
200.
network security
201.
network security monitoring
202.
OSCE (Organization for Security and Co-operation in Europe)
203.
passenger’s security
204.
policy-based routing security
205.
political and security cultures
206.
post-quantum security
207.
power system security
208.
quantitative security
209.
regional security
210.
RISC-V Security Verification
211.
Safety and Security in Sea Transportation
212.
safety and security testing
213.
security
214.
security adaptation
215.
security alert prioritization
216.
security analysis
217.
security and justice (AFSJ)
218.
Security and political science
219.
security and privacy
220.
security and privacy in smart grids
221.
Security Assertion Mining
222.
security closure
223.
Security Coverage
224.
security dataset
225.
security dilemma
226.
Security evaluation
227.
security evaluation instruments
228.
Security limitations
229.
security log analysis
230.
security management
231.
security model
232.
security monitoring
233.
security notion
234.
security objectives
235.
security of data
236.
security of supply
237.
security operation center
238.
security operations center
239.
security patterns
240.
security policy
241.
security problem definition
242.
security proof
243.
security protocols
244.
security requirements
245.
security requirements engineering
246.
security risk assessment
247.
security risk management
248.
security risks
249.
security science and technology
250.
security strategies
251.
security systems for military objects
252.
security testing
253.
security training
254.
security verification
255.
security-by-design
256.
social security planning
257.
societal security
258.
software security
259.
software security level
260.
software security subcharacteristics
261.
sufficient level of security
262.
system of economic security
263.
system security
264.
terrorism security
265.
transmission System Security
266.
voting privacy and security
subject term
6
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
3.
Cyber Battle
4.
Telia Cyber Battle of Estonia
5.
Telia Cyber Battle of Nordic-Baltics
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT