Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
NATO science for peace and security series. D, Information and communication security ; 48 (series)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/105)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Analysis of national cyber situational awareness practices
Bahsi, Hayretdin
Strategic cyber defense : a multidisciplinary perspective
2017
/
p. 31-41
https://doi.org/10.3233/978-1-61499-771-9-31
book article
2
book article
Cyber security exercises : a comparison of participant evaluation metrics and scoring systems
Caliskan, Emin
;
Topgul, Oguzhan M.
;
Ottis, Rain
Strategic cyber defense : a multidisciplinary perspective
2017
/
p. 180-190
http://doi.org/10.3233/978-1-61499-771-9-180
book article
3
book article
Risk analysis of internet censorship circumvention : case study of anonymization tools and effects
Caliskan, Emin
Strategic cyber defense : a multidisciplinary perspective
2017
/
p. 12-148
http://doi.org/10.3233/978-1-61499-771-9-129
book article
Number of records 3, displaying
1 - 3
keyword
103
1.
NATO. Science for Peace and Security Program
2.
communication system security
3.
Estonian information security standard
4.
information security
5.
Security and political science
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security strategies
18.
cyber-security
19.
data security
20.
development of security cameras
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
graded security
28.
hardware security
29.
hardware security primitive
30.
human security
31.
internal security
32.
international security
33.
investment and innovation security
34.
IPv6 security
35.
IT security
36.
IT security management
37.
job security
38.
long-term security
39.
metadata model for security measures
40.
Middle Eastern security
41.
Mobile security
42.
national cyber security strategy
43.
national security
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
security and privacy
62.
security and privacy in smart grids
63.
Security Assertion Mining
64.
security closure
65.
Security Coverage
66.
security dataset
67.
security dilemma
68.
Security evaluation
69.
security evaluation instruments
70.
Security limitations
71.
security log analysis
72.
security management
73.
security model
74.
security monitoring
75.
security notion
76.
security objectives
77.
security of data
78.
security of supply
79.
security operation center
80.
security operations center
81.
security patterns
82.
security policy
83.
security problem definition
84.
security proof
85.
security protocols
86.
security requirements
87.
security requirements engineering
88.
security risk assessment
89.
security risk management
90.
security risks
91.
security strategies
92.
security systems for military objects
93.
security testing
94.
security training
95.
security verification
96.
security-by-design
97.
social security planning
98.
societal security
99.
system of economic security
100.
system security
101.
terrorism security
102.
transmission System Security
103.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT