Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
NATO science for peace and security series. D, Information and communication security ; 48 (series)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/110)
Export
export all inquiry results
(3)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Analysis of national cyber situational awareness practices
Bahsi, Hayretdin
Strategic cyber defense : a multidisciplinary perspective
2017
/
p. 31-41
https://doi.org/10.3233/978-1-61499-771-9-31
book article
2
book article
Cyber security exercises : a comparison of participant evaluation metrics and scoring systems
Caliskan, Emin
;
Topgul, Oguzhan M.
;
Ottis, Rain
Strategic cyber defense : a multidisciplinary perspective
2017
/
p. 180-190
http://doi.org/10.3233/978-1-61499-771-9-180
book article
3
book article
Risk analysis of internet censorship circumvention : case study of anonymization tools and effects
Caliskan, Emin
Strategic cyber defense : a multidisciplinary perspective
2017
/
p. 12-148
http://doi.org/10.3233/978-1-61499-771-9-129
book article
Number of records 3, displaying
1 - 3
keyword
108
1.
NATO. Science for Peace and Security Program
2.
communication system security
3.
data and information security
4.
Estonian information security standard
5.
information security
6.
information security and privacy
7.
Security and political science
8.
security science and technology
9.
ad-hoc sensor networks security
10.
Automatic Security Verification
11.
Blockchain security
12.
cache security
13.
comprehensive system of economic security
14.
computer security
15.
cooperative security dilemma
16.
cyber security
17.
cyber security education
18.
cyber security exercises
19.
cyber security monitoring
20.
cyber security strategies
21.
cyber-security
22.
data security
23.
development of security cameras
24.
digital security practices
25.
drinking water security
26.
economic security
27.
economic security of enterprise
28.
emotional security
29.
energy security
30.
energy security indicator
31.
graded security
32.
hardware security
33.
hardware security primitive
34.
human security
35.
internal security
36.
international security
37.
investment and innovation security
38.
IPv6 security
39.
IT security
40.
IT security management
41.
job security
42.
long-term security
43.
metadata model for security measures
44.
Middle Eastern security
45.
Mobile security
46.
national cyber security strategy
47.
national security
48.
network security
49.
network security monitoring
50.
OSCE (Organization for Security and Co-operation in Europe)
51.
passenger’s security
52.
policy-based routing security
53.
political and security cultures
54.
post-quantum security
55.
power system security
56.
quantitative security
57.
regional security
58.
RISC-V Security Verification
59.
Safety and Security in Sea Transportation
60.
safety and security testing
61.
security
62.
security adaptation
63.
security alert prioritization
64.
security analysis
65.
security and justice (AFSJ)
66.
security and privacy
67.
security and privacy in smart grids
68.
Security Assertion Mining
69.
security closure
70.
Security Coverage
71.
security dataset
72.
security dilemma
73.
Security evaluation
74.
security evaluation instruments
75.
Security limitations
76.
security log analysis
77.
security management
78.
security model
79.
security monitoring
80.
security notion
81.
security objectives
82.
security of data
83.
security of supply
84.
security operation center
85.
security operations center
86.
security patterns
87.
security policy
88.
security problem definition
89.
security proof
90.
security protocols
91.
security requirements
92.
security requirements engineering
93.
security risk assessment
94.
security risk management
95.
security risks
96.
security strategies
97.
security systems for military objects
98.
security testing
99.
security training
100.
security verification
101.
security-by-design
102.
social security planning
103.
societal security
104.
system of economic security
105.
system security
106.
terrorism security
107.
transmission System Security
108.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT