Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber red teaming (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/120)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book article
Crossed swords : a cyber red team oriented technical exercise
Blumbergs, Bernhards
;
Ottis, Rain
;
Vaarandi, Risto
Proceedings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 2019
2019
/
p. 37-44
https://www.scopus.com/record/display.uri?eid=2-s2.0-85070019446&origin=inward&txGid=b3ce06db78a90b7b9e8a79c0d7b1f9c7
book article
3
book article
A cyber red team oriented technical exercise
Blumbergs, Bernhards
;
Ottis, Rain
;
Vaarandi, Risto
Abstracts and conference materials for the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 2019
2019
/
p. 10-11
https://www.academic-conferences.org/conferences/eccws/eccws-future-and-past/
book article
4
book article
Remote exploit development for cyber red team computer network operations targeting industrial control systems
Blumbergs, Bernhards
Proceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 1
2019
/
p. 88-99 : ill
https://doi.org/10.5220/0007310300880099
book article
Number of records 4, displaying
1 - 4
keyword
115
1.
cyber red teaming
2.
red teaming
3.
lower red beds
4.
oat striate and red disease
5.
red algae
6.
red currant
7.
Red Notice
8.
red step
9.
Red Team organisational Structure
10.
red-ox reactions
11.
red-tape
12.
Red-yeast rice
13.
automated cyber defense
14.
autonomous vehicle cyber range
15.
cloud-based cyber-physical systems (C2PS)
16.
cognitive cyber warfare
17.
cyber
18.
Cyber “Maastricht”
19.
cyber architecture
20.
cyber attacks
21.
cyber battle damage assessment
22.
Cyber Bio-analytical Physical Systems (CBPSs)
23.
cyber challenge
24.
cyber command
25.
Cyber Command organisational structure
26.
cyber conflict
27.
cyber contingency
28.
cyber crime
29.
cyber crime pathways
30.
cyber crime scripting
31.
Cyber crisis management
32.
cyber defence
33.
cyber defence exercise
34.
cyber defence exercises
35.
cyber defense education
36.
cyber defense exercise
37.
cyber defense exercises
38.
cyber dependence
39.
cyber diplomacy
40.
cyber exercise
41.
cyber hygiene
42.
cyber impact assessment
43.
cyber incidents
44.
cyber insurance
45.
cyber intrusion detection
46.
cyber kill chain
47.
cyber operation
48.
cyber operation officer
49.
cyber operations
50.
cyber operations exercises
51.
cyber physical energy systems
52.
cyber physical power system (CPPS)
53.
Cyber Physical Production System
54.
cyber physical production systems (CPPS)
55.
cyber physical social system
56.
cyber physical social systems (cpss)
57.
cyber physical system
58.
Cyber Planning tool
59.
cyber power Europe
60.
cyber ranges
61.
cyber resilience
62.
cyber resilience at sea
63.
cyber risk
64.
cyber risk management in shipping
65.
cyber security
66.
cyber security education
67.
cyber security exercises
68.
cyber security monitoring
69.
cyber security monitoring in maritime
70.
cyber security strategies
71.
cyber situational awareness
72.
cyber stability
73.
cyber team communication
74.
cyber threat
75.
cyber threat communication
76.
Cyber Threat Intelligence
77.
cyber threats
78.
cyber war
79.
cyber warfare
80.
cyber warriors
81.
cyber weapons
82.
cyber-attack
83.
cyber-attack pathways
84.
Cyber-attacks
85.
cyber-insurance
86.
cyber-paternalism
87.
cyber-physical energy systems
88.
cyber-physical social system (CPSS)
89.
cyber-physical system
90.
Cyber-Physical System (CPS)
91.
cyber-physical system logistic robot
92.
cyber-physical system security
93.
cyber-physical systems
94.
Cyber-Physical Systems (CPS)
95.
cyber-risks
96.
cyber-security
97.
cyber-space nexus
98.
cyber-vulnerabilities
99.
Defensive Cyber Operations
100.
EU cyber policy
101.
international cyber norms
102.
maritime cyber security
103.
maritime cyber security operations centers
104.
military cyber
105.
mobile cyber-physical system
106.
national cyber security strategy
107.
NATO cyber operations definitions
108.
NATO Cyber Range
109.
Offensive Cyber Operations
110.
perceived cyber risks and threats
111.
responsive cyber defence
112.
Socio-Cyber-Physical Systems
113.
space cyber range
114.
technical cyber exercise
115.
Visualising Cyber Planning
subject term
5
1.
Red Bull
2.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
3.
Cyber Battle
4.
Telia Cyber Battle of Estonia
5.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT