Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber attacks (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
6
Look more..
(2/123)
Export
export all inquiry results
(6)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
A cyber attack taxonomy for microgrid systems
Bahsi, Hayretdin
;
Dola, Henry Ochieng
;
Khalil, Shaymaa Mamdouh
;
Korõtko, Tarmo
2022 17th Annual System of Systems Engineering Conference (SOSE)
2022
/
p. 324-331
https://doi.org/10.1109/SOSE55472.2022.9812642
book article
2
book article
Cyber attacks on power system automation and protection and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Presekal, Alfan
;
Palensky, Peter
Proceedings of 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 26-28 October, 2020
2020
/
p. 247–254
https://doi.org/10.1109/ISGT-Europe47291.2020.9248840
book article
3
book article
Cyber attacks on protective relays in digital substations and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Palensky, Peter
8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems(MSCPES), Virtual Workshop, online, from April 21, 2020 : proceedings
2020
/
6 p. : ill
https://doi.org/10.1109/MSCPES49613.2020.9133698
book article
4
book article
Cyber operations during the conflict in Ukraine and the role of international law
Valuch, Josef
;
Hamulak, Ondrej
The use of force against Ukraine and international law : jus ad bellum, jus in bello, jus post bellum
2018
/
p. 215-235
https://doi.org/10.1007/978-94-6265-222-4_10
book article
5
journal article EST
/
journal article ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
6
newspaper article
In search of a coherent international approach to governing technologies [online resource]
Osula, Anna-Maria
Digital frontiers
2021
In search of a coherent international approach to governing technologies
newspaper article
Number of records 6, displaying
1 - 6
keyword
119
1.
cyber attacks
2.
Cyber-attacks
3.
amplification attacks
4.
architectural attacks
5.
attacks
6.
cache attacks
7.
Cache Side-Channel Attacks
8.
data attacks
9.
DDoS attacks
10.
denial of service attacks
11.
functionality attacks
12.
IP attacks
13.
jamming attacks
14.
offline guessing attacks
15.
oracle-guided (OG) attacks
16.
oracle-guided attacks
17.
oracle-less (OL) and oracle-guided (OG) attacks
18.
oracle-less (OL) attacks
19.
oracle-less attacks
20.
process-aware attacks
21.
side-channel attacks
22.
targeted attacks
23.
autonomous vehicle cyber range
24.
cloud-based cyber-physical systems (C2PS)
25.
cognitive cyber warfare
26.
cyber
27.
Cyber “Maastricht”
28.
cyber architecture
29.
cyber battle damage assessment
30.
Cyber Bio-analytical Physical Systems (CBPSs)
31.
cyber challenge
32.
cyber command
33.
Cyber Command organisational structure
34.
cyber conflict
35.
cyber contingency
36.
cyber crime
37.
cyber crime pathways
38.
cyber crime scripting
39.
Cyber crisis management
40.
cyber defence
41.
cyber defence exercise
42.
cyber defence exercises
43.
cyber defense education
44.
cyber defense exercise
45.
cyber defense exercises
46.
cyber dependence
47.
cyber diplomacy
48.
cyber exercise
49.
cyber hygiene
50.
cyber impact assessment
51.
cyber incidents
52.
cyber insurance
53.
cyber intrusion detection
54.
cyber kill chain
55.
cyber operation
56.
cyber operation officer
57.
cyber operations
58.
cyber operations exercises
59.
cyber physical energy systems
60.
cyber physical power system (CPPS)
61.
Cyber Physical Production System
62.
cyber physical production systems (CPPS)
63.
cyber physical social system
64.
cyber physical social systems (cpss)
65.
cyber physical system
66.
Cyber Planning tool
67.
cyber power Europe
68.
cyber ranges
69.
cyber red teaming
70.
cyber resilience
71.
cyber resilience at sea
72.
cyber risk
73.
cyber risk management in shipping
74.
cyber security
75.
cyber security education
76.
cyber security exercises
77.
cyber security monitoring
78.
cyber security strategies
79.
cyber situational awareness
80.
cyber stability
81.
cyber team communication
82.
cyber threat
83.
cyber threat communication
84.
Cyber Threat Intelligence
85.
cyber threats
86.
cyber war
87.
cyber warfare
88.
cyber warriors
89.
cyber weapons
90.
cyber-attack
91.
cyber-attack pathways
92.
cyber-insurance
93.
cyber-paternalism
94.
cyber-physical energy systems
95.
cyber-physical social system (CPSS)
96.
cyber-physical system
97.
Cyber-Physical System (CPS)
98.
cyber-physical system logistic robot
99.
cyber-physical systems
100.
Cyber-Physical Systems (CPS)
101.
cyber-risks
102.
cyber-security
103.
cyber-space nexus
104.
cyber-vulnerabilities
105.
Defensive Cyber Operations
106.
EU cyber policy
107.
international cyber norms
108.
military cyber
109.
mobile cyber-physical system
110.
national cyber security strategy
111.
NATO cyber operations definitions
112.
NATO Cyber Range
113.
Offensive Cyber Operations
114.
perceived cyber risks and threats
115.
responsive cyber defence
116.
Socio-Cyber-Physical Systems
117.
space cyber range
118.
technical cyber exercise
119.
Visualising Cyber Planning
subject term
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT