Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security strategies (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/262)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
book article
Number of records 1, displaying
1 - 1
keyword
256
1.
cyber security strategies
2.
security strategies
3.
cyber security
4.
cyber security education
5.
cyber security exercises
6.
cyber security monitoring
7.
cyber-security
8.
maritime cyber security
9.
maritime cyber security operations centers
10.
national cyber security strategy
11.
airport strategies
12.
bias mitigation strategies
13.
climate strategies
14.
co-design strategies
15.
collaboration strategies
16.
control optimization strategies
17.
coping strategies
18.
course development strategies
19.
cultural adjustment strategies
20.
cultural tourism strategies
21.
digital strategies
22.
Educational strategies
23.
e-Government policies and strategies
24.
energy management strategies (EMS)
25.
enterprise strategies
26.
EoL strategies
27.
EU policies and strategies
28.
European firefighting strategies
29.
fixation strategies
30.
graph and tree search strategies
31.
HVAC control strategies
32.
hybrid strategies
33.
innovation in processing strategies
34.
management strategies
35.
marketing strategies
36.
mitigation strategies
37.
mitigation strategies of UHI effect
38.
passive design strategies
39.
portfolio of strategies
40.
questioning strategies
41.
regional innovation strategies on smart specialization (RIS3)
42.
research strategies
43.
smart specialization strategies (S3)
44.
strategies
45.
strategies and concepts of bioinspired designs
46.
strategies for human resource and local policies
47.
strategies of inquiry
48.
suboptimal feedback strategies
49.
sub-optimal feedback strategies
50.
synthesis strategies
51.
teaching strategies
52.
autonomous vehicle cyber range
53.
cloud-based cyber-physical systems (C2PS)
54.
cognitive cyber warfare
55.
cyber
56.
Cyber “Maastricht”
57.
cyber architecture
58.
cyber attacks
59.
cyber battle damage assessment
60.
Cyber Bio-analytical Physical Systems (CBPSs)
61.
cyber challenge
62.
cyber command
63.
Cyber Command organisational structure
64.
cyber conflict
65.
cyber contingency
66.
cyber crime
67.
cyber crime pathways
68.
cyber crime scripting
69.
Cyber crisis management
70.
cyber defence
71.
cyber defence exercise
72.
cyber defence exercises
73.
cyber defense education
74.
cyber defense exercise
75.
cyber defense exercises
76.
cyber dependence
77.
cyber diplomacy
78.
cyber exercise
79.
cyber hygiene
80.
cyber impact assessment
81.
cyber incidents
82.
cyber insurance
83.
cyber intrusion detection
84.
cyber kill chain
85.
cyber operation
86.
cyber operation officer
87.
cyber operations
88.
cyber operations exercises
89.
cyber physical energy systems
90.
cyber physical power system (CPPS)
91.
Cyber Physical Production System
92.
cyber physical production systems (CPPS)
93.
cyber physical social system
94.
cyber physical social systems (cpss)
95.
cyber physical system
96.
Cyber Planning tool
97.
cyber power Europe
98.
cyber ranges
99.
cyber red teaming
100.
cyber resilience
101.
cyber resilience at sea
102.
cyber risk
103.
cyber risk management in shipping
104.
cyber situational awareness
105.
cyber stability
106.
cyber team communication
107.
cyber threat
108.
cyber threat communication
109.
Cyber Threat Intelligence
110.
cyber threats
111.
cyber war
112.
cyber warfare
113.
cyber warriors
114.
cyber weapons
115.
cyber-attack
116.
cyber-attack pathways
117.
Cyber-attacks
118.
cyber-insurance
119.
cyber-paternalism
120.
cyber-physical energy systems
121.
cyber-physical social system (CPSS)
122.
cyber-physical system
123.
Cyber-Physical System (CPS)
124.
cyber-physical system logistic robot
125.
cyber-physical systems
126.
Cyber-Physical Systems (CPS)
127.
cyber-risks
128.
cyber-space nexus
129.
cyber-vulnerabilities
130.
Defensive Cyber Operations
131.
EU cyber policy
132.
international cyber norms
133.
military cyber
134.
mobile cyber-physical system
135.
NATO cyber operations definitions
136.
NATO Cyber Range
137.
Offensive Cyber Operations
138.
perceived cyber risks and threats
139.
responsive cyber defence
140.
Socio-Cyber-Physical Systems
141.
space cyber range
142.
technical cyber exercise
143.
Visualising Cyber Planning
144.
ad-hoc sensor networks security
145.
Automatic Security Verification
146.
Blockchain security
147.
cache security
148.
cloud security
149.
communication system security
150.
comprehensive system of economic security
151.
computer security
152.
cooperative security dilemma
153.
data and information security
154.
data security
155.
development of security cameras
156.
digital security practices
157.
drinking water security
158.
economic security
159.
economic security of enterprise
160.
emotional security
161.
energy security
162.
energy security indicator
163.
Estonian information security standard
164.
graded security
165.
hardware security
166.
hardware security primitive
167.
high level of security
168.
Homeland security
169.
human security
170.
information security
171.
information security and privacy
172.
initial level of security
173.
internal security
174.
international security
175.
investment and innovation security
176.
IPv6 security
177.
IT security
178.
IT security management
179.
job security
180.
long-term security
181.
Maritime Security Operations Center (M-SOC)
182.
medium level of security
183.
metadata model for security measures
184.
Middle Eastern security
185.
Mobile security
186.
national security
187.
NATO. Science for Peace and Security Program
188.
network security
189.
network security monitoring
190.
OSCE (Organization for Security and Co-operation in Europe)
191.
passenger’s security
192.
policy-based routing security
193.
political and security cultures
194.
post-quantum security
195.
power system security
196.
quantitative security
197.
regional security
198.
RISC-V Security Verification
199.
Safety and Security in Sea Transportation
200.
safety and security testing
201.
security
202.
security adaptation
203.
security alert prioritization
204.
security analysis
205.
security and justice (AFSJ)
206.
Security and political science
207.
security and privacy
208.
security and privacy in smart grids
209.
Security Assertion
210.
Security Assertion Mining
211.
security closure
212.
Security Coverage
213.
security dataset
214.
security dilemma
215.
Security evaluation
216.
security evaluation instruments
217.
Security Level Evaluation
218.
Security limitations
219.
security log analysis
220.
security management
221.
security model
222.
security monitoring
223.
security notion
224.
security objectives
225.
security of data
226.
security of supply
227.
security operation center
228.
security operations center
229.
security patterns
230.
security policy
231.
security problem definition
232.
security proof
233.
security protocols
234.
security requirements
235.
security requirements engineering
236.
security research
237.
security risk assessment
238.
security risk management
239.
security risks
240.
security science and technology
241.
security systems for military objects
242.
security testing
243.
security training
244.
security verification
245.
security-by-design
246.
social security planning
247.
societal security
248.
software security
249.
software security level
250.
software security subcharacteristics
251.
sufficient level of security
252.
system of economic security
253.
system security
254.
terrorism security
255.
transmission System Security
256.
voting privacy and security
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT