Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security strategies (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/229)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
book article
Number of records 1, displaying
1 - 1
keyword
224
1.
cyber security strategies
2.
security strategies
3.
cyber security
4.
cyber security education
5.
cyber security exercises
6.
cyber security monitoring
7.
cyber-security
8.
national cyber security strategy
9.
airport strategies
10.
co-design strategies
11.
collaboration strategies
12.
coping strategies
13.
course development strategies
14.
cultural adjustment strategies
15.
cultural tourism strategies
16.
digital strategies
17.
Educational strategies
18.
e-Government policies and strategies
19.
energy management strategies (EMS)
20.
enterprise strategies
21.
EoL strategies
22.
EU policies and strategies
23.
European firefighting strategies
24.
graph and tree search strategies
25.
hybrid strategies
26.
innovation in processing strategies
27.
management strategies
28.
mitigation strategies
29.
mitigation strategies of UHI effect
30.
passive design strategies
31.
portfolio of strategies
32.
questioning strategies
33.
regional innovation strategies on smart specialization (RIS3)
34.
research strategies
35.
smart specialization strategies (S3)
36.
strategies
37.
strategies and concepts of bioinspired designs
38.
strategies for human resource and local policies
39.
strategies of inquiry
40.
suboptimal feedback strategies
41.
sub-optimal feedback strategies
42.
synthesis strategies
43.
teaching strategies
44.
autonomous vehicle cyber range
45.
cloud-based cyber-physical systems (C2PS)
46.
cognitive cyber warfare
47.
cyber
48.
Cyber “Maastricht”
49.
cyber architecture
50.
cyber attacks
51.
cyber battle damage assessment
52.
Cyber Bio-analytical Physical Systems (CBPSs)
53.
cyber challenge
54.
cyber command
55.
cyber conflict
56.
cyber contingency
57.
cyber crime
58.
cyber crime pathways
59.
cyber crime scripting
60.
Cyber crisis management
61.
cyber defence
62.
cyber defence exercise
63.
cyber defence exercises
64.
cyber defense education
65.
cyber defense exercise
66.
cyber defense exercises
67.
cyber dependence
68.
cyber diplomacy
69.
cyber exercise
70.
cyber hygiene
71.
cyber impact assessment
72.
cyber incidents
73.
cyber insurance
74.
cyber intrusion detection
75.
cyber kill chain
76.
cyber operation
77.
cyber operation officer
78.
cyber operations
79.
cyber physical energy systems
80.
cyber physical power system (CPPS)
81.
Cyber Physical Production System
82.
cyber physical production systems (CPPS)
83.
cyber physical social system
84.
cyber physical social systems (cpss)
85.
cyber physical system
86.
cyber power Europe
87.
cyber ranges
88.
cyber red teaming
89.
cyber resilience
90.
cyber risk
91.
cyber situational awareness
92.
cyber stability
93.
cyber team communication
94.
cyber threat
95.
cyber threat communication
96.
cyber threats
97.
cyber war
98.
cyber warfare
99.
cyber warriors
100.
cyber weapons
101.
cyber-attack
102.
cyber-attack pathways
103.
cyber-insurance
104.
cyber-paternalism
105.
cyber-physical energy systems
106.
cyber-physical social system (CPSS)
107.
cyber-physical system
108.
Cyber-Physical System (CPS)
109.
cyber-physical system logistic robot
110.
cyber-physical systems
111.
Cyber-Physical Systems (CPS)
112.
cyber-risks
113.
cyber-space nexus
114.
cyber-vulnerabilities
115.
Defensive Cyber Operations
116.
EU cyber policy
117.
international cyber norms
118.
military cyber
119.
mobile cyber-physical system
120.
NATO cyber operations definitions
121.
NATO Cyber Range
122.
Offensive Cyber Operations
123.
perceived cyber risks and threats
124.
responsive cyber defence
125.
Socio-Cyber-Physical Systems
126.
space cyber range
127.
technical cyber exercise
128.
ad-hoc sensor networks security
129.
Automatic Security Verification
130.
Blockchain security
131.
cache security
132.
communication system security
133.
comprehensive system of economic security
134.
computer security
135.
cooperative security dilemma
136.
data security
137.
development of security cameras
138.
digital security practices
139.
drinking water security
140.
economic security
141.
economic security of enterprise
142.
emotional security
143.
energy security
144.
energy security indicator
145.
Estonian information security standard
146.
graded security
147.
hardware security
148.
hardware security primitive
149.
human security
150.
information security
151.
information security and privacy
152.
internal security
153.
international security
154.
investment and innovation security
155.
IPv6 security
156.
IT security
157.
IT security management
158.
job security
159.
long-term security
160.
metadata model for security measures
161.
Middle Eastern security
162.
Mobile security
163.
national security
164.
NATO. Science for Peace and Security Program
165.
network security
166.
network security monitoring
167.
OSCE (Organization for Security and Co-operation in Europe)
168.
passenger’s security
169.
policy-based routing security
170.
political and security cultures
171.
post-quantum security
172.
power system security
173.
quantitative security
174.
regional security
175.
RISC-V Security Verification
176.
safety and security testing
177.
security
178.
security adaptation
179.
security alert prioritization
180.
security analysis
181.
security and justice (AFSJ)
182.
Security and political science
183.
security and privacy
184.
security and privacy in smart grids
185.
Security Assertion Mining
186.
security closure
187.
Security Coverage
188.
security dataset
189.
security dilemma
190.
Security evaluation
191.
security evaluation instruments
192.
Security limitations
193.
security log analysis
194.
security management
195.
security model
196.
security monitoring
197.
security notion
198.
security objectives
199.
security of data
200.
security of supply
201.
security operation center
202.
security operations center
203.
security patterns
204.
security policy
205.
security problem definition
206.
security proof
207.
security protocols
208.
security requirements
209.
security requirements engineering
210.
security risk assessment
211.
security risk management
212.
security risks
213.
security systems for military objects
214.
security testing
215.
security training
216.
security verification
217.
security-by-design
218.
social security planning
219.
societal security
220.
system of economic security
221.
system security
222.
terrorism security
223.
transmission System Security
224.
voting privacy and security
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT