Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
threat identification (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/59)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Human-centric approach to cyber threat identification : The role of cognition, experience, and education in decision-making
Lugo, Ricardo Gregorio
;
Juozapavicius, Ausrius
;
Lapin, Kristina
;
Ask, Torvald F.
;
Knox, Benjamin James
;
Sütterlin, Stefan
Journal of cases on information technology
2025
/
13 p
https://doi.org/10.4018/JCIT.368220
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
59
1.
threat identification
2.
asymmetric threat
3.
cyber threat
4.
cyber threat communication
5.
Cyber Threat Intelligence
6.
group threat theory
7.
hybrid threat
8.
military threat
9.
Threat modeling
10.
threat modeling (TM)
11.
threat modelling
12.
threat prevention
13.
Automatic identification system
14.
automatic identification system (AIS)
15.
Autonomous Identification System (AIS)
16.
brand community identification
17.
brand identification
18.
brand origin identification
19.
change point identification
20.
closed-loop identification
21.
critical area identification
22.
critical path identification
23.
defect identification
24.
digital identification
25.
electronic identification
26.
eyewitness identification
27.
identification
28.
identification cards
29.
identification of military objects
30.
identification of unbalance voltage source
31.
identification of voltage unbalance sources
32.
identification patterns
33.
identification problems
34.
identification via heteroskedasticity
35.
language identification
36.
medicinal product identification
37.
message identification
38.
metaverse identification
39.
model identification
40.
mould identification
41.
nonlinear model identification
42.
parameter identification
43.
path identification
44.
patient identification techniques
45.
phase identification
46.
radio frequency identification
47.
root identification
48.
Satellite Autonomous Identification System (SAIS)
49.
seismic signal identification
50.
self-identification
51.
speaker identification
52.
species identification
53.
structural identification
54.
sustem identification
55.
system identification
56.
taxonomical identification
57.
thermal behavior identification
58.
vehicle identification
59.
yeast identification
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT