Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Cyber-attacks (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/126)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Challenges to Homeland Security in Countering Latent Hybrid Threats During the War in Ukraine : The Case of Estonia
Mölder, Holger
;
Sazonov, Vladimir
;
Loik, Ramon
Russian Influence Operations and the War in Ukraine: Hybrid Warfare and Disinformation Campaigns
2025
/
p. 235-260
https://link.springer.com/book/10.1007/978-3-032-01461-0
https://doi.org/10.1007/978-3-032-01461-0_10
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
122
1.
Cyber-attacks
2.
cyber attacks
3.
AI-generated attacks
4.
amplification attacks
5.
architectural attacks
6.
attacks
7.
cache attacks
8.
Cache Side-Channel Attacks
9.
data attacks
10.
DDoS attacks
11.
denial of service attacks
12.
functionality attacks
13.
IP attacks
14.
jamming attacks
15.
offline guessing attacks
16.
oracle-guided (OG) attacks
17.
oracle-guided attacks
18.
oracle-less (OL) and oracle-guided (OG) attacks
19.
oracle-less (OL) attacks
20.
oracle-less attacks
21.
process-aware attacks
22.
side-channel attacks
23.
targeted attacks
24.
autonomous vehicle cyber range
25.
cloud-based cyber-physical systems (C2PS)
26.
cognitive cyber warfare
27.
cyber
28.
Cyber “Maastricht”
29.
cyber architecture
30.
cyber battle damage assessment
31.
Cyber Bio-analytical Physical Systems (CBPSs)
32.
cyber challenge
33.
cyber command
34.
Cyber Command organisational structure
35.
cyber conflict
36.
cyber contingency
37.
cyber crime
38.
cyber crime pathways
39.
cyber crime scripting
40.
Cyber crisis management
41.
cyber defence
42.
cyber defence exercise
43.
cyber defence exercises
44.
cyber defense education
45.
cyber defense exercise
46.
cyber defense exercises
47.
cyber dependence
48.
cyber diplomacy
49.
cyber exercise
50.
cyber hygiene
51.
cyber impact assessment
52.
cyber incidents
53.
cyber insurance
54.
cyber intrusion detection
55.
cyber kill chain
56.
cyber operation
57.
cyber operation officer
58.
cyber operations
59.
cyber operations exercises
60.
cyber physical energy systems
61.
cyber physical power system (CPPS)
62.
Cyber Physical Production System
63.
cyber physical production systems (CPPS)
64.
cyber physical social system
65.
cyber physical social systems (cpss)
66.
cyber physical system
67.
Cyber Planning tool
68.
cyber power Europe
69.
cyber ranges
70.
cyber red teaming
71.
cyber resilience
72.
cyber resilience at sea
73.
cyber risk
74.
cyber risk management in shipping
75.
cyber security
76.
cyber security education
77.
cyber security exercises
78.
cyber security monitoring
79.
cyber security strategies
80.
cyber situational awareness
81.
cyber stability
82.
cyber team communication
83.
cyber threat
84.
cyber threat communication
85.
Cyber Threat Intelligence
86.
cyber threats
87.
cyber war
88.
cyber warfare
89.
cyber warriors
90.
cyber weapons
91.
cyber-attack
92.
cyber-attack pathways
93.
cyber-insurance
94.
cyber-paternalism
95.
cyber-physical energy systems
96.
cyber-physical social system (CPSS)
97.
cyber-physical system
98.
Cyber-Physical System (CPS)
99.
cyber-physical system logistic robot
100.
cyber-physical systems
101.
Cyber-Physical Systems (CPS)
102.
cyber-risks
103.
cyber-security
104.
cyber-space nexus
105.
cyber-vulnerabilities
106.
Defensive Cyber Operations
107.
EU cyber policy
108.
international cyber norms
109.
maritime cyber security
110.
maritime cyber security operations centers
111.
military cyber
112.
mobile cyber-physical system
113.
national cyber security strategy
114.
NATO cyber operations definitions
115.
NATO Cyber Range
116.
Offensive Cyber Operations
117.
perceived cyber risks and threats
118.
responsive cyber defence
119.
Socio-Cyber-Physical Systems
120.
space cyber range
121.
technical cyber exercise
122.
Visualising Cyber Planning
subject term
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT