Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Cyber Threat Intelligence (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(3/165)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Integrating Cyber Threat Intelligence into Threat Modeling for Autonomous Ships Using PASTA and MISP
Erbas, Muhammed
;
Vanharanta, Jani
;
Paavola, Jarkko
;
Tsiopoulos, Leonidas
;
Vaarandi, Risto
2025 IEEE International Conference on Cyber Security and Resilience (CSR)
2025
/
p. 133-139
https://ieeexplore.ieee.org/document/11130108
https://doi.org/10.1109/CSR64739.2025.11130108
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A proactive defense : An open-source intelligence (OSINT) framework for maritime cybersecurity
Nasr, Ahmed Nagi Abdelaziz Mohamed
;
Oruc, Aybars
;
Lugo, Ricardo Gregorio
;
Zaitseva-Pärnaste, Inga
;
Kujala, Pentti Jouko Sakari
IEEE Access
2026
/
p. 39852-39872
https://doi.org/10.1109/ACCESS.2026.3673557
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
158
1.
Cyber Threat Intelligence
2.
cyber threat
3.
cyber threat communication
4.
asymmetric threat
5.
group threat theory
6.
hybrid threat
7.
military threat
8.
threat identification
9.
Threat modeling
10.
threat modeling (TM)
11.
threat modelling
12.
threat prevention
13.
ambient intelligence
14.
architectural intelligence
15.
artificial intelligence
16.
artificial intelligence (AI)
17.
artificial intelligence in education
18.
Artificial intelligence in healthcare
19.
Artificial Intelligence in learning
20.
automated cyber defense
21.
autonomous vehicle cyber range
22.
business intelligence
23.
business intelligence and analytics
24.
business intelligence management
25.
business-intelligence (BI)
26.
cloud-based cyber-physical systems (C2PS)
27.
cognitive cyber warfare
28.
collaborative intelligence
29.
collective intelligence
30.
Collective Intelligence (CI) platform
31.
Collective intelligence platforms
32.
competitive intelligence
33.
computational intelligence
34.
connected intelligence
35.
cyber
36.
Cyber “Maastricht”
37.
cyber architecture
38.
cyber attacks
39.
cyber battle damage assessment
40.
Cyber Bio-analytical Physical Systems (CBPSs)
41.
cyber challenge
42.
cyber command
43.
Cyber Command organisational structure
44.
cyber conflict
45.
cyber contingency
46.
cyber crime
47.
cyber crime pathways
48.
cyber crime scripting
49.
Cyber crisis management
50.
cyber defence
51.
cyber defence exercise
52.
cyber defence exercises
53.
cyber defense education
54.
cyber defense exercise
55.
cyber defense exercises
56.
cyber dependence
57.
cyber diplomacy
58.
cyber exercise
59.
cyber hygiene
60.
cyber impact assessment
61.
cyber incidents
62.
cyber insurance
63.
cyber intrusion detection
64.
cyber kill chain
65.
cyber operation
66.
cyber operation officer
67.
cyber operations
68.
cyber operations exercises
69.
cyber physical energy systems
70.
cyber physical power system (CPPS)
71.
Cyber Physical Production System
72.
cyber physical production systems (CPPS)
73.
cyber physical social system
74.
cyber physical social systems (cpss)
75.
cyber physical system
76.
Cyber Planning tool
77.
cyber power Europe
78.
cyber ranges
79.
cyber red teaming
80.
cyber resilience
81.
cyber resilience at sea
82.
cyber risk
83.
cyber risk management in shipping
84.
cyber security
85.
cyber security education
86.
cyber security exercises
87.
cyber security monitoring
88.
cyber security monitoring in maritime
89.
cyber security strategies
90.
cyber situational awareness
91.
cyber stability
92.
cyber team communication
93.
cyber threats
94.
cyber war
95.
cyber warfare
96.
cyber warriors
97.
cyber weapons
98.
cyber-attack
99.
cyber-attack pathways
100.
Cyber-attacks
101.
cyber-insurance
102.
cyber-paternalism
103.
cyber-physical energy systems
104.
cyber-physical social system (CPSS)
105.
cyber-physical system
106.
Cyber-Physical System (CPS)
107.
cyber-physical system logistic robot
108.
cyber-physical system security
109.
cyber-physical systems
110.
Cyber-Physical Systems (CPS)
111.
cyber-risks
112.
cyber-security
113.
cyber-space nexus
114.
cyber-vulnerabilities
115.
data-intelligence
116.
Defensive Cyber Operations
117.
Distributed artificial intelligence (DAI)
118.
Emotional Intelligence (EI)
119.
EU cyber policy
120.
explainable artificial intelligence
121.
Explainable Artificial Intelligence (XAI)
122.
generative artificial intelligence
123.
generative artificial intelligence (GAI)
124.
Geospatial Artificial Intelligence (GeoAI)
125.
hybrid intelligence
126.
intelligence
127.
intelligence augmentation
128.
intelligence infrastructure
129.
international cyber norms
130.
language intelligence
131.
learning (artificial intelligence)
132.
manufacturing intelligence
133.
maritime cyber security
134.
maritime cyber security operations centers
135.
market market intelligence
136.
military cyber
137.
mobile cyber-physical system
138.
national cyber security strategy
139.
NATO cyber operations definitions
140.
NATO Cyber Range
141.
Offensive Cyber Operations
142.
open source intelligence
143.
Open Source Intelligence (OSINT)
144.
open source intelligence tools
145.
open-source intelligence (OSINT)
146.
perceived cyber risks and threats
147.
predictive artificial intelligence
148.
responsive cyber defence
149.
societal intelligence
150.
Socio-Cyber-Physical Systems
151.
space cyber range
152.
super-intelligence
153.
swarm intelligence
154.
swarm intelligence optimization
155.
technical cyber exercise
156.
technology intelligence
157.
trustworthy artificial intelligence
158.
Visualising Cyber Planning
märksõna
6
1.
Artificial Intelligence Controller Interface (AICI)
2.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
3.
Cyber Battle
4.
Estonian Center for Safe and Trustworthy Artificial Intelligence (ECSTAI)
5.
Telia Cyber Battle of Estonia
6.
Telia Cyber Battle of Nordic-Baltics
TTÜ märksõna
1
1.
Goverment Technology and Artificial Intelligence Lab = GovAILab
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT