Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
26
Vaata veel..
(2/194)
Ekspordi
ekspordi kõik päringu tulemused
(26)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
26
artikkel kogumikus EST
/
artikkel kogumikus ENG
Variable self-efficacy as a measurement for behaviors in cyber security operations
Lugo, Ricardo Gregorio
;
Knox, Benjamin James
;
Josok, Oyvind
;
Sütterlin, Stefan
Augmented Cognition. Human Cognition and Behavior : 14th International Conference, AC 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings, Part II
2020
/
p. 395-404
https://doi.org/10.1007/978-3-030-50439-7_27
Conference proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 26, kuvan
26 - 26
eelmine
1
2
järgmine
võtmesõna
189
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security strategies
6.
cyber-security
7.
national cyber security strategy
8.
autonomous vehicle cyber range
9.
cloud-based cyber-physical systems (C2PS)
10.
cognitive cyber warfare
11.
cyber
12.
Cyber “Maastricht”
13.
cyber architecture
14.
cyber attacks
15.
cyber battle damage assessment
16.
Cyber Bio-analytical Physical Systems (CBPSs)
17.
cyber challenge
18.
cyber command
19.
cyber conflict
20.
cyber contingency
21.
cyber crime
22.
cyber crime pathways
23.
cyber crime scripting
24.
Cyber crisis management
25.
cyber defence
26.
cyber defence exercise
27.
cyber defence exercises
28.
cyber defense education
29.
cyber defense exercise
30.
cyber defense exercises
31.
cyber dependence
32.
cyber diplomacy
33.
cyber exercise
34.
cyber hygiene
35.
cyber impact assessment
36.
cyber incidents
37.
cyber insurance
38.
cyber intrusion detection
39.
cyber kill chain
40.
cyber operation
41.
cyber operation officer
42.
cyber operations
43.
cyber physical energy systems
44.
cyber physical power system (CPPS)
45.
Cyber Physical Production System
46.
cyber physical production systems (CPPS)
47.
cyber physical social system
48.
cyber physical social systems (cpss)
49.
cyber physical system
50.
cyber power Europe
51.
cyber ranges
52.
cyber red teaming
53.
cyber resilience
54.
cyber risk
55.
cyber situational awareness
56.
cyber stability
57.
cyber team communication
58.
cyber threat
59.
cyber threat communication
60.
cyber threats
61.
cyber war
62.
cyber warfare
63.
cyber warriors
64.
cyber weapons
65.
cyber-attack
66.
cyber-attack pathways
67.
cyber-insurance
68.
cyber-paternalism
69.
cyber-physical energy systems
70.
cyber-physical social system (CPSS)
71.
cyber-physical system
72.
Cyber-Physical System (CPS)
73.
cyber-physical system logistic robot
74.
cyber-physical systems
75.
Cyber-Physical Systems (CPS)
76.
cyber-risks
77.
cyber-space nexus
78.
cyber-vulnerabilities
79.
Defensive Cyber Operations
80.
EU cyber policy
81.
international cyber norms
82.
military cyber
83.
mobile cyber-physical system
84.
NATO cyber operations definitions
85.
NATO Cyber Range
86.
Offensive Cyber Operations
87.
perceived cyber risks and threats
88.
responsive cyber defence
89.
Socio-Cyber-Physical Systems
90.
space cyber range
91.
technical cyber exercise
92.
ad-hoc sensor networks security
93.
Automatic Security Verification
94.
Blockchain security
95.
cache security
96.
communication system security
97.
comprehensive system of economic security
98.
computer security
99.
cooperative security dilemma
100.
data security
101.
development of security cameras
102.
digital security practices
103.
drinking water security
104.
economic security
105.
economic security of enterprise
106.
emotional security
107.
energy security
108.
energy security indicator
109.
Estonian information security standard
110.
graded security
111.
hardware security
112.
hardware security primitive
113.
human security
114.
information security
115.
information security and privacy
116.
internal security
117.
international security
118.
investment and innovation security
119.
IPv6 security
120.
IT security
121.
IT security management
122.
job security
123.
long-term security
124.
metadata model for security measures
125.
Middle Eastern security
126.
Mobile security
127.
national security
128.
NATO. Science for Peace and Security Program
129.
network security
130.
network security monitoring
131.
OSCE (Organization for Security and Co-operation in Europe)
132.
passenger’s security
133.
policy-based routing security
134.
political and security cultures
135.
post-quantum security
136.
power system security
137.
quantitative security
138.
regional security
139.
RISC-V Security Verification
140.
safety and security testing
141.
security
142.
security adaptation
143.
security alert prioritization
144.
security analysis
145.
security and justice (AFSJ)
146.
Security and political science
147.
security and privacy
148.
security and privacy in smart grids
149.
Security Assertion Mining
150.
security closure
151.
Security Coverage
152.
security dataset
153.
security dilemma
154.
Security evaluation
155.
security evaluation instruments
156.
Security limitations
157.
security log analysis
158.
security management
159.
security model
160.
security monitoring
161.
security notion
162.
security objectives
163.
security of data
164.
security of supply
165.
security operation center
166.
security operations center
167.
security patterns
168.
security policy
169.
security problem definition
170.
security proof
171.
security protocols
172.
security requirements
173.
security requirements engineering
174.
security risk assessment
175.
security risk management
176.
security risks
177.
security strategies
178.
security systems for military objects
179.
security testing
180.
security training
181.
security verification
182.
security-by-design
183.
social security planning
184.
societal security
185.
system of economic security
186.
system security
187.
terrorism security
188.
transmission System Security
189.
voting privacy and security
märksõna
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT