Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber security strategies (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/229)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
224
1.
cyber security strategies
2.
security strategies
3.
cyber security
4.
cyber security education
5.
cyber security exercises
6.
cyber security monitoring
7.
cyber-security
8.
national cyber security strategy
9.
airport strategies
10.
co-design strategies
11.
collaboration strategies
12.
coping strategies
13.
course development strategies
14.
cultural adjustment strategies
15.
cultural tourism strategies
16.
digital strategies
17.
Educational strategies
18.
e-Government policies and strategies
19.
energy management strategies (EMS)
20.
enterprise strategies
21.
EoL strategies
22.
EU policies and strategies
23.
European firefighting strategies
24.
graph and tree search strategies
25.
hybrid strategies
26.
innovation in processing strategies
27.
management strategies
28.
mitigation strategies
29.
mitigation strategies of UHI effect
30.
passive design strategies
31.
portfolio of strategies
32.
questioning strategies
33.
regional innovation strategies on smart specialization (RIS3)
34.
research strategies
35.
smart specialization strategies (S3)
36.
strategies
37.
strategies and concepts of bioinspired designs
38.
strategies for human resource and local policies
39.
strategies of inquiry
40.
suboptimal feedback strategies
41.
sub-optimal feedback strategies
42.
synthesis strategies
43.
teaching strategies
44.
autonomous vehicle cyber range
45.
cloud-based cyber-physical systems (C2PS)
46.
cognitive cyber warfare
47.
cyber
48.
Cyber “Maastricht”
49.
cyber architecture
50.
cyber attacks
51.
cyber battle damage assessment
52.
Cyber Bio-analytical Physical Systems (CBPSs)
53.
cyber challenge
54.
cyber command
55.
cyber conflict
56.
cyber contingency
57.
cyber crime
58.
cyber crime pathways
59.
cyber crime scripting
60.
Cyber crisis management
61.
cyber defence
62.
cyber defence exercise
63.
cyber defence exercises
64.
cyber defense education
65.
cyber defense exercise
66.
cyber defense exercises
67.
cyber dependence
68.
cyber diplomacy
69.
cyber exercise
70.
cyber hygiene
71.
cyber impact assessment
72.
cyber incidents
73.
cyber insurance
74.
cyber intrusion detection
75.
cyber kill chain
76.
cyber operation
77.
cyber operation officer
78.
cyber operations
79.
cyber physical energy systems
80.
cyber physical power system (CPPS)
81.
Cyber Physical Production System
82.
cyber physical production systems (CPPS)
83.
cyber physical social system
84.
cyber physical social systems (cpss)
85.
cyber physical system
86.
cyber power Europe
87.
cyber ranges
88.
cyber red teaming
89.
cyber resilience
90.
cyber risk
91.
cyber situational awareness
92.
cyber stability
93.
cyber team communication
94.
cyber threat
95.
cyber threat communication
96.
cyber threats
97.
cyber war
98.
cyber warfare
99.
cyber warriors
100.
cyber weapons
101.
cyber-attack
102.
cyber-attack pathways
103.
cyber-insurance
104.
cyber-paternalism
105.
cyber-physical energy systems
106.
cyber-physical social system (CPSS)
107.
cyber-physical system
108.
Cyber-Physical System (CPS)
109.
cyber-physical system logistic robot
110.
cyber-physical systems
111.
Cyber-Physical Systems (CPS)
112.
cyber-risks
113.
cyber-space nexus
114.
cyber-vulnerabilities
115.
Defensive Cyber Operations
116.
EU cyber policy
117.
international cyber norms
118.
military cyber
119.
mobile cyber-physical system
120.
NATO cyber operations definitions
121.
NATO Cyber Range
122.
Offensive Cyber Operations
123.
perceived cyber risks and threats
124.
responsive cyber defence
125.
Socio-Cyber-Physical Systems
126.
space cyber range
127.
technical cyber exercise
128.
ad-hoc sensor networks security
129.
Automatic Security Verification
130.
Blockchain security
131.
cache security
132.
communication system security
133.
comprehensive system of economic security
134.
computer security
135.
cooperative security dilemma
136.
data security
137.
development of security cameras
138.
digital security practices
139.
drinking water security
140.
economic security
141.
economic security of enterprise
142.
emotional security
143.
energy security
144.
energy security indicator
145.
Estonian information security standard
146.
graded security
147.
hardware security
148.
hardware security primitive
149.
human security
150.
information security
151.
information security and privacy
152.
internal security
153.
international security
154.
investment and innovation security
155.
IPv6 security
156.
IT security
157.
IT security management
158.
job security
159.
long-term security
160.
metadata model for security measures
161.
Middle Eastern security
162.
Mobile security
163.
national security
164.
NATO. Science for Peace and Security Program
165.
network security
166.
network security monitoring
167.
OSCE (Organization for Security and Co-operation in Europe)
168.
passenger’s security
169.
policy-based routing security
170.
political and security cultures
171.
post-quantum security
172.
power system security
173.
quantitative security
174.
regional security
175.
RISC-V Security Verification
176.
safety and security testing
177.
security
178.
security adaptation
179.
security alert prioritization
180.
security analysis
181.
security and justice (AFSJ)
182.
Security and political science
183.
security and privacy
184.
security and privacy in smart grids
185.
Security Assertion Mining
186.
security closure
187.
Security Coverage
188.
security dataset
189.
security dilemma
190.
Security evaluation
191.
security evaluation instruments
192.
Security limitations
193.
security log analysis
194.
security management
195.
security model
196.
security monitoring
197.
security notion
198.
security objectives
199.
security of data
200.
security of supply
201.
security operation center
202.
security operations center
203.
security patterns
204.
security policy
205.
security problem definition
206.
security proof
207.
security protocols
208.
security requirements
209.
security requirements engineering
210.
security risk assessment
211.
security risk management
212.
security risks
213.
security systems for military objects
214.
security testing
215.
security training
216.
security verification
217.
security-by-design
218.
social security planning
219.
societal security
220.
system of economic security
221.
system security
222.
terrorism security
223.
transmission System Security
224.
voting privacy and security
märksõna
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT