Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
national cyber security strategy (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/272)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
NCSS: A global census of national positions on conflict, neutrality and cooperation
Serrano-Iova, Radu-Antonio
;
Watashiba, Tomoe
Proceedings of the 22nd European Conference on Cyber Warfare and Security
2023
/
p. 420-428 : ill
https://papers.academic-conferences.org/index.php/eccws/issue/view/20/23
https://doi.org/10.34190/eccws.22.1.1168
artikkel kogumikus
Seotud publikatsioonid
1
Knowledge transfer for public administrations : the case of elections and cybersecurity = Haldusasutuste teadmussiire : valimiste ja küberturvalisuse juhtum
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
266
1.
national cyber security strategy
2.
cyber security
3.
cyber security education
4.
cyber security exercises
5.
cyber security monitoring
6.
cyber security strategies
7.
cyber-security
8.
maritime cyber security
9.
maritime cyber security operations centers
10.
national security
11.
adaptive test strategy generation
12.
AI strategy
13.
behavioural strategy
14.
BESS Control Strategy
15.
branding strategy
16.
business strategy
17.
control strategy
18.
diffusion strategy
19.
education strategy
20.
educational strategy
21.
efficient control strategy
22.
electrode placement strategy
23.
end-of-life (EOL) strategy
24.
enterprise strategy
25.
EU heating and cooling strategy
26.
EU post-2020 biodiversity strategy
27.
EU regulatory strategy
28.
European institutions digital strategy
29.
fault handling strategy
30.
human resource and Strategy Europe 2020
31.
long term renovation strategy
32.
management strategy
33.
manufacturing strategy
34.
marine strategy framework directive
35.
Marine Strategy Framework Directive (MSFD)
36.
market strategy
37.
marketing strategy
38.
modulation strategy
39.
nonlinear control strategy
40.
optimal operation strategy
41.
optimal storage strategy
42.
outsourcing strategy
43.
ownership strategy
44.
passive design strategy
45.
PLM implementation strategy
46.
PLM strategy
47.
port strategy
48.
Power leveling strategy
49.
pricing strategy
50.
proactive strategy
51.
Renovation strategy
52.
scan strategy
53.
scanning strategy
54.
Smart Specialization Strategy
55.
strategy
56.
strategy building
57.
strategy definition
58.
strategy Europe 2020
59.
strategy focus
60.
strategy formation
61.
strategy map
62.
sustainability strategy
63.
sustainable strategy
64.
teaching strategy
65.
waste management strategy
66.
autonomous vehicle cyber range
67.
cloud-based cyber-physical systems (C2PS)
68.
cognitive cyber warfare
69.
cyber
70.
Cyber “Maastricht”
71.
cyber architecture
72.
cyber attacks
73.
cyber battle damage assessment
74.
Cyber Bio-analytical Physical Systems (CBPSs)
75.
cyber challenge
76.
cyber command
77.
Cyber Command organisational structure
78.
cyber conflict
79.
cyber contingency
80.
cyber crime
81.
cyber crime pathways
82.
cyber crime scripting
83.
Cyber crisis management
84.
cyber defence
85.
cyber defence exercise
86.
cyber defence exercises
87.
cyber defense education
88.
cyber defense exercise
89.
cyber defense exercises
90.
cyber dependence
91.
cyber diplomacy
92.
cyber exercise
93.
cyber hygiene
94.
cyber impact assessment
95.
cyber incidents
96.
cyber insurance
97.
cyber intrusion detection
98.
cyber kill chain
99.
cyber operation
100.
cyber operation officer
101.
cyber operations
102.
cyber operations exercises
103.
cyber physical energy systems
104.
cyber physical power system (CPPS)
105.
Cyber Physical Production System
106.
cyber physical production systems (CPPS)
107.
cyber physical social system
108.
cyber physical social systems (cpss)
109.
cyber physical system
110.
Cyber Planning tool
111.
cyber power Europe
112.
cyber ranges
113.
cyber red teaming
114.
cyber resilience
115.
cyber resilience at sea
116.
cyber risk
117.
cyber risk management in shipping
118.
cyber situational awareness
119.
cyber stability
120.
cyber team communication
121.
cyber threat
122.
cyber threat communication
123.
Cyber Threat Intelligence
124.
cyber threats
125.
cyber war
126.
cyber warfare
127.
cyber warriors
128.
cyber weapons
129.
cyber-attack
130.
cyber-attack pathways
131.
Cyber-attacks
132.
cyber-insurance
133.
cyber-paternalism
134.
cyber-physical energy systems
135.
cyber-physical social system (CPSS)
136.
cyber-physical system
137.
Cyber-Physical System (CPS)
138.
cyber-physical system logistic robot
139.
cyber-physical systems
140.
Cyber-Physical Systems (CPS)
141.
cyber-risks
142.
cyber-space nexus
143.
cyber-vulnerabilities
144.
Defensive Cyber Operations
145.
EU cyber policy
146.
international cyber norms
147.
military cyber
148.
mobile cyber-physical system
149.
NATO cyber operations definitions
150.
NATO Cyber Range
151.
Offensive Cyber Operations
152.
perceived cyber risks and threats
153.
responsive cyber defence
154.
Socio-Cyber-Physical Systems
155.
space cyber range
156.
technical cyber exercise
157.
Visualising Cyber Planning
158.
ad-hoc sensor networks security
159.
Automatic Security Verification
160.
Blockchain security
161.
cache security
162.
communication system security
163.
comprehensive system of economic security
164.
computer security
165.
cooperative security dilemma
166.
data and information security
167.
data security
168.
development of security cameras
169.
digital security practices
170.
drinking water security
171.
economic security
172.
economic security of enterprise
173.
emotional security
174.
energy security
175.
energy security indicator
176.
Estonian information security standard
177.
graded security
178.
hardware security
179.
hardware security primitive
180.
high level of security
181.
Homeland security
182.
human security
183.
information security
184.
information security and privacy
185.
initial level of security
186.
internal security
187.
international security
188.
investment and innovation security
189.
IPv6 security
190.
IT security
191.
IT security management
192.
job security
193.
long-term security
194.
Maritime Security Operations Center (M-SOC)
195.
medium level of security
196.
metadata model for security measures
197.
Middle Eastern security
198.
Mobile security
199.
NATO. Science for Peace and Security Program
200.
network security
201.
network security monitoring
202.
OSCE (Organization for Security and Co-operation in Europe)
203.
passenger’s security
204.
policy-based routing security
205.
political and security cultures
206.
post-quantum security
207.
power system security
208.
quantitative security
209.
regional security
210.
RISC-V Security Verification
211.
Safety and Security in Sea Transportation
212.
safety and security testing
213.
security
214.
security adaptation
215.
security alert prioritization
216.
security analysis
217.
security and justice (AFSJ)
218.
Security and political science
219.
security and privacy
220.
security and privacy in smart grids
221.
Security Assertion Mining
222.
security closure
223.
Security Coverage
224.
security dataset
225.
security dilemma
226.
Security evaluation
227.
security evaluation instruments
228.
Security limitations
229.
security log analysis
230.
security management
231.
security model
232.
security monitoring
233.
security notion
234.
security objectives
235.
security of data
236.
security of supply
237.
security operation center
238.
security operations center
239.
security patterns
240.
security policy
241.
security problem definition
242.
security proof
243.
security protocols
244.
security requirements
245.
security requirements engineering
246.
security risk assessment
247.
security risk management
248.
security risks
249.
security science and technology
250.
security strategies
251.
security systems for military objects
252.
security testing
253.
security training
254.
security verification
255.
security-by-design
256.
social security planning
257.
societal security
258.
software security
259.
software security level
260.
software security subcharacteristics
261.
sufficient level of security
262.
system of economic security
263.
system security
264.
terrorism security
265.
transmission System Security
266.
voting privacy and security
märksõna
6
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
3.
Cyber Battle
4.
Telia Cyber Battle of Estonia
5.
Telia Cyber Battle of Nordic-Baltics
6.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT