Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Cyber Threat Intelligence (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(3/153)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Integrating Cyber Threat Intelligence into Threat Modeling for Autonomous Ships Using PASTA and MISP
Erbas, Muhammed
;
Vanharanta, Jani
;
Paavola, Jarkko
;
Tsiopoulos, Leonidas
;
Vaarandi, Risto
2025 IEEE International Conference on Cyber Security and Resilience (CSR)
2025
/
p. 133-139
https://ieeexplore.ieee.org/document/11130108
https://doi.org/10.1109/CSR64739.2025.11130108
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
147
1.
Cyber Threat Intelligence
2.
cyber threat
3.
cyber threat communication
4.
asymmetric threat
5.
group threat theory
6.
hybrid threat
7.
military threat
8.
threat identification
9.
Threat modeling
10.
threat modeling (TM)
11.
threat modelling
12.
ambient intelligence
13.
architectural intelligence
14.
artificial intelligence
15.
artificial intelligence (AI)
16.
artificial intelligence in education
17.
autonomous vehicle cyber range
18.
business intelligence
19.
business intelligence and analytics
20.
business intelligence management
21.
business-intelligence (BI)
22.
cloud-based cyber-physical systems (C2PS)
23.
cognitive cyber warfare
24.
collaborative intelligence
25.
collective intelligence
26.
Collective Intelligence (CI) platform
27.
Collective intelligence platforms
28.
competitive intelligence
29.
computational intelligence
30.
connected intelligence
31.
cyber
32.
Cyber “Maastricht”
33.
cyber architecture
34.
cyber attacks
35.
cyber battle damage assessment
36.
Cyber Bio-analytical Physical Systems (CBPSs)
37.
cyber challenge
38.
cyber command
39.
Cyber Command organisational structure
40.
cyber conflict
41.
cyber contingency
42.
cyber crime
43.
cyber crime pathways
44.
cyber crime scripting
45.
Cyber crisis management
46.
cyber defence
47.
cyber defence exercise
48.
cyber defence exercises
49.
cyber defense education
50.
cyber defense exercise
51.
cyber defense exercises
52.
cyber dependence
53.
cyber diplomacy
54.
cyber exercise
55.
cyber hygiene
56.
cyber impact assessment
57.
cyber incidents
58.
cyber insurance
59.
cyber intrusion detection
60.
cyber kill chain
61.
cyber operation
62.
cyber operation officer
63.
cyber operations
64.
cyber operations exercises
65.
cyber physical energy systems
66.
cyber physical power system (CPPS)
67.
Cyber Physical Production System
68.
cyber physical production systems (CPPS)
69.
cyber physical social system
70.
cyber physical social systems (cpss)
71.
cyber physical system
72.
Cyber Planning tool
73.
cyber power Europe
74.
cyber ranges
75.
cyber red teaming
76.
cyber resilience
77.
cyber risk
78.
cyber security
79.
cyber security education
80.
cyber security exercises
81.
cyber security monitoring
82.
cyber security strategies
83.
cyber situational awareness
84.
cyber stability
85.
cyber team communication
86.
cyber threats
87.
cyber war
88.
cyber warfare
89.
cyber warriors
90.
cyber weapons
91.
cyber-attack
92.
cyber-attack pathways
93.
Cyber-attacks
94.
cyber-insurance
95.
cyber-paternalism
96.
cyber-physical energy systems
97.
cyber-physical social system (CPSS)
98.
cyber-physical system
99.
Cyber-Physical System (CPS)
100.
cyber-physical system logistic robot
101.
cyber-physical systems
102.
Cyber-Physical Systems (CPS)
103.
cyber-risks
104.
cyber-security
105.
cyber-space nexus
106.
cyber-vulnerabilities
107.
data-intelligence
108.
Defensive Cyber Operations
109.
Distributed artificial intelligence (DAI)
110.
Emotional Intelligence (EI)
111.
EU cyber policy
112.
explainable artificial intelligence
113.
Explainable Artificial Intelligence (XAI)
114.
generative artificial intelligence
115.
generative artificial intelligence (GAI)
116.
Geospatial Artificial Intelligence (GeoAI)
117.
hybrid intelligence
118.
intelligence
119.
intelligence augmentation
120.
intelligence infrastructure
121.
international cyber norms
122.
language intelligence
123.
learning (artificial intelligence)
124.
manufacturing intelligence
125.
market market intelligence
126.
military cyber
127.
mobile cyber-physical system
128.
national cyber security strategy
129.
NATO cyber operations definitions
130.
NATO Cyber Range
131.
Offensive Cyber Operations
132.
open source intelligence
133.
Open Source Intelligence (OSINT)
134.
open source intelligence tools
135.
perceived cyber risks and threats
136.
predictive artificial intelligence
137.
responsive cyber defence
138.
societal intelligence
139.
Socio-Cyber-Physical Systems
140.
space cyber range
141.
super-intelligence
142.
swarm intelligence
143.
swarm intelligence optimization
144.
technical cyber exercise
145.
technology intelligence
146.
trustworthy artificial intelligence
147.
Visualising Cyber Planning
märksõna
5
1.
Artificial Intelligence Controller Interface (AICI)
2.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
3.
Cyber Battle
4.
Estonian Center for Safe and Trustworthy Artificial Intelligence (ECSTAI)
5.
Telia Cyber Battle of Nordic-Baltics
TTÜ märksõna
1
1.
Goverment Technology and Artificial Intelligence Lab = GovAILab
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT