Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Cyber Threat Intelligence (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(3/160)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Integrating Cyber Threat Intelligence into Threat Modeling for Autonomous Ships Using PASTA and MISP
Erbas, Muhammed
;
Vanharanta, Jani
;
Paavola, Jarkko
;
Tsiopoulos, Leonidas
;
Vaarandi, Risto
2025 IEEE International Conference on Cyber Security and Resilience (CSR)
2025
/
p. 133-139
https://ieeexplore.ieee.org/document/11130108
https://doi.org/10.1109/CSR64739.2025.11130108
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
153
1.
Cyber Threat Intelligence
2.
cyber threat
3.
cyber threat communication
4.
asymmetric threat
5.
group threat theory
6.
hybrid threat
7.
military threat
8.
threat identification
9.
Threat modeling
10.
threat modeling (TM)
11.
threat modelling
12.
ambient intelligence
13.
architectural intelligence
14.
artificial intelligence
15.
artificial intelligence (AI)
16.
artificial intelligence in education
17.
Artificial intelligence in healthcare
18.
Artificial Intelligence in learning
19.
autonomous vehicle cyber range
20.
business intelligence
21.
business intelligence and analytics
22.
business intelligence management
23.
business-intelligence (BI)
24.
cloud-based cyber-physical systems (C2PS)
25.
cognitive cyber warfare
26.
collaborative intelligence
27.
collective intelligence
28.
Collective Intelligence (CI) platform
29.
Collective intelligence platforms
30.
competitive intelligence
31.
computational intelligence
32.
connected intelligence
33.
cyber
34.
Cyber “Maastricht”
35.
cyber architecture
36.
cyber attacks
37.
cyber battle damage assessment
38.
Cyber Bio-analytical Physical Systems (CBPSs)
39.
cyber challenge
40.
cyber command
41.
Cyber Command organisational structure
42.
cyber conflict
43.
cyber contingency
44.
cyber crime
45.
cyber crime pathways
46.
cyber crime scripting
47.
Cyber crisis management
48.
cyber defence
49.
cyber defence exercise
50.
cyber defence exercises
51.
cyber defense education
52.
cyber defense exercise
53.
cyber defense exercises
54.
cyber dependence
55.
cyber diplomacy
56.
cyber exercise
57.
cyber hygiene
58.
cyber impact assessment
59.
cyber incidents
60.
cyber insurance
61.
cyber intrusion detection
62.
cyber kill chain
63.
cyber operation
64.
cyber operation officer
65.
cyber operations
66.
cyber operations exercises
67.
cyber physical energy systems
68.
cyber physical power system (CPPS)
69.
Cyber Physical Production System
70.
cyber physical production systems (CPPS)
71.
cyber physical social system
72.
cyber physical social systems (cpss)
73.
cyber physical system
74.
Cyber Planning tool
75.
cyber power Europe
76.
cyber ranges
77.
cyber red teaming
78.
cyber resilience
79.
cyber resilience at sea
80.
cyber risk
81.
cyber risk management in shipping
82.
cyber security
83.
cyber security education
84.
cyber security exercises
85.
cyber security monitoring
86.
cyber security strategies
87.
cyber situational awareness
88.
cyber stability
89.
cyber team communication
90.
cyber threats
91.
cyber war
92.
cyber warfare
93.
cyber warriors
94.
cyber weapons
95.
cyber-attack
96.
cyber-attack pathways
97.
Cyber-attacks
98.
cyber-insurance
99.
cyber-paternalism
100.
cyber-physical energy systems
101.
cyber-physical social system (CPSS)
102.
cyber-physical system
103.
Cyber-Physical System (CPS)
104.
cyber-physical system logistic robot
105.
cyber-physical systems
106.
Cyber-Physical Systems (CPS)
107.
cyber-risks
108.
cyber-security
109.
cyber-space nexus
110.
cyber-vulnerabilities
111.
data-intelligence
112.
Defensive Cyber Operations
113.
Distributed artificial intelligence (DAI)
114.
Emotional Intelligence (EI)
115.
EU cyber policy
116.
explainable artificial intelligence
117.
Explainable Artificial Intelligence (XAI)
118.
generative artificial intelligence
119.
generative artificial intelligence (GAI)
120.
Geospatial Artificial Intelligence (GeoAI)
121.
hybrid intelligence
122.
intelligence
123.
intelligence augmentation
124.
intelligence infrastructure
125.
international cyber norms
126.
language intelligence
127.
learning (artificial intelligence)
128.
manufacturing intelligence
129.
maritime cyber security
130.
maritime cyber security operations centers
131.
market market intelligence
132.
military cyber
133.
mobile cyber-physical system
134.
national cyber security strategy
135.
NATO cyber operations definitions
136.
NATO Cyber Range
137.
Offensive Cyber Operations
138.
open source intelligence
139.
Open Source Intelligence (OSINT)
140.
open source intelligence tools
141.
perceived cyber risks and threats
142.
predictive artificial intelligence
143.
responsive cyber defence
144.
societal intelligence
145.
Socio-Cyber-Physical Systems
146.
space cyber range
147.
super-intelligence
148.
swarm intelligence
149.
swarm intelligence optimization
150.
technical cyber exercise
151.
technology intelligence
152.
trustworthy artificial intelligence
153.
Visualising Cyber Planning
märksõna
6
1.
Artificial Intelligence Controller Interface (AICI)
2.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
3.
Cyber Battle
4.
Estonian Center for Safe and Trustworthy Artificial Intelligence (ECSTAI)
5.
Telia Cyber Battle of Estonia
6.
Telia Cyber Battle of Nordic-Baltics
TTÜ märksõna
1
1.
Goverment Technology and Artificial Intelligence Lab = GovAILab
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT