Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber-security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/224)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Governance of cyber-security in Internet-based elections [Online resource]
Krimmer, Robert Johannes
;
Rincon Mendez, Angelica Marina
;
Meyerhoff Nielsen, Morten
Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology
2015
/
p. 7-9
http://cybercentre.cs.ttu.ee/en/icr2015/
book article
2
book article
Model-enhanced control for cyber-physical security: simulation of model-based navigation of an environment-coupled watercraft under disrupted global positioning conditions
Udal, Andres
;
Kaugerand, Jaanus
;
Astrov, Igor
;
Mõlder, Heigo
;
Koit, Katre
2025 MIPRO 48th ICT and Electronics Convention
2025
/
p. 794-799 : ill
https://doi.org/10.1109/MIPRO65660.2025.11131811
Article at Scopus
book article
Number of records 2, displaying
1 - 2
keyword
218
1.
cyber-security
2.
cyber security
3.
cyber security education
4.
cyber security exercises
5.
cyber security monitoring
6.
cyber security monitoring in maritime
7.
cyber security strategies
8.
maritime cyber security
9.
maritime cyber security operations centers
10.
national cyber security strategy
11.
cyber-physical system security
12.
automated cyber defense
13.
autonomous vehicle cyber range
14.
cloud-based cyber-physical systems (C2PS)
15.
cognitive cyber warfare
16.
cyber
17.
Cyber “Maastricht”
18.
cyber architecture
19.
cyber attacks
20.
cyber battle damage assessment
21.
Cyber Bio-analytical Physical Systems (CBPSs)
22.
cyber challenge
23.
cyber command
24.
Cyber Command organisational structure
25.
cyber conflict
26.
cyber contingency
27.
cyber crime
28.
cyber crime pathways
29.
cyber crime scripting
30.
Cyber crisis management
31.
cyber defence
32.
cyber defence exercise
33.
cyber defence exercises
34.
cyber defense education
35.
cyber defense exercise
36.
cyber defense exercises
37.
cyber dependence
38.
cyber diplomacy
39.
cyber exercise
40.
cyber hygiene
41.
cyber impact assessment
42.
cyber incidents
43.
cyber insurance
44.
cyber intrusion detection
45.
cyber kill chain
46.
cyber operation
47.
cyber operation officer
48.
cyber operations
49.
cyber operations exercises
50.
cyber physical energy systems
51.
cyber physical power system (CPPS)
52.
Cyber Physical Production System
53.
cyber physical production systems (CPPS)
54.
cyber physical social system
55.
cyber physical social systems (cpss)
56.
cyber physical system
57.
Cyber Planning tool
58.
cyber power Europe
59.
cyber ranges
60.
cyber red teaming
61.
cyber resilience
62.
cyber resilience at sea
63.
cyber risk
64.
cyber risk management in shipping
65.
cyber situational awareness
66.
cyber stability
67.
cyber team communication
68.
cyber threat
69.
cyber threat communication
70.
Cyber Threat Intelligence
71.
cyber threats
72.
cyber war
73.
cyber warfare
74.
cyber warriors
75.
cyber weapons
76.
cyber-attack
77.
cyber-attack pathways
78.
Cyber-attacks
79.
cyber-insurance
80.
cyber-paternalism
81.
cyber-physical energy systems
82.
cyber-physical social system (CPSS)
83.
cyber-physical system
84.
Cyber-Physical System (CPS)
85.
cyber-physical system logistic robot
86.
cyber-physical systems
87.
Cyber-Physical Systems (CPS)
88.
cyber-risks
89.
cyber-space nexus
90.
cyber-vulnerabilities
91.
Defensive Cyber Operations
92.
EU cyber policy
93.
international cyber norms
94.
military cyber
95.
mobile cyber-physical system
96.
NATO cyber operations definitions
97.
NATO Cyber Range
98.
Offensive Cyber Operations
99.
perceived cyber risks and threats
100.
responsive cyber defence
101.
Socio-Cyber-Physical Systems
102.
space cyber range
103.
technical cyber exercise
104.
Visualising Cyber Planning
105.
ad-hoc sensor networks security
106.
Automatic Security Verification
107.
Blockchain security
108.
cache security
109.
cloud security
110.
communication system security
111.
comprehensive system of economic security
112.
computer security
113.
cooperative security dilemma
114.
data and information security
115.
data security
116.
development of security cameras
117.
digital security practices
118.
drinking water security
119.
economic security
120.
economic security of enterprise
121.
emotional security
122.
energy security
123.
energy security indicator
124.
Estonian information security standard
125.
graded security
126.
hardware security
127.
hardware security primitive
128.
high level of security
129.
Homeland security
130.
human security
131.
information security
132.
information security and privacy
133.
initial level of security
134.
internal security
135.
international security
136.
investment and innovation security
137.
IPv6 security
138.
IT security
139.
IT security management
140.
job security
141.
long-term security
142.
Maritime Security Operations Center (M-SOC)
143.
medium level of security
144.
metadata model for security measures
145.
Middle Eastern security
146.
Mobile security
147.
national security
148.
NATO. Science for Peace and Security Program
149.
network security
150.
network security monitoring
151.
OSCE (Organization for Security and Co-operation in Europe)
152.
passenger’s security
153.
policy-based routing security
154.
political and security cultures
155.
post-quantum security
156.
power system security
157.
quantitative security
158.
regional security
159.
RISC-V Security Verification
160.
Safety and Security in Sea Transportation
161.
safety and security testing
162.
security
163.
security adaptation
164.
security alert prioritization
165.
security analysis
166.
security and justice (AFSJ)
167.
Security and political science
168.
security and privacy
169.
security and privacy in smart grids
170.
Security Assertion
171.
Security Assertion Mining
172.
security closure
173.
Security Coverage
174.
security dataset
175.
security dilemma
176.
Security evaluation
177.
security evaluation instruments
178.
Security Level Evaluation
179.
Security limitations
180.
security log analysis
181.
security management
182.
security model
183.
security monitoring
184.
security notion
185.
security objectives
186.
security of data
187.
security of supply
188.
security operation center
189.
security operations center
190.
security patterns
191.
security policy
192.
security problem definition
193.
security proof
194.
security protocols
195.
security requirements
196.
security requirements engineering
197.
security research
198.
security risk assessment
199.
security risk management
200.
security risks
201.
security science and technology
202.
security strategies
203.
security systems for military objects
204.
security testing
205.
security training
206.
security verification
207.
security-by-design
208.
social security planning
209.
societal security
210.
software security
211.
software security level
212.
software security subcharacteristics
213.
sufficient level of security
214.
system of economic security
215.
system security
216.
terrorism security
217.
transmission System Security
218.
voting privacy and security
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT