Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
cyber crime (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/91)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Application of journey mapping and crime scripting to the phenomenon of trolling
Sõmer, Tiia
;
Tiido, Anna
;
Sample, Char
;
Mitchener-Nissen, Timothy
Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018 : National Defence University, Washington DC, USA, 6-9 March 2018
2018
/
p. 465–473 : ill
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051737104&partnerID=40&md5=7bed8e3a8250f0083f8c7702e27c6839
book article
Seotud publikatsioonid
1
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
2
book article EST
/
book article ENG
Are the current system engineering practices sufficient to meet cyber crime?
Buldas, Ahto
;
Saarepera, Märt
Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017 : held as part of HCI International 2017, Vancouver, BC, Canada, July 9–14, 2017 : proceedings
2017
/
p. 451-463
https://doi.org/10.1007/978-3-319-58460-7_31
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
3
book article
Utilising journey mapping and crime scripting to combat cyber crime
Sõmer, Tiia
;
Hallaq, Bil
;
Watson, Tim
Proceedings of the 15th European Conference on Cyber Warfare and Security : ECCWS 2016 : hosted by Universität der Bundeswehr, Munich, Germany, 7-8 July 2016
2016
/
p. 276-281 : ill
book article
Seotud publikatsioonid
1
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
Number of records 3, displaying
1 - 3
keyword
88
1.
cyber crime
2.
cyber crime pathways
3.
cyber crime scripting
4.
crime
5.
crime of aggression
6.
crime of agression
7.
crime scripting
8.
E-CRIME project
9.
financial crime
10.
white-collar crime
11.
autonomous vehicle cyber range
12.
cloud-based cyber-physical systems (C2PS)
13.
cognitive cyber warfare
14.
cyber
15.
Cyber “Maastricht”
16.
cyber architecture
17.
cyber attacks
18.
cyber battle damage assessment
19.
Cyber Bio-analytical Physical Systems (CBPSs)
20.
cyber challenge
21.
cyber command
22.
cyber conflict
23.
cyber contingency
24.
Cyber crisis management
25.
cyber defence
26.
cyber defence exercise
27.
cyber defence exercises
28.
cyber defense education
29.
cyber defense exercise
30.
cyber defense exercises
31.
cyber dependence
32.
cyber diplomacy
33.
cyber exercise
34.
cyber hygiene
35.
cyber impact assessment
36.
cyber incidents
37.
cyber insurance
38.
cyber intrusion detection
39.
cyber kill chain
40.
cyber operation
41.
cyber operations
42.
cyber physical energy systems
43.
cyber physical power system (CPPS)
44.
Cyber Physical Production System
45.
cyber physical production systems (CPPS)
46.
cyber physical system
47.
cyber power Europe
48.
cyber ranges
49.
cyber red teaming
50.
cyber resilience
51.
cyber risk
52.
cyber security
53.
cyber security education
54.
cyber security exercises
55.
cyber security strategies
56.
cyber situational awareness
57.
cyber stability
58.
cyber team communication
59.
cyber threat
60.
cyber threat communication
61.
cyber threats
62.
cyber war
63.
cyber warfare
64.
cyber warriors
65.
cyber weapons
66.
cyber-attack
67.
cyber-attack pathways
68.
cyber-insurance
69.
cyber-paternalism
70.
cyber-physical energy systems
71.
cyber-physical social system (CPSS)
72.
cyber-physical system
73.
Cyber-Physical System (CPS)
74.
cyber-physical system logistic robot
75.
cyber-physical systems
76.
Cyber-Physical Systems (CPS)
77.
cyber-security
78.
cyber-vulnerabilities
79.
EU cyber policy
80.
international cyber norms
81.
military cyber
82.
mobile cyber-physical system
83.
national cyber security strategy
84.
NATO Cyber Range
85.
perceived cyber risks and threats
86.
responsive cyber defence
87.
Socio-Cyber-Physical Systems
88.
technical cyber exercise
subject term
3
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT