Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
cyber kill chain (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/128)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
A case study about the use and evaluation of cyber deceptive methods against highly targeted attacks
Farar, Alexandria Elaine
;
Bahsi, Hayretdin
;
Blumbergs, Bernhards
2017 International Conference On Cyber Incident Response, Coordination, Containment and Control, Cyber Incident 2017 : London, United Kingdom, 19 June 2017 through 20 June 2017
2017
/
[7] p. : ill
https://doi.org/10.1109/CYBERINCIDENT.2017.8054640
book article
Number of records 1, displaying
1 - 1
keyword
126
1.
cyber kill chain
2.
alkyl ester chain length
3.
block chain
4.
block-chain
5.
chain model
6.
chain of check points
7.
chain of key factors (KFs)
8.
concept chain
9.
Continuous Time Markov Chain
10.
demand & supply chain management
11.
digital supply chain
12.
global value chain
13.
green supply chain management
14.
legume supply chain
15.
Logistics and supply chain management
16.
long chain fatty acid (LCFA) inhibition
17.
Markov chain
18.
Markov chain process
19.
oil shale value chain
20.
reconfigurable scan-chain
21.
respiratory chain
22.
reverse transcription polymerase chain reaction
23.
road construction supply chain
24.
service supply chain
25.
services value chain collaboration
26.
short chain branching (SCB)
27.
short chain fatty acids
28.
short chain fatty acids (SCFA)
29.
short-chain fatty acids
30.
supplay chain
31.
supply chain
32.
supply chain (SC)
33.
supply chain competences
34.
supply chain engineering
35.
supply chain integration
36.
supply chain management
37.
supply chain model framework
38.
supply chain operations reference (SCOR) model
39.
supply chain planning
40.
supply chain risk
41.
supply chain risk management
42.
supply chain simulation
43.
supply chain skills
44.
supply chain traceability
45.
sustainable supply chain management
46.
sustainalble supply chain management
47.
teaching supply chain management
48.
transmit chain
49.
value adding REE chain
50.
value chain
51.
autonomous vehicle cyber range
52.
cloud-based cyber-physical systems (C2PS)
53.
cyber
54.
Cyber “Maastricht”
55.
cyber architecture
56.
cyber attacks
57.
cyber battle damage assessment
58.
Cyber Bio-analytical Physical Systems (CBPSs)
59.
cyber challenge
60.
cyber command
61.
cyber conflict
62.
cyber contingency
63.
cyber crime
64.
cyber crime pathways
65.
cyber crime scripting
66.
Cyber crisis management
67.
cyber defence
68.
cyber defence exercise
69.
cyber defence exercises
70.
cyber defense exercise
71.
cyber defense exercises
72.
cyber dependence
73.
cyber diplomacy
74.
cyber exercise
75.
cyber hygiene
76.
cyber impact assessment
77.
cyber incidents
78.
cyber insurance
79.
cyber operation
80.
cyber operations
81.
cyber physical energy systems
82.
cyber physical power system (CPPS)
83.
Cyber Physical Production System
84.
cyber physical production systems (CPPS)
85.
cyber physical system
86.
cyber power Europe
87.
cyber ranges
88.
cyber red teaming
89.
cyber resilience
90.
cyber risk
91.
cyber security
92.
cyber security education
93.
cyber security exercises
94.
cyber security strategies
95.
cyber situational awareness
96.
cyber stability
97.
cyber team communication
98.
cyber threat
99.
cyber threat communication
100.
cyber threats
101.
cyber war
102.
cyber warfare
103.
cyber warriors
104.
cyber weapons
105.
cyber-attack
106.
cyber-attack pathways
107.
cyber-insurance
108.
cyber-paternalism
109.
cyber-physical energy systems
110.
cyber-physical social system (CPSS)
111.
cyber-physical system
112.
Cyber-Physical System (CPS)
113.
cyber-physical system logistic robot
114.
cyber-physical systems
115.
Cyber-Physical Systems (CPS)
116.
cyber-security
117.
cyber-vulnerabilities
118.
EU cyber policy
119.
international cyber norms
120.
military cyber
121.
mobile cyber-physical system
122.
national cyber security strategy
123.
NATO Cyber Range
124.
responsive cyber defence
125.
Socio-Cyber-Physical Systems
126.
technical cyber exercise
subject term
2
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT