Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
Strategic cyber security (title)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/251)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Strategic cyber security
Geers, Kenneth
2011
https://www.ester.ee/record=b2692421*est
book
Number of records 1, displaying
1 - 1
keyword
245
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security monitoring in maritime
6.
cyber security strategies
7.
cyber-physical system security
8.
cyber-security
9.
maritime cyber security
10.
maritime cyber security operations centers
11.
national cyber security strategy
12.
data-driven strategic planning
13.
EU Strategic Narratives
14.
strategic narrative theory
15.
strategic action fields
16.
strategic alliances
17.
strategic audit
18.
strategic autonomy
19.
strategic communication
20.
strategic corporate governance
21.
strategic energy planning
22.
strategic environmental assessment
23.
strategic flexibility
24.
strategic human resource management
25.
strategic imagination
26.
strategic innovation policy
27.
strategic intentions
28.
strategic level decision makers
29.
strategic management
30.
strategic meaning
31.
strategic narrative
32.
strategic narrative theory
33.
strategic narratives
34.
strategic orientations
35.
strategic partnerships
36.
strategic planning
37.
strategic renewal and corporate turnaround management
38.
strategic rules
39.
automated cyber defense
40.
autonomous vehicle cyber range
41.
cloud-based cyber-physical systems (C2PS)
42.
cognitive cyber warfare
43.
cyber
44.
Cyber “Maastricht”
45.
cyber architecture
46.
cyber attacks
47.
cyber battle damage assessment
48.
Cyber Bio-analytical Physical Systems (CBPSs)
49.
cyber challenge
50.
cyber command
51.
Cyber Command organisational structure
52.
cyber conflict
53.
cyber contingency
54.
cyber crime
55.
cyber crime pathways
56.
cyber crime scripting
57.
Cyber crisis management
58.
cyber defence
59.
cyber defence exercise
60.
cyber defence exercises
61.
cyber defense education
62.
cyber defense exercise
63.
cyber defense exercises
64.
cyber dependence
65.
cyber diplomacy
66.
cyber exercise
67.
cyber hygiene
68.
cyber impact assessment
69.
cyber incidents
70.
cyber insurance
71.
cyber intrusion detection
72.
cyber kill chain
73.
cyber operation
74.
cyber operation officer
75.
cyber operations
76.
cyber operations exercises
77.
cyber physical energy systems
78.
cyber physical power system (CPPS)
79.
Cyber Physical Production System
80.
cyber physical production systems (CPPS)
81.
cyber physical social system
82.
cyber physical social systems (cpss)
83.
cyber physical system
84.
Cyber Planning tool
85.
cyber power Europe
86.
cyber ranges
87.
cyber red teaming
88.
cyber resilience
89.
cyber resilience at sea
90.
cyber risk
91.
cyber risk management in shipping
92.
cyber situational awareness
93.
cyber stability
94.
cyber team communication
95.
cyber threat
96.
cyber threat communication
97.
Cyber Threat Intelligence
98.
cyber threats
99.
cyber war
100.
cyber warfare
101.
cyber warriors
102.
cyber weapons
103.
cyber-attack
104.
cyber-attack pathways
105.
Cyber-attacks
106.
cyber-insurance
107.
cyber-paternalism
108.
cyber-physical energy systems
109.
cyber-physical social system (CPSS)
110.
cyber-physical system
111.
Cyber-Physical System (CPS)
112.
cyber-physical system logistic robot
113.
cyber-physical systems
114.
Cyber-Physical Systems (CPS)
115.
cyber-risks
116.
cyber-space nexus
117.
cyber-vulnerabilities
118.
Defensive Cyber Operations
119.
EU cyber policy
120.
international cyber norms
121.
military cyber
122.
mobile cyber-physical system
123.
NATO cyber operations definitions
124.
NATO Cyber Range
125.
Offensive Cyber Operations
126.
perceived cyber risks and threats
127.
responsive cyber defence
128.
Socio-Cyber-Physical Systems
129.
space cyber range
130.
technical cyber exercise
131.
Visualising Cyber Planning
132.
ad-hoc sensor networks security
133.
Automatic Security Verification
134.
Blockchain security
135.
cache security
136.
cloud security
137.
communication system security
138.
comprehensive system of economic security
139.
computer security
140.
cooperative security dilemma
141.
data and information security
142.
data security
143.
development of security cameras
144.
digital security practices
145.
drinking water security
146.
economic security
147.
economic security of enterprise
148.
emotional security
149.
energy security
150.
energy security indicator
151.
Estonian information security standard
152.
graded security
153.
hardware security
154.
hardware security primitive
155.
high level of security
156.
Homeland security
157.
human security
158.
information security
159.
information security and privacy
160.
initial level of security
161.
internal security
162.
international security
163.
investment and innovation security
164.
IPv6 security
165.
IT security
166.
IT security management
167.
job security
168.
long-term security
169.
Maritime Security Operations Center (M-SOC)
170.
medium level of security
171.
metadata model for security measures
172.
Middle Eastern security
173.
Mobile security
174.
national security
175.
NATO. Science for Peace and Security Program
176.
network security
177.
network security monitoring
178.
OSCE (Organization for Security and Co-operation in Europe)
179.
passenger’s security
180.
policy-based routing security
181.
political and security cultures
182.
post-quantum security
183.
power system security
184.
quantitative security
185.
regional security
186.
RISC-V Security Verification
187.
Safety and Security in Sea Transportation
188.
safety and security testing
189.
security
190.
security adaptation
191.
security alert prioritization
192.
security analysis
193.
security and justice (AFSJ)
194.
Security and political science
195.
security and privacy
196.
security and privacy in smart grids
197.
Security Assertion
198.
Security Assertion Mining
199.
security closure
200.
Security Coverage
201.
security dataset
202.
security dilemma
203.
Security evaluation
204.
security evaluation instruments
205.
Security Level Evaluation
206.
Security limitations
207.
security log analysis
208.
security management
209.
security model
210.
security monitoring
211.
security notion
212.
security objectives
213.
security of data
214.
security of supply
215.
security operation center
216.
security operations center
217.
security patterns
218.
security policy
219.
security problem definition
220.
security proof
221.
security protocols
222.
security requirements
223.
security requirements engineering
224.
security research
225.
security risk assessment
226.
security risk management
227.
security risks
228.
security science and technology
229.
security strategies
230.
security systems for military objects
231.
security testing
232.
security training
233.
security verification
234.
security-by-design
235.
social security planning
236.
societal security
237.
software security
238.
software security level
239.
software security subcharacteristics
240.
sufficient level of security
241.
system of economic security
242.
system security
243.
terrorism security
244.
transmission System Security
245.
voting privacy and security
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT