Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) (source)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/227)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Expert knowledge elicitation for skill level categorization of attack paths
Mezešova, Terezia
;
Bahsi, Hayretdin
2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
2019
/
8 p. : tab
https://doi.org/10.1109/CyberSecPODS.2019.8885192
book article
Number of records 1, displaying
1 - 1
keyword
221
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security strategies
6.
cyber-physical system security
7.
cyber-security
8.
maritime cyber security
9.
maritime cyber security operations centers
10.
national cyber security strategy
11.
digital security practices
12.
international cyber norms
13.
international security
14.
autonomous vehicle cyber range
15.
cloud-based cyber-physical systems (C2PS)
16.
cognitive cyber warfare
17.
cyber
18.
Cyber “Maastricht”
19.
cyber architecture
20.
cyber attacks
21.
cyber battle damage assessment
22.
Cyber Bio-analytical Physical Systems (CBPSs)
23.
cyber challenge
24.
cyber command
25.
Cyber Command organisational structure
26.
cyber conflict
27.
cyber contingency
28.
cyber crime
29.
cyber crime pathways
30.
cyber crime scripting
31.
Cyber crisis management
32.
cyber defence
33.
cyber defence exercise
34.
cyber defence exercises
35.
cyber defense education
36.
cyber defense exercise
37.
cyber defense exercises
38.
cyber dependence
39.
cyber diplomacy
40.
cyber exercise
41.
cyber hygiene
42.
cyber impact assessment
43.
cyber incidents
44.
cyber insurance
45.
cyber intrusion detection
46.
cyber kill chain
47.
cyber operation
48.
cyber operation officer
49.
cyber operations
50.
cyber operations exercises
51.
cyber physical energy systems
52.
cyber physical power system (CPPS)
53.
Cyber Physical Production System
54.
cyber physical production systems (CPPS)
55.
cyber physical social system
56.
cyber physical social systems (cpss)
57.
cyber physical system
58.
Cyber Planning tool
59.
cyber power Europe
60.
cyber ranges
61.
cyber red teaming
62.
cyber resilience
63.
cyber resilience at sea
64.
cyber risk
65.
cyber risk management in shipping
66.
cyber situational awareness
67.
cyber stability
68.
cyber team communication
69.
cyber threat
70.
cyber threat communication
71.
Cyber Threat Intelligence
72.
cyber threats
73.
cyber war
74.
cyber warfare
75.
cyber warriors
76.
cyber weapons
77.
cyber-attack
78.
cyber-attack pathways
79.
Cyber-attacks
80.
cyber-insurance
81.
cyber-paternalism
82.
cyber-physical energy systems
83.
cyber-physical social system (CPSS)
84.
cyber-physical system
85.
Cyber-Physical System (CPS)
86.
cyber-physical system logistic robot
87.
cyber-physical systems
88.
Cyber-Physical Systems (CPS)
89.
cyber-risks
90.
cyber-space nexus
91.
cyber-vulnerabilities
92.
Defensive Cyber Operations
93.
EU cyber policy
94.
military cyber
95.
mobile cyber-physical system
96.
NATO cyber operations definitions
97.
NATO Cyber Range
98.
Offensive Cyber Operations
99.
perceived cyber risks and threats
100.
responsive cyber defence
101.
Socio-Cyber-Physical Systems
102.
space cyber range
103.
technical cyber exercise
104.
Visualising Cyber Planning
105.
ad-hoc sensor networks security
106.
Automatic Security Verification
107.
Blockchain security
108.
cache security
109.
cloud security
110.
communication system security
111.
comprehensive system of economic security
112.
computer security
113.
cooperative security dilemma
114.
data and information security
115.
data security
116.
development of security cameras
117.
drinking water security
118.
economic security
119.
economic security of enterprise
120.
emotional security
121.
energy security
122.
energy security indicator
123.
Estonian information security standard
124.
graded security
125.
hardware security
126.
hardware security primitive
127.
high level of security
128.
Homeland security
129.
human security
130.
information security
131.
information security and privacy
132.
initial level of security
133.
internal security
134.
investment and innovation security
135.
IPv6 security
136.
IT security
137.
IT security management
138.
job security
139.
long-term security
140.
Maritime Security Operations Center (M-SOC)
141.
medium level of security
142.
metadata model for security measures
143.
Middle Eastern security
144.
Mobile security
145.
national security
146.
NATO. Science for Peace and Security Program
147.
network security
148.
network security monitoring
149.
OSCE (Organization for Security and Co-operation in Europe)
150.
passenger’s security
151.
policy-based routing security
152.
political and security cultures
153.
post-quantum security
154.
power system security
155.
quantitative security
156.
regional security
157.
RISC-V Security Verification
158.
Safety and Security in Sea Transportation
159.
safety and security testing
160.
security
161.
security adaptation
162.
security alert prioritization
163.
security analysis
164.
security and justice (AFSJ)
165.
Security and political science
166.
security and privacy
167.
security and privacy in smart grids
168.
Security Assertion
169.
Security Assertion Mining
170.
security closure
171.
Security Coverage
172.
security dataset
173.
security dilemma
174.
Security evaluation
175.
security evaluation instruments
176.
Security Level Evaluation
177.
Security limitations
178.
security log analysis
179.
security management
180.
security model
181.
security monitoring
182.
security notion
183.
security objectives
184.
security of data
185.
security of supply
186.
security operation center
187.
security operations center
188.
security patterns
189.
security policy
190.
security problem definition
191.
security proof
192.
security protocols
193.
security requirements
194.
security requirements engineering
195.
security research
196.
security risk assessment
197.
security risk management
198.
security risks
199.
security science and technology
200.
security strategies
201.
security systems for military objects
202.
security testing
203.
security training
204.
security verification
205.
security-by-design
206.
social security planning
207.
societal security
208.
software security
209.
software security level
210.
software security subcharacteristics
211.
sufficient level of security
212.
system of economic security
213.
system security
214.
terrorism security
215.
transmission System Security
216.
voting privacy and security
217.
cross-border digital public services
218.
digital services
219.
Digital Services Act
220.
digital signature services
221.
E-commerce directive, digital services act
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT