Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
cyber security strategies (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/188)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
book article
Number of records 1, displaying
1 - 1
keyword
184
1.
cyber security strategies
2.
security strategies
3.
cyber security
4.
cyber security education
5.
cyber security exercises
6.
cyber-security
7.
national cyber security strategy
8.
airport strategies
9.
co-design strategies
10.
collaboration strategies
11.
coping strategies
12.
cultural adjustment strategies
13.
digital strategies
14.
Educational strategies
15.
e-Government policies and strategies
16.
energy management strategies (EMS)
17.
enterprise strategies
18.
EoL strategies
19.
EU policies and strategies
20.
graph and tree search strategies
21.
hybrid strategies
22.
innovation in processing strategies
23.
management strategies
24.
mitigation strategies
25.
mitigation strategies of UHI effect
26.
passive design strategies
27.
questioning strategies
28.
regional innovation strategies on smart specialization (RIS3)
29.
research strategies
30.
smart specialization strategies (S3)
31.
strategies
32.
strategies for human resource and local policies
33.
strategies of inquiry
34.
sub-optimal feedback strategies
35.
teaching strategies
36.
autonomous vehicle cyber range
37.
cloud-based cyber-physical systems (C2PS)
38.
cyber
39.
Cyber “Maastricht”
40.
cyber architecture
41.
cyber attacks
42.
cyber battle damage assessment
43.
Cyber Bio-analytical Physical Systems (CBPSs)
44.
cyber challenge
45.
cyber command
46.
cyber conflict
47.
cyber contingency
48.
cyber crime
49.
cyber crime pathways
50.
cyber crime scripting
51.
Cyber crisis management
52.
cyber defence
53.
cyber defence exercise
54.
cyber defence exercises
55.
cyber defense exercise
56.
cyber defense exercises
57.
cyber dependence
58.
cyber diplomacy
59.
cyber exercise
60.
cyber hygiene
61.
cyber impact assessment
62.
cyber incidents
63.
cyber insurance
64.
cyber kill chain
65.
cyber operation
66.
cyber operations
67.
cyber physical energy systems
68.
cyber physical power system (CPPS)
69.
Cyber Physical Production System
70.
cyber physical production systems (CPPS)
71.
cyber physical system
72.
cyber power Europe
73.
cyber ranges
74.
cyber red teaming
75.
cyber resilience
76.
cyber risk
77.
cyber situational awareness
78.
cyber stability
79.
cyber team communication
80.
cyber threat
81.
cyber threat communication
82.
cyber threats
83.
cyber war
84.
cyber warfare
85.
cyber warriors
86.
cyber weapons
87.
cyber-attack
88.
cyber-attack pathways
89.
cyber-insurance
90.
cyber-paternalism
91.
cyber-physical energy systems
92.
cyber-physical social system (CPSS)
93.
cyber-physical system
94.
Cyber-Physical System (CPS)
95.
cyber-physical system logistic robot
96.
cyber-physical systems
97.
Cyber-Physical Systems (CPS)
98.
cyber-vulnerabilities
99.
EU cyber policy
100.
international cyber norms
101.
military cyber
102.
mobile cyber-physical system
103.
NATO Cyber Range
104.
responsive cyber defence
105.
Socio-Cyber-Physical Systems
106.
technical cyber exercise
107.
ad-hoc sensor networks security
108.
Blockchain security
109.
cache security
110.
communication system security
111.
comprehensive system of economic security
112.
computer security
113.
cooperative security dilemma
114.
data security
115.
development of security cameras
116.
drinking water security
117.
economic security
118.
economic security of enterprise
119.
emotional security
120.
energy security
121.
energy security indicator
122.
graded security
123.
hardware security
124.
hardware security primitive
125.
human security
126.
information security
127.
internal security
128.
international security
129.
investment and innovation security
130.
IPv6 security
131.
IT security
132.
job security
133.
long-term security
134.
metadata model for security measures
135.
Middle Eastern security
136.
Mobile security
137.
national security
138.
NATO. Science for Peace and Security Program
139.
network security
140.
network security monitoring
141.
OSCE (Organization for Security and Co-operation in Europe)
142.
passenger’s security
143.
policy-based routing security
144.
political and security cultures
145.
post-quantum security
146.
power system security
147.
quantitative security
148.
regional security
149.
security
150.
security and privacy
151.
security and privacy in smart grids
152.
security closure
153.
Security Coverage
154.
security dataset
155.
security dilemma
156.
Security evaluation
157.
security log analysis
158.
security management
159.
security model
160.
security monitoring
161.
security notion
162.
security objectives
163.
security of data
164.
security of supply
165.
security operation center
166.
security patterns
167.
security problem definition
168.
security proof
169.
security protocols
170.
security requirements
171.
security requirements engineering
172.
security risk assessment
173.
security risk management
174.
security systems for military objects
175.
security testing
176.
security training
177.
security verification
178.
social security planning
179.
societal security
180.
system of economic security
181.
system security
182.
terrorism security
183.
transmission System Security
184.
voting privacy and security
subject term
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
National Computer Security Incident Response Teams (N-CSIRTs)
4.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT