Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
national cyber security strategy (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/211)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
NCSS: A global census of national positions on conflict, neutrality and cooperation
Serrano Iova
;
Serrano-Iova, Radu-Antonio
;
Watashiba, Tomoe
Proceedings of the 22nd European Conference on Cyber Warfare and Security
2023
/
p. 420-428
https://papers.academic-conferences.org/index.php/eccws/issue/view/20/23
book article
Number of records 1, displaying
1 - 1
keyword
207
1.
national cyber security strategy
2.
cyber security
3.
cyber security education
4.
cyber security exercises
5.
cyber security strategies
6.
cyber-security
7.
national security
8.
adaptive test strategy generation
9.
AI strategy
10.
behavioural strategy
11.
BESS Control Strategy
12.
branding strategy
13.
business strategy
14.
control strategy
15.
diffusion strategy
16.
education strategy
17.
educational strategy
18.
efficient control strategy
19.
electrode placement strategy
20.
end-of-life (EOL) strategy
21.
enterprise strategy
22.
EU heating and cooling strategy
23.
EU post-2020 biodiversity strategy
24.
EU regulatory strategy
25.
European institutions digital strategy
26.
fault handling strategy
27.
human resource and Strategy Europe 2020
28.
long term renovation strategy
29.
management strategy
30.
manufacturing strategy
31.
marine strategy framework directive
32.
Marine Strategy Framework Directive (MSFD)
33.
market strategy
34.
marketing strategy
35.
modulation strategy
36.
nonlinear control strategy
37.
optimal operation strategy
38.
outsourcing strategy
39.
ownership strategy
40.
passive design strategy
41.
PLM implementation strategy
42.
PLM strategy
43.
Power leveling strategy
44.
proactive strategy
45.
Renovation strategy
46.
scan strategy
47.
scanning strategy
48.
Smart Specialization Strategy
49.
strategy
50.
strategy building
51.
strategy definition
52.
strategy Europe 2020
53.
strategy focus
54.
strategy formation
55.
strategy map
56.
sustainable strategy
57.
teaching strategy
58.
waste management strategy
59.
autonomous vehicle cyber range
60.
cloud-based cyber-physical systems (C2PS)
61.
cyber
62.
Cyber “Maastricht”
63.
cyber architecture
64.
cyber attacks
65.
cyber battle damage assessment
66.
Cyber Bio-analytical Physical Systems (CBPSs)
67.
cyber challenge
68.
cyber command
69.
cyber conflict
70.
cyber contingency
71.
cyber crime
72.
cyber crime pathways
73.
cyber crime scripting
74.
Cyber crisis management
75.
cyber defence
76.
cyber defence exercise
77.
cyber defence exercises
78.
cyber defense exercise
79.
cyber defense exercises
80.
cyber dependence
81.
cyber diplomacy
82.
cyber exercise
83.
cyber hygiene
84.
cyber impact assessment
85.
cyber incidents
86.
cyber insurance
87.
cyber kill chain
88.
cyber operation
89.
cyber operations
90.
cyber physical energy systems
91.
cyber physical power system (CPPS)
92.
Cyber Physical Production System
93.
cyber physical production systems (CPPS)
94.
cyber physical system
95.
cyber power Europe
96.
cyber ranges
97.
cyber red teaming
98.
cyber resilience
99.
cyber risk
100.
cyber situational awareness
101.
cyber stability
102.
cyber team communication
103.
cyber threat
104.
cyber threat communication
105.
cyber threats
106.
cyber war
107.
cyber warfare
108.
cyber warriors
109.
cyber weapons
110.
cyber-attack
111.
cyber-attack pathways
112.
cyber-insurance
113.
cyber-paternalism
114.
cyber-physical energy systems
115.
cyber-physical social system (CPSS)
116.
cyber-physical system
117.
Cyber-Physical System (CPS)
118.
cyber-physical system logistic robot
119.
cyber-physical systems
120.
Cyber-Physical Systems (CPS)
121.
cyber-vulnerabilities
122.
EU cyber policy
123.
international cyber norms
124.
military cyber
125.
mobile cyber-physical system
126.
NATO Cyber Range
127.
responsive cyber defence
128.
Socio-Cyber-Physical Systems
129.
technical cyber exercise
130.
ad-hoc sensor networks security
131.
Blockchain security
132.
cache security
133.
communication system security
134.
comprehensive system of economic security
135.
computer security
136.
cooperative security dilemma
137.
data security
138.
development of security cameras
139.
drinking water security
140.
economic security
141.
economic security of enterprise
142.
emotional security
143.
energy security
144.
energy security indicator
145.
graded security
146.
hardware security
147.
hardware security primitive
148.
human security
149.
information security
150.
internal security
151.
international security
152.
investment and innovation security
153.
IPv6 security
154.
IT security
155.
job security
156.
long-term security
157.
metadata model for security measures
158.
Middle Eastern security
159.
Mobile security
160.
NATO. Science for Peace and Security Program
161.
network security
162.
network security monitoring
163.
OSCE (Organization for Security and Co-operation in Europe)
164.
passenger’s security
165.
policy-based routing security
166.
political and security cultures
167.
post-quantum security
168.
power system security
169.
quantitative security
170.
regional security
171.
security
172.
security and privacy
173.
security and privacy in smart grids
174.
security closure
175.
Security Coverage
176.
security dataset
177.
security dilemma
178.
Security evaluation
179.
security log analysis
180.
security management
181.
security model
182.
security monitoring
183.
security notion
184.
security objectives
185.
security of data
186.
security of supply
187.
security operation center
188.
security patterns
189.
security problem definition
190.
security proof
191.
security protocols
192.
security requirements
193.
security requirements engineering
194.
security risk assessment
195.
security risk management
196.
security strategies
197.
security systems for military objects
198.
security testing
199.
security training
200.
security verification
201.
social security planning
202.
societal security
203.
system of economic security
204.
system security
205.
terrorism security
206.
transmission System Security
207.
voting privacy and security
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
3.
Cyber Battle
4.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT