Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
Cyber Threat Intelligence (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(3/159)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Integrating Cyber Threat Intelligence into Threat Modeling for Autonomous Ships Using PASTA and MISP
Erbas, Muhammed
;
Vanharanta, Jani
;
Paavola, Jarkko
;
Tsiopoulos, Leonidas
;
Vaarandi, Risto
2025 IEEE International Conference on Cyber Security and Resilience (CSR)
2025
/
p. 133-139
https://ieeexplore.ieee.org/document/11130108
https://doi.org/10.1109/CSR64739.2025.11130108
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
152
1.
Cyber Threat Intelligence
2.
cyber threat
3.
cyber threat communication
4.
asymmetric threat
5.
group threat theory
6.
hybrid threat
7.
military threat
8.
threat identification
9.
Threat modeling
10.
threat modeling (TM)
11.
threat modelling
12.
ambient intelligence
13.
architectural intelligence
14.
artificial intelligence
15.
artificial intelligence (AI)
16.
artificial intelligence in education
17.
Artificial intelligence in healthcare
18.
autonomous vehicle cyber range
19.
business intelligence
20.
business intelligence and analytics
21.
business intelligence management
22.
business-intelligence (BI)
23.
cloud-based cyber-physical systems (C2PS)
24.
cognitive cyber warfare
25.
collaborative intelligence
26.
collective intelligence
27.
Collective Intelligence (CI) platform
28.
Collective intelligence platforms
29.
competitive intelligence
30.
computational intelligence
31.
connected intelligence
32.
cyber
33.
Cyber “Maastricht”
34.
cyber architecture
35.
cyber attacks
36.
cyber battle damage assessment
37.
Cyber Bio-analytical Physical Systems (CBPSs)
38.
cyber challenge
39.
cyber command
40.
Cyber Command organisational structure
41.
cyber conflict
42.
cyber contingency
43.
cyber crime
44.
cyber crime pathways
45.
cyber crime scripting
46.
Cyber crisis management
47.
cyber defence
48.
cyber defence exercise
49.
cyber defence exercises
50.
cyber defense education
51.
cyber defense exercise
52.
cyber defense exercises
53.
cyber dependence
54.
cyber diplomacy
55.
cyber exercise
56.
cyber hygiene
57.
cyber impact assessment
58.
cyber incidents
59.
cyber insurance
60.
cyber intrusion detection
61.
cyber kill chain
62.
cyber operation
63.
cyber operation officer
64.
cyber operations
65.
cyber operations exercises
66.
cyber physical energy systems
67.
cyber physical power system (CPPS)
68.
Cyber Physical Production System
69.
cyber physical production systems (CPPS)
70.
cyber physical social system
71.
cyber physical social systems (cpss)
72.
cyber physical system
73.
Cyber Planning tool
74.
cyber power Europe
75.
cyber ranges
76.
cyber red teaming
77.
cyber resilience
78.
cyber resilience at sea
79.
cyber risk
80.
cyber risk management in shipping
81.
cyber security
82.
cyber security education
83.
cyber security exercises
84.
cyber security monitoring
85.
cyber security strategies
86.
cyber situational awareness
87.
cyber stability
88.
cyber team communication
89.
cyber threats
90.
cyber war
91.
cyber warfare
92.
cyber warriors
93.
cyber weapons
94.
cyber-attack
95.
cyber-attack pathways
96.
Cyber-attacks
97.
cyber-insurance
98.
cyber-paternalism
99.
cyber-physical energy systems
100.
cyber-physical social system (CPSS)
101.
cyber-physical system
102.
Cyber-Physical System (CPS)
103.
cyber-physical system logistic robot
104.
cyber-physical systems
105.
Cyber-Physical Systems (CPS)
106.
cyber-risks
107.
cyber-security
108.
cyber-space nexus
109.
cyber-vulnerabilities
110.
data-intelligence
111.
Defensive Cyber Operations
112.
Distributed artificial intelligence (DAI)
113.
Emotional Intelligence (EI)
114.
EU cyber policy
115.
explainable artificial intelligence
116.
Explainable Artificial Intelligence (XAI)
117.
generative artificial intelligence
118.
generative artificial intelligence (GAI)
119.
Geospatial Artificial Intelligence (GeoAI)
120.
hybrid intelligence
121.
intelligence
122.
intelligence augmentation
123.
intelligence infrastructure
124.
international cyber norms
125.
language intelligence
126.
learning (artificial intelligence)
127.
manufacturing intelligence
128.
maritime cyber security
129.
maritime cyber security operations centers
130.
market market intelligence
131.
military cyber
132.
mobile cyber-physical system
133.
national cyber security strategy
134.
NATO cyber operations definitions
135.
NATO Cyber Range
136.
Offensive Cyber Operations
137.
open source intelligence
138.
Open Source Intelligence (OSINT)
139.
open source intelligence tools
140.
perceived cyber risks and threats
141.
predictive artificial intelligence
142.
responsive cyber defence
143.
societal intelligence
144.
Socio-Cyber-Physical Systems
145.
space cyber range
146.
super-intelligence
147.
swarm intelligence
148.
swarm intelligence optimization
149.
technical cyber exercise
150.
technology intelligence
151.
trustworthy artificial intelligence
152.
Visualising Cyber Planning
subject term
6
1.
Artificial Intelligence Controller Interface (AICI)
2.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
3.
Cyber Battle
4.
Estonian Center for Safe and Trustworthy Artificial Intelligence (ECSTAI)
5.
Telia Cyber Battle of Estonia
6.
Telia Cyber Battle of Nordic-Baltics
TalTech subject term
1
1.
Goverment Technology and Artificial Intelligence Lab = GovAILab
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT