Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
Cyber-attacks (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/130)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Challenges to Homeland Security in Countering Latent Hybrid Threats During the War in Ukraine : The Case of Estonia
Mölder, Holger
;
Sazonov, Vladimir
;
Loik, Ramon
Russian Influence Operations and the War in Ukraine: Hybrid Warfare and Disinformation Campaigns
2025
/
p. 235-260
https://link.springer.com/book/10.1007/978-3-032-01461-0
https://doi.org/10.1007/978-3-032-01461-0_10
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
126
1.
Cyber-attacks
2.
cyber attacks
3.
AI-generated attacks
4.
amplification attacks
5.
architectural attacks
6.
attacks
7.
cache attacks
8.
Cache Side-Channel Attacks
9.
data attacks
10.
DDoS attacks
11.
denial of service attacks
12.
functionality attacks
13.
IP attacks
14.
jamming attacks
15.
load altering attacks
16.
offline guessing attacks
17.
oracle-guided (OG) attacks
18.
oracle-guided attacks
19.
oracle-less (OL) and oracle-guided (OG) attacks
20.
oracle-less (OL) attacks
21.
oracle-less attacks
22.
process-aware attacks
23.
side-channel attacks
24.
targeted attacks
25.
automated cyber defense
26.
autonomous vehicle cyber range
27.
cloud-based cyber-physical systems (C2PS)
28.
cognitive cyber warfare
29.
cyber
30.
Cyber “Maastricht”
31.
cyber architecture
32.
cyber battle damage assessment
33.
Cyber Bio-analytical Physical Systems (CBPSs)
34.
cyber challenge
35.
cyber command
36.
Cyber Command organisational structure
37.
cyber conflict
38.
cyber contingency
39.
cyber crime
40.
cyber crime pathways
41.
cyber crime scripting
42.
Cyber crisis management
43.
cyber defence
44.
cyber defence exercise
45.
cyber defence exercises
46.
cyber defense education
47.
cyber defense exercise
48.
cyber defense exercises
49.
cyber dependence
50.
cyber diplomacy
51.
cyber exercise
52.
cyber hygiene
53.
cyber impact assessment
54.
cyber incidents
55.
cyber insurance
56.
cyber intrusion detection
57.
cyber kill chain
58.
cyber operation
59.
cyber operation officer
60.
cyber operations
61.
cyber operations exercises
62.
cyber physical energy systems
63.
cyber physical power system (CPPS)
64.
Cyber Physical Production System
65.
cyber physical production systems (CPPS)
66.
cyber physical social system
67.
cyber physical social systems (cpss)
68.
cyber physical system
69.
Cyber Planning tool
70.
cyber power Europe
71.
cyber ranges
72.
cyber red teaming
73.
cyber resilience
74.
cyber resilience at sea
75.
cyber risk
76.
cyber risk management in shipping
77.
cyber security
78.
cyber security education
79.
cyber security exercises
80.
cyber security monitoring
81.
cyber security monitoring in maritime
82.
cyber security strategies
83.
cyber situational awareness
84.
cyber stability
85.
cyber team communication
86.
cyber threat
87.
cyber threat communication
88.
Cyber Threat Intelligence
89.
cyber threats
90.
cyber war
91.
cyber warfare
92.
cyber warriors
93.
cyber weapons
94.
cyber-attack
95.
cyber-attack pathways
96.
cyber-insurance
97.
cyber-paternalism
98.
cyber-physical energy systems
99.
cyber-physical social system (CPSS)
100.
cyber-physical system
101.
Cyber-Physical System (CPS)
102.
cyber-physical system logistic robot
103.
cyber-physical system security
104.
cyber-physical systems
105.
Cyber-Physical Systems (CPS)
106.
cyber-risks
107.
cyber-security
108.
cyber-space nexus
109.
cyber-vulnerabilities
110.
Defensive Cyber Operations
111.
EU cyber policy
112.
international cyber norms
113.
maritime cyber security
114.
maritime cyber security operations centers
115.
military cyber
116.
mobile cyber-physical system
117.
national cyber security strategy
118.
NATO cyber operations definitions
119.
NATO Cyber Range
120.
Offensive Cyber Operations
121.
perceived cyber risks and threats
122.
responsive cyber defence
123.
Socio-Cyber-Physical Systems
124.
space cyber range
125.
technical cyber exercise
126.
Visualising Cyber Planning
subject term
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT