Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber-security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/160)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Governance of cyber-security in Internet-based elections [Online resource]
Krimmer, Robert Johannes
;
Rincon Mendez, Angelica Marina
;
Meyerhoff Nielsen, Morten
Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology
2015
/
p. 7-9
http://cybercentre.cs.ttu.ee/en/icr2015/
book article
Number of records 1, displaying
1 - 1
keyword
156
1.
cyber-security
2.
cyber security
3.
cyber security education
4.
cyber security exercises
5.
cyber security strategies
6.
national cyber security strategy
7.
autonomous vehicle cyber range
8.
cloud-based cyber-physical systems (C2PS)
9.
cyber
10.
Cyber “Maastricht”
11.
cyber architecture
12.
cyber attacks
13.
cyber battle damage assessment
14.
Cyber Bio-analytical Physical Systems (CBPSs)
15.
cyber challenge
16.
cyber command
17.
cyber conflict
18.
cyber contingency
19.
cyber crime
20.
cyber crime pathways
21.
cyber crime scripting
22.
Cyber crisis management
23.
cyber defence
24.
cyber defence exercise
25.
cyber defence exercises
26.
cyber defense exercise
27.
cyber defense exercises
28.
cyber dependence
29.
cyber diplomacy
30.
cyber exercise
31.
cyber hygiene
32.
cyber impact assessment
33.
cyber incidents
34.
cyber insurance
35.
cyber kill chain
36.
cyber operation
37.
cyber operations
38.
cyber physical energy systems
39.
cyber physical power system (CPPS)
40.
Cyber Physical Production System
41.
cyber physical production systems (CPPS)
42.
cyber physical system
43.
cyber power Europe
44.
cyber ranges
45.
cyber red teaming
46.
cyber resilience
47.
cyber risk
48.
cyber situational awareness
49.
cyber stability
50.
cyber team communication
51.
cyber threat
52.
cyber threat communication
53.
cyber threats
54.
cyber war
55.
cyber warfare
56.
cyber warriors
57.
cyber weapons
58.
cyber-attack
59.
cyber-attack pathways
60.
cyber-insurance
61.
cyber-paternalism
62.
cyber-physical energy systems
63.
cyber-physical social system (CPSS)
64.
cyber-physical system
65.
Cyber-Physical System (CPS)
66.
cyber-physical system logistic robot
67.
cyber-physical systems
68.
Cyber-Physical Systems (CPS)
69.
cyber-vulnerabilities
70.
EU cyber policy
71.
international cyber norms
72.
military cyber
73.
mobile cyber-physical system
74.
NATO Cyber Range
75.
responsive cyber defence
76.
Socio-Cyber-Physical Systems
77.
technical cyber exercise
78.
ad-hoc sensor networks security
79.
Blockchain security
80.
cache security
81.
communication system security
82.
comprehensive system of economic security
83.
computer security
84.
cooperative security dilemma
85.
data security
86.
development of security cameras
87.
drinking water security
88.
economic security
89.
economic security of enterprise
90.
emotional security
91.
energy security
92.
energy security indicator
93.
graded security
94.
hardware security
95.
hardware security primitive
96.
human security
97.
information security
98.
internal security
99.
international security
100.
investment and innovation security
101.
IPv6 security
102.
IT security
103.
job security
104.
long-term security
105.
metadata model for security measures
106.
Middle Eastern security
107.
Mobile security
108.
national security
109.
NATO. Science for Peace and Security Program
110.
network security
111.
network security monitoring
112.
OSCE (Organization for Security and Co-operation in Europe)
113.
passenger’s security
114.
policy-based routing security
115.
political and security cultures
116.
post-quantum security
117.
power system security
118.
quantitative security
119.
regional security
120.
security
121.
security and privacy
122.
security and privacy in smart grids
123.
security closure
124.
Security Coverage
125.
security dataset
126.
security dilemma
127.
Security evaluation
128.
security log analysis
129.
security management
130.
security model
131.
security monitoring
132.
security notion
133.
security objectives
134.
security of data
135.
security of supply
136.
security operation center
137.
security patterns
138.
security problem definition
139.
security proof
140.
security protocols
141.
security requirements
142.
security requirements engineering
143.
security risk assessment
144.
security risk management
145.
security strategies
146.
security systems for military objects
147.
security testing
148.
security training
149.
security verification
150.
social security planning
151.
societal security
152.
system of economic security
153.
system security
154.
terrorism security
155.
transmission System Security
156.
voting privacy and security
subject term
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
National Computer Security Incident Response Teams (N-CSIRTs)
4.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT