Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber-security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/223)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Governance of cyber-security in Internet-based elections [Online resource]
Krimmer, Robert Johannes
;
Rincon Mendez, Angelica Marina
;
Meyerhoff Nielsen, Morten
Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology
2015
/
p. 7-9
http://cybercentre.cs.ttu.ee/en/icr2015/
book article
2
book article
Model-enhanced control for cyber-physical security: simulation of model-based navigation of an environment-coupled watercraft under disrupted global positioning conditions
Udal, Andres
;
Kaugerand, Jaanus
;
Astrov, Igor
;
Mõlder, Heigo
;
Koit, Katre
2025 MIPRO 48th ICT and Electronics Convention
2025
/
p. 794-799 : ill
https://doi.org/10.1109/MIPRO65660.2025.11131811
Article at Scopus
book article
Number of records 2, displaying
1 - 2
keyword
217
1.
cyber-security
2.
cyber security
3.
cyber security education
4.
cyber security exercises
5.
cyber security monitoring
6.
cyber security monitoring in maritime
7.
cyber security strategies
8.
maritime cyber security
9.
maritime cyber security operations centers
10.
national cyber security strategy
11.
cyber-physical system security
12.
autonomous vehicle cyber range
13.
cloud-based cyber-physical systems (C2PS)
14.
cognitive cyber warfare
15.
cyber
16.
Cyber “Maastricht”
17.
cyber architecture
18.
cyber attacks
19.
cyber battle damage assessment
20.
Cyber Bio-analytical Physical Systems (CBPSs)
21.
cyber challenge
22.
cyber command
23.
Cyber Command organisational structure
24.
cyber conflict
25.
cyber contingency
26.
cyber crime
27.
cyber crime pathways
28.
cyber crime scripting
29.
Cyber crisis management
30.
cyber defence
31.
cyber defence exercise
32.
cyber defence exercises
33.
cyber defense education
34.
cyber defense exercise
35.
cyber defense exercises
36.
cyber dependence
37.
cyber diplomacy
38.
cyber exercise
39.
cyber hygiene
40.
cyber impact assessment
41.
cyber incidents
42.
cyber insurance
43.
cyber intrusion detection
44.
cyber kill chain
45.
cyber operation
46.
cyber operation officer
47.
cyber operations
48.
cyber operations exercises
49.
cyber physical energy systems
50.
cyber physical power system (CPPS)
51.
Cyber Physical Production System
52.
cyber physical production systems (CPPS)
53.
cyber physical social system
54.
cyber physical social systems (cpss)
55.
cyber physical system
56.
Cyber Planning tool
57.
cyber power Europe
58.
cyber ranges
59.
cyber red teaming
60.
cyber resilience
61.
cyber resilience at sea
62.
cyber risk
63.
cyber risk management in shipping
64.
cyber situational awareness
65.
cyber stability
66.
cyber team communication
67.
cyber threat
68.
cyber threat communication
69.
Cyber Threat Intelligence
70.
cyber threats
71.
cyber war
72.
cyber warfare
73.
cyber warriors
74.
cyber weapons
75.
cyber-attack
76.
cyber-attack pathways
77.
Cyber-attacks
78.
cyber-insurance
79.
cyber-paternalism
80.
cyber-physical energy systems
81.
cyber-physical social system (CPSS)
82.
cyber-physical system
83.
Cyber-Physical System (CPS)
84.
cyber-physical system logistic robot
85.
cyber-physical systems
86.
Cyber-Physical Systems (CPS)
87.
cyber-risks
88.
cyber-space nexus
89.
cyber-vulnerabilities
90.
Defensive Cyber Operations
91.
EU cyber policy
92.
international cyber norms
93.
military cyber
94.
mobile cyber-physical system
95.
NATO cyber operations definitions
96.
NATO Cyber Range
97.
Offensive Cyber Operations
98.
perceived cyber risks and threats
99.
responsive cyber defence
100.
Socio-Cyber-Physical Systems
101.
space cyber range
102.
technical cyber exercise
103.
Visualising Cyber Planning
104.
ad-hoc sensor networks security
105.
Automatic Security Verification
106.
Blockchain security
107.
cache security
108.
cloud security
109.
communication system security
110.
comprehensive system of economic security
111.
computer security
112.
cooperative security dilemma
113.
data and information security
114.
data security
115.
development of security cameras
116.
digital security practices
117.
drinking water security
118.
economic security
119.
economic security of enterprise
120.
emotional security
121.
energy security
122.
energy security indicator
123.
Estonian information security standard
124.
graded security
125.
hardware security
126.
hardware security primitive
127.
high level of security
128.
Homeland security
129.
human security
130.
information security
131.
information security and privacy
132.
initial level of security
133.
internal security
134.
international security
135.
investment and innovation security
136.
IPv6 security
137.
IT security
138.
IT security management
139.
job security
140.
long-term security
141.
Maritime Security Operations Center (M-SOC)
142.
medium level of security
143.
metadata model for security measures
144.
Middle Eastern security
145.
Mobile security
146.
national security
147.
NATO. Science for Peace and Security Program
148.
network security
149.
network security monitoring
150.
OSCE (Organization for Security and Co-operation in Europe)
151.
passenger’s security
152.
policy-based routing security
153.
political and security cultures
154.
post-quantum security
155.
power system security
156.
quantitative security
157.
regional security
158.
RISC-V Security Verification
159.
Safety and Security in Sea Transportation
160.
safety and security testing
161.
security
162.
security adaptation
163.
security alert prioritization
164.
security analysis
165.
security and justice (AFSJ)
166.
Security and political science
167.
security and privacy
168.
security and privacy in smart grids
169.
Security Assertion
170.
Security Assertion Mining
171.
security closure
172.
Security Coverage
173.
security dataset
174.
security dilemma
175.
Security evaluation
176.
security evaluation instruments
177.
Security Level Evaluation
178.
Security limitations
179.
security log analysis
180.
security management
181.
security model
182.
security monitoring
183.
security notion
184.
security objectives
185.
security of data
186.
security of supply
187.
security operation center
188.
security operations center
189.
security patterns
190.
security policy
191.
security problem definition
192.
security proof
193.
security protocols
194.
security requirements
195.
security requirements engineering
196.
security research
197.
security risk assessment
198.
security risk management
199.
security risks
200.
security science and technology
201.
security strategies
202.
security systems for military objects
203.
security testing
204.
security training
205.
security verification
206.
security-by-design
207.
social security planning
208.
societal security
209.
software security
210.
software security level
211.
software security subcharacteristics
212.
sufficient level of security
213.
system of economic security
214.
system security
215.
terrorism security
216.
transmission System Security
217.
voting privacy and security
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT