Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber warfare (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/94)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Application of journey mapping and crime scripting to the phenomenon of trolling
Sõmer, Tiia
;
Tiido, Anna
;
Sample, Char
;
Mitchener-Nissen, Timothy
Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018 : National Defence University, Washington DC, USA, 6-9 March 2018
2018
/
p. 465–473 : ill
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051737104&partnerID=40&md5=7bed8e3a8250f0083f8c7702e27c6839
book article
Seotud publikatsioonid
1
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
2
book article
Artificial intelligence within the military domain and cyber warfare
Hallaq, Bil
;
Sõmer, Tiia
;
Osula, Anna-Maria
;
Ngo, Kim
;
Mitchener-Nissen, Timothy
Proceedings of the 16th European Conference on Cyber Warfare and Security, ECCWS 2017 : hosted by University College Dublin, Ireland, 29-30 June 2017
2017
/
p. 153-156
https://www.scopus.com/record/display.uri?eid=2-s2.0-85028013021&origin=resultslist&zone=contextBox
book article
3
journal article
Utilising journey mapping and crime scripting to combat cybercrime and cyber warfare attacks
Sõmer, Tiia
;
Hallaq, Bil
;
Watson, Tim
Journal of information warfare
2016
/
p. 39-49
https://www.jinfowar.com/journal-issue/volume-15-issue-4
journal article
Seotud publikatsioonid
1
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
Number of records 3, displaying
1 - 3
keyword
91
1.
cognitive cyber warfare
2.
cyber warfare
3.
chemical warfare agent
4.
chemical warfare agent degradation products
5.
chemical warfare agents
6.
global knowledge warfare
7.
hybrid warfare
8.
ideological warfare
9.
information warfare
10.
knowledge warfare
11.
psychological warfare
12.
warfare
13.
autonomous vehicle cyber range
14.
cloud-based cyber-physical systems (C2PS)
15.
cyber
16.
Cyber “Maastricht”
17.
cyber architecture
18.
cyber attacks
19.
cyber battle damage assessment
20.
Cyber Bio-analytical Physical Systems (CBPSs)
21.
cyber challenge
22.
cyber command
23.
cyber conflict
24.
cyber contingency
25.
cyber crime
26.
cyber crime pathways
27.
cyber crime scripting
28.
Cyber crisis management
29.
cyber defence
30.
cyber defence exercise
31.
cyber defence exercises
32.
cyber defense education
33.
cyber defense exercise
34.
cyber defense exercises
35.
cyber dependence
36.
cyber diplomacy
37.
cyber exercise
38.
cyber hygiene
39.
cyber impact assessment
40.
cyber incidents
41.
cyber insurance
42.
cyber intrusion detection
43.
cyber kill chain
44.
cyber operation
45.
cyber operations
46.
cyber physical energy systems
47.
cyber physical power system (CPPS)
48.
Cyber Physical Production System
49.
cyber physical production systems (CPPS)
50.
cyber physical system
51.
cyber power Europe
52.
cyber ranges
53.
cyber red teaming
54.
cyber resilience
55.
cyber risk
56.
cyber security
57.
cyber security education
58.
cyber security exercises
59.
cyber security strategies
60.
cyber situational awareness
61.
cyber stability
62.
cyber team communication
63.
cyber threat
64.
cyber threat communication
65.
cyber threats
66.
cyber war
67.
cyber warriors
68.
cyber weapons
69.
cyber-attack
70.
cyber-attack pathways
71.
cyber-insurance
72.
cyber-paternalism
73.
cyber-physical energy systems
74.
cyber-physical social system (CPSS)
75.
cyber-physical system
76.
Cyber-Physical System (CPS)
77.
cyber-physical system logistic robot
78.
cyber-physical systems
79.
Cyber-Physical Systems (CPS)
80.
cyber-security
81.
cyber-vulnerabilities
82.
EU cyber policy
83.
international cyber norms
84.
military cyber
85.
mobile cyber-physical system
86.
national cyber security strategy
87.
NATO Cyber Range
88.
perceived cyber risks and threats
89.
responsive cyber defence
90.
Socio-Cyber-Physical Systems
91.
technical cyber exercise
subject term
3
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT