Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber warfare (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/89)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Application of journey mapping and crime scripting to the phenomenon of trolling
Sõmer, Tiia
;
Tiido, Anna
;
Sample, Char
;
Mitchener-Nissen, Timothy
Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018 : National Defence University, Washington DC, USA, 6-9 March 2018
2018
/
p. 465–473 : ill
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051737104&partnerID=40&md5=7bed8e3a8250f0083f8c7702e27c6839
book article
Seotud publikatsioonid
1
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
2
book article
Artificial intelligence within the military domain and cyber warfare
Hallaq, Bil
;
Sõmer, Tiia
;
Osula, Anna-Maria
;
Ngo, Kim
;
Mitchener-Nissen, Timothy
Proceedings of the 16th European Conference on Cyber Warfare and Security, ECCWS 2017 : hosted by University College Dublin, Ireland, 29-30 June 2017
2017
/
p. 153-156
https://www.scopus.com/record/display.uri?eid=2-s2.0-85028013021&origin=resultslist&zone=contextBox
book article
3
journal article
Utilising journey mapping and crime scripting to combat cybercrime and cyber warfare attacks
Sõmer, Tiia
;
Hallaq, Bil
;
Watson, Tim
Journal of information warfare
2016
/
p. 39-49
https://www.jinfowar.com/journal-issue/volume-15-issue-4
journal article
Seotud publikatsioonid
1
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
Number of records 3, displaying
1 - 3
keyword
87
1.
cyber warfare
2.
chemical warfare agent
3.
chemical warfare agent degradation products
4.
chemical warfare agents
5.
global knowledge warfare
6.
hybrid warfare
7.
ideological warfare
8.
information warfare
9.
knowledge warfare
10.
psychological warfare
11.
warfare
12.
autonomous vehicle cyber range
13.
cloud-based cyber-physical systems (C2PS)
14.
cyber
15.
Cyber “Maastricht”
16.
cyber architecture
17.
cyber attacks
18.
cyber battle damage assessment
19.
Cyber Bio-analytical Physical Systems (CBPSs)
20.
cyber challenge
21.
cyber command
22.
cyber conflict
23.
cyber contingency
24.
cyber crime
25.
cyber crime pathways
26.
cyber crime scripting
27.
Cyber crisis management
28.
cyber defence
29.
cyber defence exercise
30.
cyber defence exercises
31.
cyber defense exercise
32.
cyber defense exercises
33.
cyber dependence
34.
cyber diplomacy
35.
cyber exercise
36.
cyber hygiene
37.
cyber impact assessment
38.
cyber incidents
39.
cyber insurance
40.
cyber kill chain
41.
cyber operation
42.
cyber operations
43.
cyber physical energy systems
44.
cyber physical power system (CPPS)
45.
Cyber Physical Production System
46.
cyber physical production systems (CPPS)
47.
cyber physical system
48.
cyber power Europe
49.
cyber ranges
50.
cyber red teaming
51.
cyber resilience
52.
cyber risk
53.
cyber security
54.
cyber security education
55.
cyber security exercises
56.
cyber security strategies
57.
cyber situational awareness
58.
cyber stability
59.
cyber team communication
60.
cyber threat
61.
cyber threat communication
62.
cyber threats
63.
cyber war
64.
cyber warriors
65.
cyber weapons
66.
cyber-attack
67.
cyber-attack pathways
68.
cyber-insurance
69.
cyber-paternalism
70.
cyber-physical energy systems
71.
cyber-physical social system (CPSS)
72.
cyber-physical system
73.
Cyber-Physical System (CPS)
74.
cyber-physical system logistic robot
75.
cyber-physical systems
76.
Cyber-Physical Systems (CPS)
77.
cyber-security
78.
cyber-vulnerabilities
79.
EU cyber policy
80.
international cyber norms
81.
military cyber
82.
mobile cyber-physical system
83.
national cyber security strategy
84.
NATO Cyber Range
85.
responsive cyber defence
86.
Socio-Cyber-Physical Systems
87.
technical cyber exercise
subject term
2
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT