Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber kill chain (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/169)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
A case study about the use and evaluation of cyber deceptive methods against highly targeted attacks
Farar, Alexandria Elaine
;
Bahsi, Hayretdin
;
Blumbergs, Bernhards
2017 International Conference On Cyber Incident Response, Coordination, Containment and Control, Cyber Incident 2017 : London, United Kingdom, 19 June 2017 through 20 June 2017
2017
/
[7] p. : ill
https://doi.org/10.1109/CYBERINCIDENT.2017.8054640
book article
Number of records 1, displaying
1 - 1
keyword
165
1.
cyber kill chain
2.
alkyl chain-length
3.
alkyl ester chain length
4.
ascending chain condition
5.
block chain
6.
block-chain
7.
chain model
8.
chain of check points
9.
chain of key factors (KFs)
10.
Chain restaurants
11.
concept chain
12.
Continuous Time Markov Chain
13.
demand & supply chain management
14.
digital supply chain
15.
global value chain
16.
green supply chain management
17.
legume supply chain
18.
Logistics and supply chain management
19.
long chain fatty acid (LCFA) inhibition
20.
Markov chain
21.
Markov chain process
22.
multi-chain blockchains
23.
oil shale value chain
24.
on/off-chain data storages
25.
receiver chain
26.
reconfigurable scan-chain
27.
respiratory chain
28.
reverse transcription polymerase chain reaction
29.
risk event chain analyses
30.
road construction supply chain
31.
service supply chain
32.
services value chain collaboration
33.
short chain branching (SCB)
34.
short chain fatty acids
35.
short chain fatty acids (SCFA)
36.
short-chain fatty acids
37.
supplay chain
38.
supply chain
39.
supply chain (SC)
40.
Supply chain adaptability
41.
supply chain competences
42.
supply chain curricula
43.
supply chain engineering
44.
supply chain integration
45.
supply chain management
46.
supply chain model framework
47.
supply chain operations reference (SCOR)
48.
supply chain operations reference (SCOR) model
49.
supply chain planning
50.
supply chain risk
51.
supply chain risk management
52.
supply chain simulation
53.
supply chain skills
54.
supply chain traceability
55.
sustainable supply chain management
56.
sustainalble supply chain management
57.
teaching supply chain management
58.
transmit chain
59.
transparent supply chain
60.
trophic chain
61.
value adding REE chain
62.
value chain
63.
automated cyber defense
64.
autonomous vehicle cyber range
65.
cloud-based cyber-physical systems (C2PS)
66.
cognitive cyber warfare
67.
cyber
68.
Cyber “Maastricht”
69.
cyber architecture
70.
cyber attacks
71.
cyber battle damage assessment
72.
Cyber Bio-analytical Physical Systems (CBPSs)
73.
cyber challenge
74.
cyber command
75.
Cyber Command organisational structure
76.
cyber conflict
77.
cyber contingency
78.
cyber crime
79.
cyber crime pathways
80.
cyber crime scripting
81.
Cyber crisis management
82.
cyber defence
83.
cyber defence exercise
84.
cyber defence exercises
85.
cyber defense education
86.
cyber defense exercise
87.
cyber defense exercises
88.
cyber dependence
89.
cyber diplomacy
90.
cyber exercise
91.
cyber hygiene
92.
cyber impact assessment
93.
cyber incidents
94.
cyber insurance
95.
cyber intrusion detection
96.
cyber operation
97.
cyber operation officer
98.
cyber operations
99.
cyber operations exercises
100.
cyber physical energy systems
101.
cyber physical power system (CPPS)
102.
Cyber Physical Production System
103.
cyber physical production systems (CPPS)
104.
cyber physical social system
105.
cyber physical social systems (cpss)
106.
cyber physical system
107.
Cyber Planning tool
108.
cyber power Europe
109.
cyber ranges
110.
cyber red teaming
111.
cyber resilience
112.
cyber resilience at sea
113.
cyber risk
114.
cyber risk management in shipping
115.
cyber security
116.
cyber security education
117.
cyber security exercises
118.
cyber security monitoring
119.
cyber security monitoring in maritime
120.
cyber security strategies
121.
cyber situational awareness
122.
cyber stability
123.
cyber team communication
124.
cyber threat
125.
cyber threat communication
126.
Cyber Threat Intelligence
127.
cyber threats
128.
cyber war
129.
cyber warfare
130.
cyber warriors
131.
cyber weapons
132.
cyber-attack
133.
cyber-attack pathways
134.
Cyber-attacks
135.
cyber-insurance
136.
cyber-paternalism
137.
cyber-physical energy systems
138.
cyber-physical social system (CPSS)
139.
cyber-physical system
140.
Cyber-Physical System (CPS)
141.
cyber-physical system logistic robot
142.
cyber-physical system security
143.
cyber-physical systems
144.
Cyber-Physical Systems (CPS)
145.
cyber-risks
146.
cyber-security
147.
cyber-space nexus
148.
cyber-vulnerabilities
149.
Defensive Cyber Operations
150.
EU cyber policy
151.
international cyber norms
152.
maritime cyber security
153.
maritime cyber security operations centers
154.
military cyber
155.
mobile cyber-physical system
156.
national cyber security strategy
157.
NATO cyber operations definitions
158.
NATO Cyber Range
159.
Offensive Cyber Operations
160.
perceived cyber risks and threats
161.
responsive cyber defence
162.
Socio-Cyber-Physical Systems
163.
space cyber range
164.
technical cyber exercise
165.
Visualising Cyber Planning
subject term
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT