Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber threat (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/97)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Aligning Estonian and Japanese efforts in building norms in cyberspace
Osula, Anna-Maria
So Far, Yet So Close : Japanese and Estonian cybersecurity : policy perspectives and cooperations : report
2021
/
p. 22-29
https://icds.ee/wp-content/uploads/2021/05/ICDS_Report_So_Far_Yet_So_Close_Roigas_Jermalavicius_May_2021.pdf
book article
2
book article
Expert knowledge elicitation for skill level categorization of attack paths
Mezešova, Terezia
;
Bahsi, Hayretdin
2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
2019
/
8 p. : tab
https://doi.org/10.1109/CyberSecPODS.2019.8885192
book article
3
book article EST
/
book article ENG
System for determination of legal responsibility/penalty for a cybersecurity breach
Hovorushchenko, Tetiana
;
Herts, Alla
;
Boyarchuk, Artem
;
Pavlova, Olga
ITTAP 2022 - Proceedings of the 2nd International Workshop on Information Technologies: Theoretical and Applied Problems
2022
/
p. 233-240
https://ceur-ws.org/Vol-3309/short9.pdf
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Number of records 3, displaying
1 - 3
keyword
94
1.
cyber threat
2.
cyber threat communication
3.
cyber threats
4.
perceived cyber risks and threats
5.
asymmetric threat
6.
group threat theory
7.
hybrid threat
8.
threat identification
9.
Threat modeling
10.
threat modeling (TM)
11.
threat modelling
12.
autonomous vehicle cyber range
13.
cloud-based cyber-physical systems (C2PS)
14.
cognitive cyber warfare
15.
cyber
16.
Cyber “Maastricht”
17.
cyber architecture
18.
cyber attacks
19.
cyber battle damage assessment
20.
Cyber Bio-analytical Physical Systems (CBPSs)
21.
cyber challenge
22.
cyber command
23.
cyber conflict
24.
cyber contingency
25.
cyber crime
26.
cyber crime pathways
27.
cyber crime scripting
28.
Cyber crisis management
29.
cyber defence
30.
cyber defence exercise
31.
cyber defence exercises
32.
cyber defense education
33.
cyber defense exercise
34.
cyber defense exercises
35.
cyber dependence
36.
cyber diplomacy
37.
cyber exercise
38.
cyber hygiene
39.
cyber impact assessment
40.
cyber incidents
41.
cyber insurance
42.
cyber intrusion detection
43.
cyber kill chain
44.
cyber operation
45.
cyber operation officer
46.
cyber operations
47.
cyber physical energy systems
48.
cyber physical power system (CPPS)
49.
Cyber Physical Production System
50.
cyber physical production systems (CPPS)
51.
cyber physical social system
52.
cyber physical social systems (cpss)
53.
cyber physical system
54.
cyber power Europe
55.
cyber ranges
56.
cyber red teaming
57.
cyber resilience
58.
cyber risk
59.
cyber security
60.
cyber security education
61.
cyber security exercises
62.
cyber security strategies
63.
cyber situational awareness
64.
cyber stability
65.
cyber team communication
66.
cyber war
67.
cyber warfare
68.
cyber warriors
69.
cyber weapons
70.
cyber-attack
71.
cyber-attack pathways
72.
cyber-insurance
73.
cyber-paternalism
74.
cyber-physical energy systems
75.
cyber-physical social system (CPSS)
76.
cyber-physical system
77.
Cyber-Physical System (CPS)
78.
cyber-physical system logistic robot
79.
cyber-physical systems
80.
Cyber-Physical Systems (CPS)
81.
cyber-risks
82.
cyber-security
83.
cyber-vulnerabilities
84.
Defensive Cyber Operations
85.
EU cyber policy
86.
international cyber norms
87.
military cyber
88.
mobile cyber-physical system
89.
national cyber security strategy
90.
NATO Cyber Range
91.
Offensive Cyber Operations
92.
responsive cyber defence
93.
Socio-Cyber-Physical Systems
94.
technical cyber exercise
subject term
3
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT