Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security strategies (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/256)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
book article
Number of records 1, displaying
1 - 1
keyword
250
1.
cyber security strategies
2.
security strategies
3.
cyber security
4.
cyber security education
5.
cyber security exercises
6.
cyber security monitoring
7.
cyber-security
8.
maritime cyber security
9.
maritime cyber security operations centers
10.
national cyber security strategy
11.
airport strategies
12.
bias mitigation strategies
13.
climate strategies
14.
co-design strategies
15.
collaboration strategies
16.
control optimization strategies
17.
coping strategies
18.
course development strategies
19.
cultural adjustment strategies
20.
cultural tourism strategies
21.
digital strategies
22.
Educational strategies
23.
e-Government policies and strategies
24.
energy management strategies (EMS)
25.
enterprise strategies
26.
EoL strategies
27.
EU policies and strategies
28.
European firefighting strategies
29.
graph and tree search strategies
30.
hybrid strategies
31.
innovation in processing strategies
32.
management strategies
33.
marketing strategies
34.
mitigation strategies
35.
mitigation strategies of UHI effect
36.
passive design strategies
37.
portfolio of strategies
38.
questioning strategies
39.
regional innovation strategies on smart specialization (RIS3)
40.
research strategies
41.
smart specialization strategies (S3)
42.
strategies
43.
strategies and concepts of bioinspired designs
44.
strategies for human resource and local policies
45.
strategies of inquiry
46.
suboptimal feedback strategies
47.
sub-optimal feedback strategies
48.
synthesis strategies
49.
teaching strategies
50.
autonomous vehicle cyber range
51.
cloud-based cyber-physical systems (C2PS)
52.
cognitive cyber warfare
53.
cyber
54.
Cyber “Maastricht”
55.
cyber architecture
56.
cyber attacks
57.
cyber battle damage assessment
58.
Cyber Bio-analytical Physical Systems (CBPSs)
59.
cyber challenge
60.
cyber command
61.
Cyber Command organisational structure
62.
cyber conflict
63.
cyber contingency
64.
cyber crime
65.
cyber crime pathways
66.
cyber crime scripting
67.
Cyber crisis management
68.
cyber defence
69.
cyber defence exercise
70.
cyber defence exercises
71.
cyber defense education
72.
cyber defense exercise
73.
cyber defense exercises
74.
cyber dependence
75.
cyber diplomacy
76.
cyber exercise
77.
cyber hygiene
78.
cyber impact assessment
79.
cyber incidents
80.
cyber insurance
81.
cyber intrusion detection
82.
cyber kill chain
83.
cyber operation
84.
cyber operation officer
85.
cyber operations
86.
cyber operations exercises
87.
cyber physical energy systems
88.
cyber physical power system (CPPS)
89.
Cyber Physical Production System
90.
cyber physical production systems (CPPS)
91.
cyber physical social system
92.
cyber physical social systems (cpss)
93.
cyber physical system
94.
Cyber Planning tool
95.
cyber power Europe
96.
cyber ranges
97.
cyber red teaming
98.
cyber resilience
99.
cyber resilience at sea
100.
cyber risk
101.
cyber risk management in shipping
102.
cyber situational awareness
103.
cyber stability
104.
cyber team communication
105.
cyber threat
106.
cyber threat communication
107.
Cyber Threat Intelligence
108.
cyber threats
109.
cyber war
110.
cyber warfare
111.
cyber warriors
112.
cyber weapons
113.
cyber-attack
114.
cyber-attack pathways
115.
Cyber-attacks
116.
cyber-insurance
117.
cyber-paternalism
118.
cyber-physical energy systems
119.
cyber-physical social system (CPSS)
120.
cyber-physical system
121.
Cyber-Physical System (CPS)
122.
cyber-physical system logistic robot
123.
cyber-physical systems
124.
Cyber-Physical Systems (CPS)
125.
cyber-risks
126.
cyber-space nexus
127.
cyber-vulnerabilities
128.
Defensive Cyber Operations
129.
EU cyber policy
130.
international cyber norms
131.
military cyber
132.
mobile cyber-physical system
133.
NATO cyber operations definitions
134.
NATO Cyber Range
135.
Offensive Cyber Operations
136.
perceived cyber risks and threats
137.
responsive cyber defence
138.
Socio-Cyber-Physical Systems
139.
space cyber range
140.
technical cyber exercise
141.
Visualising Cyber Planning
142.
ad-hoc sensor networks security
143.
Automatic Security Verification
144.
Blockchain security
145.
cache security
146.
communication system security
147.
comprehensive system of economic security
148.
computer security
149.
cooperative security dilemma
150.
data and information security
151.
data security
152.
development of security cameras
153.
digital security practices
154.
drinking water security
155.
economic security
156.
economic security of enterprise
157.
emotional security
158.
energy security
159.
energy security indicator
160.
Estonian information security standard
161.
graded security
162.
hardware security
163.
hardware security primitive
164.
high level of security
165.
Homeland security
166.
human security
167.
information security
168.
information security and privacy
169.
initial level of security
170.
internal security
171.
international security
172.
investment and innovation security
173.
IPv6 security
174.
IT security
175.
IT security management
176.
job security
177.
long-term security
178.
Maritime Security Operations Center (M-SOC)
179.
medium level of security
180.
metadata model for security measures
181.
Middle Eastern security
182.
Mobile security
183.
national security
184.
NATO. Science for Peace and Security Program
185.
network security
186.
network security monitoring
187.
OSCE (Organization for Security and Co-operation in Europe)
188.
passenger’s security
189.
policy-based routing security
190.
political and security cultures
191.
post-quantum security
192.
power system security
193.
quantitative security
194.
regional security
195.
RISC-V Security Verification
196.
Safety and Security in Sea Transportation
197.
safety and security testing
198.
security
199.
security adaptation
200.
security alert prioritization
201.
security analysis
202.
security and justice (AFSJ)
203.
Security and political science
204.
security and privacy
205.
security and privacy in smart grids
206.
Security Assertion Mining
207.
security closure
208.
Security Coverage
209.
security dataset
210.
security dilemma
211.
Security evaluation
212.
security evaluation instruments
213.
Security limitations
214.
security log analysis
215.
security management
216.
security model
217.
security monitoring
218.
security notion
219.
security objectives
220.
security of data
221.
security of supply
222.
security operation center
223.
security operations center
224.
security patterns
225.
security policy
226.
security problem definition
227.
security proof
228.
security protocols
229.
security requirements
230.
security requirements engineering
231.
security risk assessment
232.
security risk management
233.
security risks
234.
security science and technology
235.
security systems for military objects
236.
security testing
237.
security training
238.
security verification
239.
security-by-design
240.
social security planning
241.
societal security
242.
software security
243.
software security level
244.
software security subcharacteristics
245.
sufficient level of security
246.
system of economic security
247.
system security
248.
terrorism security
249.
transmission System Security
250.
voting privacy and security
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT