Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security strategies (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/265)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
book article
Number of records 1, displaying
1 - 1
keyword
259
1.
cyber security strategies
2.
security strategies
3.
cyber security
4.
cyber security education
5.
cyber security exercises
6.
cyber security monitoring
7.
cyber security monitoring in maritime
8.
cyber-physical system security
9.
cyber-security
10.
maritime cyber security
11.
maritime cyber security operations centers
12.
national cyber security strategy
13.
airport strategies
14.
bias mitigation strategies
15.
climate strategies
16.
co-design strategies
17.
collaboration strategies
18.
control optimization strategies
19.
coping strategies
20.
course development strategies
21.
cultural adjustment strategies
22.
cultural tourism strategies
23.
digital strategies
24.
Educational strategies
25.
e-Government policies and strategies
26.
energy management strategies (EMS)
27.
enterprise strategies
28.
EoL strategies
29.
EU policies and strategies
30.
European firefighting strategies
31.
fixation strategies
32.
graph and tree search strategies
33.
HVAC control strategies
34.
hybrid strategies
35.
innovation in processing strategies
36.
management strategies
37.
marketing strategies
38.
mitigation strategies
39.
mitigation strategies of UHI effect
40.
passive design strategies
41.
portfolio of strategies
42.
questioning strategies
43.
regional innovation strategies on smart specialization (RIS3)
44.
research strategies
45.
smart specialization strategies (S3)
46.
strategies
47.
strategies and concepts of bioinspired designs
48.
strategies for human resource and local policies
49.
strategies of inquiry
50.
suboptimal feedback strategies
51.
sub-optimal feedback strategies
52.
synthesis strategies
53.
teaching strategies
54.
automated cyber defense
55.
autonomous vehicle cyber range
56.
cloud-based cyber-physical systems (C2PS)
57.
cognitive cyber warfare
58.
cyber
59.
Cyber “Maastricht”
60.
cyber architecture
61.
cyber attacks
62.
cyber battle damage assessment
63.
Cyber Bio-analytical Physical Systems (CBPSs)
64.
cyber challenge
65.
cyber command
66.
Cyber Command organisational structure
67.
cyber conflict
68.
cyber contingency
69.
cyber crime
70.
cyber crime pathways
71.
cyber crime scripting
72.
Cyber crisis management
73.
cyber defence
74.
cyber defence exercise
75.
cyber defence exercises
76.
cyber defense education
77.
cyber defense exercise
78.
cyber defense exercises
79.
cyber dependence
80.
cyber diplomacy
81.
cyber exercise
82.
cyber hygiene
83.
cyber impact assessment
84.
cyber incidents
85.
cyber insurance
86.
cyber intrusion detection
87.
cyber kill chain
88.
cyber operation
89.
cyber operation officer
90.
cyber operations
91.
cyber operations exercises
92.
cyber physical energy systems
93.
cyber physical power system (CPPS)
94.
Cyber Physical Production System
95.
cyber physical production systems (CPPS)
96.
cyber physical social system
97.
cyber physical social systems (cpss)
98.
cyber physical system
99.
Cyber Planning tool
100.
cyber power Europe
101.
cyber ranges
102.
cyber red teaming
103.
cyber resilience
104.
cyber resilience at sea
105.
cyber risk
106.
cyber risk management in shipping
107.
cyber situational awareness
108.
cyber stability
109.
cyber team communication
110.
cyber threat
111.
cyber threat communication
112.
Cyber Threat Intelligence
113.
cyber threats
114.
cyber war
115.
cyber warfare
116.
cyber warriors
117.
cyber weapons
118.
cyber-attack
119.
cyber-attack pathways
120.
Cyber-attacks
121.
cyber-insurance
122.
cyber-paternalism
123.
cyber-physical energy systems
124.
cyber-physical social system (CPSS)
125.
cyber-physical system
126.
Cyber-Physical System (CPS)
127.
cyber-physical system logistic robot
128.
cyber-physical systems
129.
Cyber-Physical Systems (CPS)
130.
cyber-risks
131.
cyber-space nexus
132.
cyber-vulnerabilities
133.
Defensive Cyber Operations
134.
EU cyber policy
135.
international cyber norms
136.
military cyber
137.
mobile cyber-physical system
138.
NATO cyber operations definitions
139.
NATO Cyber Range
140.
Offensive Cyber Operations
141.
perceived cyber risks and threats
142.
responsive cyber defence
143.
Socio-Cyber-Physical Systems
144.
space cyber range
145.
technical cyber exercise
146.
Visualising Cyber Planning
147.
ad-hoc sensor networks security
148.
Automatic Security Verification
149.
Blockchain security
150.
cache security
151.
cloud security
152.
communication system security
153.
comprehensive system of economic security
154.
computer security
155.
cooperative security dilemma
156.
data and information security
157.
data security
158.
development of security cameras
159.
digital security practices
160.
drinking water security
161.
economic security
162.
economic security of enterprise
163.
emotional security
164.
energy security
165.
energy security indicator
166.
Estonian information security standard
167.
graded security
168.
hardware security
169.
hardware security primitive
170.
high level of security
171.
Homeland security
172.
human security
173.
information security
174.
information security and privacy
175.
initial level of security
176.
internal security
177.
international security
178.
investment and innovation security
179.
IPv6 security
180.
IT security
181.
IT security management
182.
job security
183.
long-term security
184.
Maritime Security Operations Center (M-SOC)
185.
medium level of security
186.
metadata model for security measures
187.
Middle Eastern security
188.
Mobile security
189.
national security
190.
NATO. Science for Peace and Security Program
191.
network security
192.
network security monitoring
193.
OSCE (Organization for Security and Co-operation in Europe)
194.
passenger’s security
195.
policy-based routing security
196.
political and security cultures
197.
post-quantum security
198.
power system security
199.
quantitative security
200.
regional security
201.
RISC-V Security Verification
202.
Safety and Security in Sea Transportation
203.
safety and security testing
204.
security
205.
security adaptation
206.
security alert prioritization
207.
security analysis
208.
security and justice (AFSJ)
209.
Security and political science
210.
security and privacy
211.
security and privacy in smart grids
212.
Security Assertion
213.
Security Assertion Mining
214.
security closure
215.
Security Coverage
216.
security dataset
217.
security dilemma
218.
Security evaluation
219.
security evaluation instruments
220.
Security Level Evaluation
221.
Security limitations
222.
security log analysis
223.
security management
224.
security model
225.
security monitoring
226.
security notion
227.
security objectives
228.
security of data
229.
security of supply
230.
security operation center
231.
security operations center
232.
security patterns
233.
security policy
234.
security problem definition
235.
security proof
236.
security protocols
237.
security requirements
238.
security requirements engineering
239.
security research
240.
security risk assessment
241.
security risk management
242.
security risks
243.
security science and technology
244.
security systems for military objects
245.
security testing
246.
security training
247.
security verification
248.
security-by-design
249.
social security planning
250.
societal security
251.
software security
252.
software security level
253.
software security subcharacteristics
254.
sufficient level of security
255.
system of economic security
256.
system security
257.
terrorism security
258.
transmission System Security
259.
voting privacy and security
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT