Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Cyber Security for Microgrids (source)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/230)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Cyber-physical microgrids : toward flexible energy districts
Rosin, Argo
;
Ahmadiahangar, Roya
;
Martins, Joao
;
Sahoo, Subham
;
Blaabjerg, Frede
Cyber Security for Microgrids
2022
/
p. 161-178 : ill
https://doi.org/10.1049/PBPO196E_ch8
book article
Number of records 1, displaying
1 - 1
keyword
224
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security strategies
6.
cyber-physical system security
7.
cyber-security
8.
maritime cyber security
9.
maritime cyber security operations centers
10.
national cyber security strategy
11.
dc microgrids
12.
hybrid AC/DC microgrids
13.
industrial microgrids
14.
microgrids
15.
microgrids (MG)
16.
microgrids (MGs)
17.
multi-microgrids
18.
tactical microgrids
19.
autonomous vehicle cyber range
20.
cloud-based cyber-physical systems (C2PS)
21.
cognitive cyber warfare
22.
cyber
23.
Cyber “Maastricht”
24.
cyber architecture
25.
cyber attacks
26.
cyber battle damage assessment
27.
Cyber Bio-analytical Physical Systems (CBPSs)
28.
cyber challenge
29.
cyber command
30.
Cyber Command organisational structure
31.
cyber conflict
32.
cyber contingency
33.
cyber crime
34.
cyber crime pathways
35.
cyber crime scripting
36.
Cyber crisis management
37.
cyber defence
38.
cyber defence exercise
39.
cyber defence exercises
40.
cyber defense education
41.
cyber defense exercise
42.
cyber defense exercises
43.
cyber dependence
44.
cyber diplomacy
45.
cyber exercise
46.
cyber hygiene
47.
cyber impact assessment
48.
cyber incidents
49.
cyber insurance
50.
cyber intrusion detection
51.
cyber kill chain
52.
cyber operation
53.
cyber operation officer
54.
cyber operations
55.
cyber operations exercises
56.
cyber physical energy systems
57.
cyber physical power system (CPPS)
58.
Cyber Physical Production System
59.
cyber physical production systems (CPPS)
60.
cyber physical social system
61.
cyber physical social systems (cpss)
62.
cyber physical system
63.
Cyber Planning tool
64.
cyber power Europe
65.
cyber ranges
66.
cyber red teaming
67.
cyber resilience
68.
cyber resilience at sea
69.
cyber risk
70.
cyber risk management in shipping
71.
cyber situational awareness
72.
cyber stability
73.
cyber team communication
74.
cyber threat
75.
cyber threat communication
76.
Cyber Threat Intelligence
77.
cyber threats
78.
cyber war
79.
cyber warfare
80.
cyber warriors
81.
cyber weapons
82.
cyber-attack
83.
cyber-attack pathways
84.
Cyber-attacks
85.
cyber-insurance
86.
cyber-paternalism
87.
cyber-physical energy systems
88.
cyber-physical social system (CPSS)
89.
cyber-physical system
90.
Cyber-Physical System (CPS)
91.
cyber-physical system logistic robot
92.
cyber-physical systems
93.
Cyber-Physical Systems (CPS)
94.
cyber-risks
95.
cyber-space nexus
96.
cyber-vulnerabilities
97.
Defensive Cyber Operations
98.
EU cyber policy
99.
international cyber norms
100.
military cyber
101.
mobile cyber-physical system
102.
NATO cyber operations definitions
103.
NATO Cyber Range
104.
Offensive Cyber Operations
105.
perceived cyber risks and threats
106.
responsive cyber defence
107.
Socio-Cyber-Physical Systems
108.
space cyber range
109.
technical cyber exercise
110.
Visualising Cyber Planning
111.
ad-hoc sensor networks security
112.
Automatic Security Verification
113.
Blockchain security
114.
cache security
115.
cloud security
116.
communication system security
117.
comprehensive system of economic security
118.
computer security
119.
cooperative security dilemma
120.
data and information security
121.
data security
122.
development of security cameras
123.
digital security practices
124.
drinking water security
125.
economic security
126.
economic security of enterprise
127.
emotional security
128.
energy security
129.
energy security indicator
130.
Estonian information security standard
131.
graded security
132.
hardware security
133.
hardware security primitive
134.
high level of security
135.
Homeland security
136.
human security
137.
information security
138.
information security and privacy
139.
initial level of security
140.
internal security
141.
international security
142.
investment and innovation security
143.
IPv6 security
144.
IT security
145.
IT security management
146.
job security
147.
long-term security
148.
Maritime Security Operations Center (M-SOC)
149.
medium level of security
150.
metadata model for security measures
151.
Middle Eastern security
152.
Mobile security
153.
national security
154.
NATO. Science for Peace and Security Program
155.
network security
156.
network security monitoring
157.
OSCE (Organization for Security and Co-operation in Europe)
158.
passenger’s security
159.
policy-based routing security
160.
political and security cultures
161.
post-quantum security
162.
power system security
163.
quantitative security
164.
regional security
165.
RISC-V Security Verification
166.
Safety and Security in Sea Transportation
167.
safety and security testing
168.
security
169.
security adaptation
170.
security alert prioritization
171.
security analysis
172.
security and justice (AFSJ)
173.
Security and political science
174.
security and privacy
175.
security and privacy in smart grids
176.
Security Assertion
177.
Security Assertion Mining
178.
security closure
179.
Security Coverage
180.
security dataset
181.
security dilemma
182.
Security evaluation
183.
security evaluation instruments
184.
Security Level Evaluation
185.
Security limitations
186.
security log analysis
187.
security management
188.
security model
189.
security monitoring
190.
security notion
191.
security objectives
192.
security of data
193.
security of supply
194.
security operation center
195.
security operations center
196.
security patterns
197.
security policy
198.
security problem definition
199.
security proof
200.
security protocols
201.
security requirements
202.
security requirements engineering
203.
security research
204.
security risk assessment
205.
security risk management
206.
security risks
207.
security science and technology
208.
security strategies
209.
security systems for military objects
210.
security testing
211.
security training
212.
security verification
213.
security-by-design
214.
social security planning
215.
societal security
216.
software security
217.
software security level
218.
software security subcharacteristics
219.
sufficient level of security
220.
system of economic security
221.
system security
222.
terrorism security
223.
transmission System Security
224.
voting privacy and security
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT