Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Cyber Threat Intelligence (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(3/164)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Integrating Cyber Threat Intelligence into Threat Modeling for Autonomous Ships Using PASTA and MISP
Erbas, Muhammed
;
Vanharanta, Jani
;
Paavola, Jarkko
;
Tsiopoulos, Leonidas
;
Vaarandi, Risto
2025 IEEE International Conference on Cyber Security and Resilience (CSR)
2025
/
p. 133-139
https://ieeexplore.ieee.org/document/11130108
https://doi.org/10.1109/CSR64739.2025.11130108
book article EST
/
book article ENG
2
journal article EST
/
journal article ENG
A proactive defense : An open-source intelligence (OSINT) framework for maritime cybersecurity
Nasr, Ahmed Nagi Abdelaziz Mohamed
;
Oruc, Aybars
;
Lugo, Ricardo Gregorio
;
Zaitseva-Pärnaste, Inga
;
Kujala, Pentti Jouko Sakari
IEEE Access
2026
/
p. 39852-39872
https://doi.org/10.1109/ACCESS.2026.3673557
journal article EST
/
journal article ENG
Number of records 2, displaying
1 - 2
keyword
157
1.
Cyber Threat Intelligence
2.
cyber threat
3.
cyber threat communication
4.
asymmetric threat
5.
group threat theory
6.
hybrid threat
7.
military threat
8.
threat identification
9.
Threat modeling
10.
threat modeling (TM)
11.
threat modelling
12.
threat prevention
13.
ambient intelligence
14.
architectural intelligence
15.
artificial intelligence
16.
artificial intelligence (AI)
17.
artificial intelligence in education
18.
Artificial intelligence in healthcare
19.
Artificial Intelligence in learning
20.
autonomous vehicle cyber range
21.
business intelligence
22.
business intelligence and analytics
23.
business intelligence management
24.
business-intelligence (BI)
25.
cloud-based cyber-physical systems (C2PS)
26.
cognitive cyber warfare
27.
collaborative intelligence
28.
collective intelligence
29.
Collective Intelligence (CI) platform
30.
Collective intelligence platforms
31.
competitive intelligence
32.
computational intelligence
33.
connected intelligence
34.
cyber
35.
Cyber “Maastricht”
36.
cyber architecture
37.
cyber attacks
38.
cyber battle damage assessment
39.
Cyber Bio-analytical Physical Systems (CBPSs)
40.
cyber challenge
41.
cyber command
42.
Cyber Command organisational structure
43.
cyber conflict
44.
cyber contingency
45.
cyber crime
46.
cyber crime pathways
47.
cyber crime scripting
48.
Cyber crisis management
49.
cyber defence
50.
cyber defence exercise
51.
cyber defence exercises
52.
cyber defense education
53.
cyber defense exercise
54.
cyber defense exercises
55.
cyber dependence
56.
cyber diplomacy
57.
cyber exercise
58.
cyber hygiene
59.
cyber impact assessment
60.
cyber incidents
61.
cyber insurance
62.
cyber intrusion detection
63.
cyber kill chain
64.
cyber operation
65.
cyber operation officer
66.
cyber operations
67.
cyber operations exercises
68.
cyber physical energy systems
69.
cyber physical power system (CPPS)
70.
Cyber Physical Production System
71.
cyber physical production systems (CPPS)
72.
cyber physical social system
73.
cyber physical social systems (cpss)
74.
cyber physical system
75.
Cyber Planning tool
76.
cyber power Europe
77.
cyber ranges
78.
cyber red teaming
79.
cyber resilience
80.
cyber resilience at sea
81.
cyber risk
82.
cyber risk management in shipping
83.
cyber security
84.
cyber security education
85.
cyber security exercises
86.
cyber security monitoring
87.
cyber security monitoring in maritime
88.
cyber security strategies
89.
cyber situational awareness
90.
cyber stability
91.
cyber team communication
92.
cyber threats
93.
cyber war
94.
cyber warfare
95.
cyber warriors
96.
cyber weapons
97.
cyber-attack
98.
cyber-attack pathways
99.
Cyber-attacks
100.
cyber-insurance
101.
cyber-paternalism
102.
cyber-physical energy systems
103.
cyber-physical social system (CPSS)
104.
cyber-physical system
105.
Cyber-Physical System (CPS)
106.
cyber-physical system logistic robot
107.
cyber-physical system security
108.
cyber-physical systems
109.
Cyber-Physical Systems (CPS)
110.
cyber-risks
111.
cyber-security
112.
cyber-space nexus
113.
cyber-vulnerabilities
114.
data-intelligence
115.
Defensive Cyber Operations
116.
Distributed artificial intelligence (DAI)
117.
Emotional Intelligence (EI)
118.
EU cyber policy
119.
explainable artificial intelligence
120.
Explainable Artificial Intelligence (XAI)
121.
generative artificial intelligence
122.
generative artificial intelligence (GAI)
123.
Geospatial Artificial Intelligence (GeoAI)
124.
hybrid intelligence
125.
intelligence
126.
intelligence augmentation
127.
intelligence infrastructure
128.
international cyber norms
129.
language intelligence
130.
learning (artificial intelligence)
131.
manufacturing intelligence
132.
maritime cyber security
133.
maritime cyber security operations centers
134.
market market intelligence
135.
military cyber
136.
mobile cyber-physical system
137.
national cyber security strategy
138.
NATO cyber operations definitions
139.
NATO Cyber Range
140.
Offensive Cyber Operations
141.
open source intelligence
142.
Open Source Intelligence (OSINT)
143.
open source intelligence tools
144.
open-source intelligence (OSINT)
145.
perceived cyber risks and threats
146.
predictive artificial intelligence
147.
responsive cyber defence
148.
societal intelligence
149.
Socio-Cyber-Physical Systems
150.
space cyber range
151.
super-intelligence
152.
swarm intelligence
153.
swarm intelligence optimization
154.
technical cyber exercise
155.
technology intelligence
156.
trustworthy artificial intelligence
157.
Visualising Cyber Planning
subject term
6
1.
Artificial Intelligence Controller Interface (AICI)
2.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
3.
Cyber Battle
4.
Estonian Center for Safe and Trustworthy Artificial Intelligence (ECSTAI)
5.
Telia Cyber Battle of Estonia
6.
Telia Cyber Battle of Nordic-Baltics
TalTech subject term
1
1.
Goverment Technology and Artificial Intelligence Lab = GovAILab
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT