Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
automated cyber defense (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/156)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Next steps in cyber blue team automation - leveraging the power of LLMs
Dijk, Allard
;
Meier, Roland
;
Melella, Cosimo
;
Pihelgas, Mauno
;
Vaarandi, Risto
;
Lenders, Vincent
2025 17th International Conference on Cyber Conflict: The Next Step
2025
/
p. 209-226 : ill
https://ccdcoe.org/uploads/2025/05/CyCon_2025_The-Proceedings-of-the-17th-International-Conference-on-Cyber-Conflict.pdf
https://doi.org/10.23919/CyCon65856.2025.11103720
Conference proceeding at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
152
1.
automated cyber defense
2.
cyber defense education
3.
cyber defense exercise
4.
cyber defense exercises
5.
comprehensive national defense
6.
Defense enzymes
7.
defense industry
8.
national defense
9.
automated Arabic text illustration
10.
Automated Bonding Evaluation System
11.
automated buses
12.
automated code generation
13.
automated control
14.
automated decision and monitoring mechanisms
15.
automated decision making
16.
Automated decision-making
17.
automated decision-making (ADM)
18.
automated decisions
19.
automated driving
20.
automated fiber placement
21.
automated fibre placement
22.
Automated guided vehicle (AGV)
23.
automated labeling
24.
automated mobility
25.
automated mobility and delivery industry
26.
automated oral fluid extractor
27.
automated personalised feedback
28.
Automated placement system
29.
Automated Production Systems
30.
automated protocol reverse-engineering
31.
automated quality assessment
32.
automated readout
33.
automated reasoning
34.
automated social presence
35.
automated supply air temperature (ASAT)
36.
Automated Synthesis of Software-based Self-test
37.
automated tape
38.
automated tape laying
39.
automated test environment
40.
automated test pattern generation
41.
automated theorem proving
42.
automated urine particle analyzer
43.
automated vehicle
44.
automated vehicles
45.
automated visual inspection
46.
complex automated systems
47.
connected and automated mobility
48.
connected automated vehicles
49.
connected-and-automated mobility
50.
connected-automated mobility
51.
intelligent Automated Inspection
52.
nonlinear automated vehicles
53.
autonomous vehicle cyber range
54.
cloud-based cyber-physical systems (C2PS)
55.
cognitive cyber warfare
56.
cyber
57.
Cyber “Maastricht”
58.
cyber architecture
59.
cyber attacks
60.
cyber battle damage assessment
61.
Cyber Bio-analytical Physical Systems (CBPSs)
62.
cyber challenge
63.
cyber command
64.
Cyber Command organisational structure
65.
cyber conflict
66.
cyber contingency
67.
cyber crime
68.
cyber crime pathways
69.
cyber crime scripting
70.
Cyber crisis management
71.
cyber defence
72.
cyber defence exercise
73.
cyber defence exercises
74.
cyber dependence
75.
cyber diplomacy
76.
cyber exercise
77.
cyber hygiene
78.
cyber impact assessment
79.
cyber incidents
80.
cyber insurance
81.
cyber intrusion detection
82.
cyber kill chain
83.
cyber operation
84.
cyber operation officer
85.
cyber operations
86.
cyber operations exercises
87.
cyber physical energy systems
88.
cyber physical power system (CPPS)
89.
Cyber Physical Production System
90.
cyber physical production systems (CPPS)
91.
cyber physical social system
92.
cyber physical social systems (cpss)
93.
cyber physical system
94.
Cyber Planning tool
95.
cyber power Europe
96.
cyber ranges
97.
cyber red teaming
98.
cyber resilience
99.
cyber resilience at sea
100.
cyber risk
101.
cyber risk management in shipping
102.
cyber security
103.
cyber security education
104.
cyber security exercises
105.
cyber security monitoring
106.
cyber security monitoring in maritime
107.
cyber security strategies
108.
cyber situational awareness
109.
cyber stability
110.
cyber team communication
111.
cyber threat
112.
cyber threat communication
113.
Cyber Threat Intelligence
114.
cyber threats
115.
cyber war
116.
cyber warfare
117.
cyber warriors
118.
cyber weapons
119.
cyber-attack
120.
cyber-attack pathways
121.
Cyber-attacks
122.
cyber-insurance
123.
cyber-paternalism
124.
cyber-physical energy systems
125.
cyber-physical social system (CPSS)
126.
cyber-physical system
127.
Cyber-Physical System (CPS)
128.
cyber-physical system logistic robot
129.
cyber-physical system security
130.
cyber-physical systems
131.
Cyber-Physical Systems (CPS)
132.
cyber-risks
133.
cyber-security
134.
cyber-space nexus
135.
cyber-vulnerabilities
136.
Defensive Cyber Operations
137.
EU cyber policy
138.
international cyber norms
139.
maritime cyber security
140.
maritime cyber security operations centers
141.
military cyber
142.
mobile cyber-physical system
143.
national cyber security strategy
144.
NATO cyber operations definitions
145.
NATO Cyber Range
146.
Offensive Cyber Operations
147.
perceived cyber risks and threats
148.
responsive cyber defence
149.
Socio-Cyber-Physical Systems
150.
space cyber range
151.
technical cyber exercise
152.
Visualising Cyber Planning
subject term
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT