Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
22
Vaata veel..
(2/171)
Ekspordi
ekspordi kõik päringu tulemused
(22)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Anomaly detection and classification in power system state estimation: Combining model-based and data-driven methods
Asefi, Sajjad
;
Mitrovic, Mile
;
Cetenovic, Dragan
;
Levi, Victor
;
Gryazina, Elena
;
Terzija, Vladimir
Sustainable energy, grids and networks
2023
/
art. 101116, 14 p. : ill
https://doi.org/10.1016/j.segan.2023.101116
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
2
artikkel kogumikus
ASAT weapons : enhancing NATO’s operational capabilities in the emerging space dependent era
Carlo, Antonio
;
Veazoglou, Nikolaos
Modelling and Simulation for Autonomous Systems : 6th International Conference, MESAS 2019, Palermo, Italy, October 29–31, 2019, Revised Selected Papers
2020
/
p. 417-426
https://doi.org/10.1007/978-3-030-43890-6_34
artikkel kogumikus
3
artikkel kogumikus
Building cyber resilience : the defensive shield for the EU
Osula, Anna-Maria
Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives
2022
/
p. 179-196
https://doi.org/10.1007/978-3-031-08384-6_9
artikkel kogumikus
4
artikkel kogumikus
Capability detection and evaluation metrics for cyber security lab exercises
Caliskan, Emin
;
Tatar, Unal
;
Bahsi, Hayretdin
;
Ottis, Rain
;
Vaarandi, Risto
Proceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 2017
2017
/
p. 407-414 : ill
https://www.scopus.com/record/display.uri?eid=2-s2.0-85018944652&origin=inward&txGid=dad813d957372581ca0932bf6e4fb5d8
artikkel kogumikus
5
artikkel kogumikus
Cyber attacks on power system automation and protection and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Presekal, Alfan
;
Palensky, Peter
Proceedings of 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 26-28 October, 2020
2020
/
p. 247–254
https://doi.org/10.1109/ISGT-Europe47291.2020.9248840
artikkel kogumikus
6
artikkel kogumikus
Cyber attacks on protective relays in digital substations and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Palensky, Peter
8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems(MSCPES), Virtual Workshop, online, from April 21, 2020 : proceedings
2020
/
6 p. : ill
https://doi.org/10.1109/MSCPES49613.2020.9133698
artikkel kogumikus
7
artikkel kogumikus
Cyber commands - universal solution to a universal cyber security problem?
Alatalu, Siim
Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018
2018
/
p. 21-22
https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
artikkel kogumikus
8
artikkel kogumikus
Educational computer game for cyber security : game concept [Online resource]
Sõmer, Tiia
Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology
2015
/
p. 17-19
http://cybercentre.cs.ttu.ee/en/icr2015/
artikkel kogumikus
9
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
10
artikkel ajakirjas
Envisioning the future renewable and resilient energy grids – a power grid revolution enabled by renewables, energy storage, and energy electronics
Peng, Fang Zheng
;
Liu, Chen-Ching
;
Li, Yuan
;
Jain, Akshay Kumar
;
Vinnikov, Dmitri
IEEE journal of emerging and selected topics in industrial electronics
2024
/
p. 8-26
https://doi.org/10.1109/JESTIE.2023.3343291
artikkel ajakirjas
11
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
EU Common position on international law and cyberspace
Osula, Anna-Maria
;
Kasper, Agnes
;
Kajander, Aleksi Oskar Johannes
Masaryk University journal of law and technology
2022
/
p. 89-123
https://doi.org/10.5817/MUJLT2022-1-4
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
12
artikkel kogumikus
Hacking on the high seas: How automated reverse-engineering can assist vulnerability discovery of a proprietary communication protocol
Visky, Gabor
;
Rohl, Alexander
;
Vaarandi, Risto
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2024 IEEE 49th Conference on Local Computer Networks (LCN)
2024
/
7 p
https://doi.org/10.1109/LCN60385.2024.10639746
artikkel kogumikus
13
artikkel kogumikus
How to build a SOC on a budget
Vaarandi, Risto
;
Mäses, Sten
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
2022
/
p. 171-177 : ill
https://doi.org/10.1109/CSR54599.2022.9850281
artikkel kogumikus
14
artikkel kogumikus
Lightweight testbed for IEC61162-450-related cyber security research
Visky, Gabor
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2024 IEEE International Conference on Cyber Security and Resilience (CSR) : proceedings
2024
/
p. 638-643
https://doi.org/10.1109/CSR61664.2024.10679439
artikkel kogumikus
15
artikkel kogumikus EST
/
artikkel kogumikus ENG
A live virtual simulator for teaching cybersecurity to information technology students
Ernits, Margus
;
Kikkas, Kaido
Learning and Collaboration Technologies : Third International Conference, LCT 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings
2016
/
p. 474-486 : ill
https://doi.org/10.1007/978-3-319-39483-1_43
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
16
artikkel kogumikus EST
/
artikkel kogumikus ENG
Modelling the impact of space situational awareness disruption on the European and Arctic security landscape
Carlo, Antonio
;
Boschetti, Nicolo
Modelling and Simulation for Autonomous Systems: 9th International Conference, MESAS 2022, Prague, Czech Republic, October 20–21, 2022 : Revised Selected Papers
2023
/
p. 299-311
https://doi.org/10.1007/978-3-031-31268-7_18
Journal metrics at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
17
artikkel kogumikus
Technological sovereignty : missing the point?
Maurer, Tim
;
Skierka-Canton, Isabel
;
Morgus, Robert
;
Hohmann, Mirko
2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia
2015
/
p. 53-67
artikkel kogumikus
Seotud publikatsioonid
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
18
artikkel ajakirjas
The Main challenges and barriers to the successful "Smart Shipping"
Alop, Anatoli
TransNav: International Journal on Marine Navigation and Safety of Sea Transportation
2019
/
p. 521-528
https://doi.org/10.12716/1001.13.03.05
artikkel ajakirjas
19
artikkel ajakirjas
The regulatory intersections between artificial intelligence, data protection and cyber security : challenges and opportunities for the EU legal framework
Andraško, Jozef
;
Mesarčik, Matuš
;
Hamulak, Ondrej
AI & Society
2021
/
p. 623–636
https://doi.org/10.1007/s00146-020-01125-5
artikkel ajakirjas
20
artikkel kogumikus
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
artikkel kogumikus
21
artikkel kogumikus
Towards an Open-source Intrusion Detection System Integration Into Marine Vehicles
Visky, Gabor
;
Khisteva, Dariana
;
Vaarandi, Risto
;
Maennel, Olaf Manuel
2024 International Symposium ELMAR
Proceedings of ELMAR-2024 : 66th International Symposium ELMAR. 16-18 September 2024, Zadar, Croatia
2024
/
p. 263-268
https://doi.org/10.1109/ELMAR62909.2024.10694518
artikkel kogumikus
22
artikkel kogumikus EST
/
artikkel kogumikus ENG
Variable self-efficacy as a measurement for behaviors in cyber security operations
Lugo, Ricardo Gregorio
;
Knox, Benjamin James
;
Josok, Oyvind
;
Sütterlin, Stefan
Augmented Cognition. Human Cognition and Behavior : 14th International Conference, AC 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings, Part II
2020
/
p. 395-404
https://doi.org/10.1007/978-3-030-50439-7_27
Conference proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 22, kuvan
1 - 22
võtmesõna
166
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security strategies
5.
cyber-security
6.
national cyber security strategy
7.
autonomous vehicle cyber range
8.
cloud-based cyber-physical systems (C2PS)
9.
cognitive cyber warfare
10.
cyber
11.
Cyber “Maastricht”
12.
cyber architecture
13.
cyber attacks
14.
cyber battle damage assessment
15.
Cyber Bio-analytical Physical Systems (CBPSs)
16.
cyber challenge
17.
cyber command
18.
cyber conflict
19.
cyber contingency
20.
cyber crime
21.
cyber crime pathways
22.
cyber crime scripting
23.
Cyber crisis management
24.
cyber defence
25.
cyber defence exercise
26.
cyber defence exercises
27.
cyber defense education
28.
cyber defense exercise
29.
cyber defense exercises
30.
cyber dependence
31.
cyber diplomacy
32.
cyber exercise
33.
cyber hygiene
34.
cyber impact assessment
35.
cyber incidents
36.
cyber insurance
37.
cyber intrusion detection
38.
cyber kill chain
39.
cyber operation
40.
cyber operations
41.
cyber physical energy systems
42.
cyber physical power system (CPPS)
43.
Cyber Physical Production System
44.
cyber physical production systems (CPPS)
45.
cyber physical system
46.
cyber power Europe
47.
cyber ranges
48.
cyber red teaming
49.
cyber resilience
50.
cyber risk
51.
cyber situational awareness
52.
cyber stability
53.
cyber team communication
54.
cyber threat
55.
cyber threat communication
56.
cyber threats
57.
cyber war
58.
cyber warfare
59.
cyber warriors
60.
cyber weapons
61.
cyber-attack
62.
cyber-attack pathways
63.
cyber-insurance
64.
cyber-paternalism
65.
cyber-physical energy systems
66.
cyber-physical social system (CPSS)
67.
cyber-physical system
68.
Cyber-Physical System (CPS)
69.
cyber-physical system logistic robot
70.
cyber-physical systems
71.
Cyber-Physical Systems (CPS)
72.
cyber-vulnerabilities
73.
EU cyber policy
74.
international cyber norms
75.
military cyber
76.
mobile cyber-physical system
77.
NATO Cyber Range
78.
perceived cyber risks and threats
79.
responsive cyber defence
80.
Socio-Cyber-Physical Systems
81.
technical cyber exercise
82.
ad-hoc sensor networks security
83.
Automatic Security Verification
84.
Blockchain security
85.
cache security
86.
communication system security
87.
comprehensive system of economic security
88.
computer security
89.
cooperative security dilemma
90.
data security
91.
development of security cameras
92.
drinking water security
93.
economic security
94.
economic security of enterprise
95.
emotional security
96.
energy security
97.
energy security indicator
98.
graded security
99.
hardware security
100.
hardware security primitive
101.
human security
102.
information security
103.
internal security
104.
international security
105.
investment and innovation security
106.
IPv6 security
107.
IT security
108.
IT security management
109.
job security
110.
long-term security
111.
metadata model for security measures
112.
Middle Eastern security
113.
Mobile security
114.
national security
115.
NATO. Science for Peace and Security Program
116.
network security
117.
network security monitoring
118.
OSCE (Organization for Security and Co-operation in Europe)
119.
passenger’s security
120.
policy-based routing security
121.
political and security cultures
122.
post-quantum security
123.
power system security
124.
quantitative security
125.
regional security
126.
RISC-V Security Verification
127.
security
128.
security and justice (AFSJ)
129.
security and privacy
130.
security and privacy in smart grids
131.
Security Assertion Mining
132.
security closure
133.
Security Coverage
134.
security dataset
135.
security dilemma
136.
Security evaluation
137.
security log analysis
138.
security management
139.
security model
140.
security monitoring
141.
security notion
142.
security objectives
143.
security of data
144.
security of supply
145.
security operation center
146.
security patterns
147.
security policy
148.
security problem definition
149.
security proof
150.
security protocols
151.
security requirements
152.
security requirements engineering
153.
security risk assessment
154.
security risk management
155.
security strategies
156.
security systems for military objects
157.
security testing
158.
security training
159.
security verification
160.
social security planning
161.
societal security
162.
system of economic security
163.
system security
164.
terrorism security
165.
transmission System Security
166.
voting privacy and security
märksõna
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT