Toggle navigation
Otsi
Publikatsioonid
Profiilid
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cybersecurity (võtmesõna)
Kõikidelt väljadelt
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Kirjeid leitud
42
Vaata veel..
(3/75)
Ekspordi
ekspordi kõik päringu tulemused
(42)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Aligning Estonian and Japanese efforts in building norms in cyberspace
Osula, Anna-Maria
So Far, Yet So Close : Japanese and Estonian cybersecurity : policy perspectives and cooperations : report
2021
/
p. 22-29
https://icds.ee/wp-content/uploads/2021/05/ICDS_Report_So_Far_Yet_So_Close_Roigas_Jermalavicius_May_2021.pdf
artikkel kogumikus
2
artikkel kogumikus
Assessing the role of international relations in cybersecurity : a preliminary analysis
Rincon Mendez, Angelica Marina
CeDEM 15 : Proceedings of the International Conference for E-Democracy and Open Government 2015 : 20-22 May 2015, Danube University Krems, Austria
2015
/
p. 401-404
http://www.donau-uni.ac.at/imperia/md/content/department/gpa/zeg/bilder/cedem/cedem15/cedem15_oa_proceedings.pdf
artikkel kogumikus
3
artikkel kogumikus
Career development in cyber security: Bootcamp training programs
Caliskan, Emin
;
Vaarandi, Risto
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 503-511
https://doi.org/10.34190/ICCWS.20.080
artikkel kogumikus
4
artikkel kogumikus
Culturally-sensitive cybersecurity awareness program design for Iranian high-school students
Karimnia, Rooya
;
Maennel, Kaie
;
Shahin, Mahtab
Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 9-11 February, 2022
2022
/
p. 121-132
https://doi.org/10.5220/0010824800003120
artikkel kogumikus
5
artikkel kogumikus
Cyber game to cyber exercise : a new methodology for cybersecurity simulations
Lovell, Kieren Nicolas
Proceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology
2019
/
p. 13-16
https://www.ester.ee/record=b5238490*est
artikkel kogumikus
6
artikkel kogumikus
Cyber Security Risk Analysis for a Virtual Assistant G2C Digital Service Using FAIR Model
Dreyling, Richard
;
Jackson, Eric B.
;
Pappel, Ingrid
2021 Eighth International Conference on eDemocracy & eGovernment (ICEDEG) : Quito, Ecuador, 28-30 July 2021
2021
/
p. 33-40
https://doi.org/10.1109/ICEDEG52154.2021.9530938
artikkel kogumikus
7
artikkel ajakirjas
CyberGenomics : application of behavioral genetics in cybersecurity
Domarkiene, Ingrida
;
Ambrozaityte, Laima
;
Bukauskas, Linas
;
Rančelis, Tautvydas
;
Sütterlin, Stefan
;
Knox, Benjamin James
;
Maennel, Kaie
;
Maennel, Olaf Manuel
;
Parish, Karen
;
Lugo, Ricardo Gregorio
;
Brilingaite, Agne
Behavioral Sciences
2021
/
art. 152
https://doi.org/10.3390/bs11110152
artikkel ajakirjas
8
artikkel ajakirjas
Cybersecurity in the era of hypercompetitiveness : can the EU meet the new challenges?
Munkoe, Malthe
;
Mölder, Holger
Revista CIDOB d'afers internacionals
2022
/
p. 69-94
https://doi.org/10.24241/rcai.2022.131.2.69/en
artikkel ajakirjas
9
artikkel ajakirjas
Cybersecurity in the making – policy and law: a case study of Georgia
Napetvaridze, Vladimeri
;
Chochia, Archil
International and comparative law review
2019
/
p. 155–180
https://doi.org/10.2478/iclr-2019-0019
artikkel ajakirjas
10
artikkel kogumikus
Cybersecurity within the curricula of informatics : the Estonian perspective
Lorenz, Birgy
;
Kikkas, Kaido
;
Sõmer, Tiia
;
Laugasson, Edmund
Informatics in Schools. New Ideas in School Informatics : 12th International Conference on Informatics in Schools : Situation, Evolution, and Perspectives, ISSEP 2019, Larnaca, Cyprus, November 18–20, 2019 : proceedings
2019
/
p. 159-171
https://doi.org/10.1007/978-3-030-33759-9_13
artikkel kogumikus
11
artikkel kogumikus
Development of children's cyber security competencies in Estonia
Lorenz, Birgy
;
Kikkas, Kaido
;
Osula, Kairi
Learning and Collaboration Technologies : Learning and Teaching : 5th International Conference : LCT 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018 : Proceedings, Part II
2018
/
p. 473–482
http://doi.org/10.1007/978-3-319-91152-6_36
artikkel kogumikus
12
artikkel kogumikus
Enhancing cyber defense situational awareness using 3D visualizations
Kullman, Kaur
;
Cowley, Jennifer
;
Ben-Ashe, Noam
13th International Conference on Cyber Warfare and Security (ICCWS 2018), Washington, DC, USA, 8 – 9 March 2018
2018
/
p. 369-378
http://toc.proceedings.com/38822webtoc.pdf
artikkel kogumikus
13
artikkel ajakirjas
EU cybersecurity and cyber diplomacy
Kasper, Agnes
;
Osula, Anna-Maria
;
Molnar, Anna
IDP Revista de Internet Derecho y Política
2021
/
p. 1-15
https://doi.org/10.7238/idp.v0i34.387469
artikkel ajakirjas
14
artikkel kogumikus
Exercise Neptune : maritime cybersecurity training using the navigational simulators
Lovell, Kieren Nicolas
Proceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology
2019
/
p. 34-37
https://www.ester.ee/record=b5238490*est
artikkel kogumikus
15
artikkel kogumikus
Framework for industrial control systems digital forensics in the energy sector
Roberts, Andrew
Proceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology
2019
/
p. 24-26
https://www.ester.ee/record=b5238490*est
artikkel kogumikus
16
artikkel ajalehes
In search of a coherent international approach to governing technologies [online resource]
Osula, Anna-Maria
Digital frontiers
2021
In search of a coherent international approach to governing technologies
artikkel ajalehes
17
artikkel ajakirjas
La ciberseguridad en la era de hipercompetitividad: ¿puede la Union Europea afrontar los nuevos retos?
Munkøe, Malthe
;
Mölder, Holger
Revista CIDOB d'afers internacionals
2022
/
p. 69-94
https://doi.org/10.24241/rcai.2022.131.2.69
artikkel ajakirjas
18
artikkel kogumikus
Learning analytics perspective: evidencing learning from digital datasets in cybersecurity exercises
Maennel, Kaie
Proceedings 5th IEEE European Symposium on Security and Privacy Workshops EUROS&PW 2020 : 7-11 September 2020, VIrtual Event, Los Alamitos, California
2020
/
p. 27-36
https://doi.org/10.1109/EuroSPW51379.2020.00013
artikkel kogumikus
19
artikkel ajakirjas
Light weight tabletop exercise for cybersecurity education
Ottis, Rain
Journal of homeland security and emergency management
2014
/
p. 579-592
artikkel ajakirjas
20
artikkel kogumikus
Mental model mapping method for cybersecurity
Kullman, Kaur
;
Buchanan, Laurin
;
Komlodi, Anita
;
Engel, Don
HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : Proceedings
2020
/
p. 458-470
https://doi.org/10.1007/978-3-030-50309-3_30
artikkel kogumikus
21
artikkel kogumikus
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644–652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
artikkel kogumikus
22
artikkel kogumikus
Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulations
Mäses, Sten
;
Kikerpill, Kristjan
;
Jüristo, Kaspar
;
Maennel, Olaf Manuel
Abstracts of Papers Presented at the 18th European Conference on Research Methodology for Business and Management Studies : ECRM 2019, Hosted By Wits Business School Johannesburg, South Africa 20-21 June, 2019
2019
/
p. 30-31
"ECRM19"
artikkel kogumikus
23
artikkel ajakirjas
A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness
Ask, Torvald F.
;
Kullman, Kaur
;
Sütterlin, Stefan
;
Knox, Benjamin J.
;
Engel, Don
;
Lugo, Ricardo G.
Frontiers in Big Data
2023
/
art. 1042783, 21 p. : ill
http://doi.org/10.3389/fdata.2023.1042783
artikkel ajakirjas
24
artikkel ajakirjas
Modelling cyberspace to determine cybersecurity training requirements
Venables, Adrian
Frontiers in education
2021
/
art. 768037, 16 p. : ill
https://doi.org/10.3389/feduc.2021.768037
artikkel ajakirjas
25
artikkel kogumikus
Multi-purpose cyber environment for maritime sector
Visky, Gabor
;
Lavrenovs, Arturs
;
Orye, Erwin
;
Heering, Dan
;
Tam, Kimberly
Proceedings of the17th International Conference on Cyber Warfare and SecurityState University of New York at AlbanyAlbany, New York, USA 17-18 March 2022
2022
/
p. 349-257
https://doi.org/10.34190/iccws.17.1.26
artikkel kogumikus
Kirjeid leitud 42, kuvan
1 - 25
eelmine
1
2
järgmine
pealkiri
49
1.
A live virtual simulator for teaching cybersecurity to information technology students
2.
Advancing cybersecurity education through learning analytics = Küberkaitsealase hariduse parendamine õpianalüütika abil
3.
Assessing the role of international relations in cybersecurity : a preliminary analysis
4.
Combined safety and cybersecurity testing methodology for autonomous driving algorithms
5.
Culturally-sensitive cybersecurity awareness program design for Iranian high-school students
6.
Cyber game to cyber exercise : a new methodology for cybersecurity simulations
7.
CyberGenomics : application of behavioral genetics in cybersecurity
8.
Cybersecurity in the era of hypercompetitiveness : can the EU meet the new challenges?
9.
Cybersecurity in the making – policy and law: a case study of Georgia
10.
Cybersecurity knowledge requirements for strategic level decision makers
11.
Cybersecurity test range for autonomous vehicle shuttles
12.
Cybersecurity within the curricula of informatics : the Estonian perspective
13.
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
14.
EU cybersecurity and cyber diplomacy
15.
EU cybersecurity governance – stakeholders and normative intentions towards integration
16.
Evaluating cybersecurity-related competences through serious games
17.
Evaluating cybersecurity-related competences through simulation exercises = Küberturbe-alaste kompetentside hindamine simulatsiooniharjutuste abil
18.
Exercise Neptune : maritime cybersecurity training using the navigational simulators
19.
From simple scoring towards a meaningful interpretation of learning in cybersecurity exercises
20.
From text mining to evidence team learning in cybersecurity exercises
21.
Learning analytics perspective: evidencing learning from digital datasets in cybersecurity exercises
22.
Light weight tabletop exercise for cybersecurity education
23.
Mental model mapping method for cybersecurity
24.
Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulations
25.
Modelling cyberspace to determine cybersecurity training requirements
26.
National cybersecurity legislation : is there a magic formula?
27.
Operator impressions of 3D visualizations for cybersecurity analysts
28.
Pedagogical challenges and ethical considerations in developing critical thinking in cybersecurity
29.
Remote technical labs : an innovative and scalable component for university cybersecurity program admission
30.
Routledge handbook of international cybersecurity
31.
Shortcomings in cybersecurity education for seafarers
32.
Stenmap : framework for evaluating cybersecurity-related skills based on computer simulations
33.
Success factors for designing a cybersecurity exercise on the example of incident response
34.
Team learning in cybersecurity exercises
35.
The role of defence in national cybersecurity get access arrow
36.
Towards a healthcare cybersecurity certification scheme
37.
Towards conceptualizing EU cybersecurity law : Discussion paper ; C 253
38.
Towards pollution-control in cyberspace : problem structure and institutional design in international cybersecurity
39.
Training young cybersecurity talents – The case of Estonia
40.
"Trust me, you will need it" : cybersecurity as extracurricular subject at Estonian schools
41.
Using competency mapping for skills assessment in an introductory cybersecurity course
42.
Using technical cybersecurity exercises in university admissions and skill evaluation
43.
What do we talk about when we talk about international cybersecurity
44.
Legal aspects of cybersecurity in emerging technologies : smart grids and big data : European answers to security breaches and "common" cyber crime
45.
Lizards in the street! Introducing cybersecurity awareness in a digital literacy context
46.
Strategically normative. Norms and principles in national cybersecurity strategies
47.
The EU's cybersecurity : a strategic narrative of a cyber power or a confusing policy for a local common market?
48.
The role of the UN Security Council in cybersecurity : International peace and security in the digital age
49.
Trends and challenges for balanced scoring in cybersecurity exercises : a case study on the example of Locked Shields
võtmesõna
16
1.
automotive cybersecurity
2.
cybersecurity
3.
cybersecurity awareness
4.
cybersecurity education
5.
cybersecurity exercises
6.
cybersecurity governance
7.
cybersecurity in shipping
8.
cybersecurity incident response
9.
cybersecurity knowledge requirements
10.
cybersecurity law
11.
cybersecurity simulations
12.
cybersecurity test bed
13.
cybersecurity testing
14.
cybersecurity training
15.
human factor of cybersecurity
16.
organising cybersecurity exercises
allikas
10
1.
Advances in Human Factors in Cybersecurity : proceedings of the AHFE 2018 : International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida
2.
Cybersecurity Best Practices : Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden
3.
Cybersecurity Law Casebook 2020
4.
Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives
5.
EICC '22: Proceedings of the 2022 European Interdisciplinary Cybersecurity Conference
6.
European Cybersecurity Journal
7.
Routledge handbook of international cybersecurity
8.
So Far, Yet So Close : Japanese and Estonian cybersecurity : policy perspectives and cooperations : report
9.
HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : Proceedings
10.
HCI for Cybersecurity, Privacy and Trust : Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021 : proceedings
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT