Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
15
Vaata veel..
(2/151)
Ekspordi
ekspordi kõik päringu tulemused
(15)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
A live virtual simulator for teaching cybersecurity to information technology students
Ernits, Margus
;
Kikkas, Kaido
Learning and Collaboration Technologies : Third International Conference, LCT 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings
2016
/
p. 474-486 : ill
http://dx.doi.org/10.1007/978-3-319-39483-1_43
artikkel kogumikus
2
artikkel ajakirjas
Anomaly detection and classification in power system state estimation: Combining model-based and data-driven methods
Asefi, Sajjad
;
Mitrovic, Mile
;
Ćetenović, Dragan
;
Levi, Victor
;
Gryazina, Elena
;
Terzija, Vladimir
Sustainable energy, grids and networks
2023
/
art. 101116
https://doi.org/10.1016/j.segan.2023.101116
artikkel ajakirjas
3
artikkel kogumikus
Building cyber resilience : the defensive shield for the EU
Osula, Anna-Maria
Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives
2022
/
p. 179-196
https://doi.org/10.1007/978-3-031-08384-6_9
artikkel kogumikus
4
artikkel kogumikus
Capability detection and evaluation metrics for cyber security lab exercises
Caliskan, Emin
;
Tatar, Unal
;
Bahsi, Hayretdin
;
Ottis, Rain
;
Vaarandi, Risto
Proceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 2017
2017
/
p. 407-414 : ill
https://www.scopus.com/record/display.uri?eid=2-s2.0-85018944652&origin=inward&txGid=dad813d957372581ca0932bf6e4fb5d8
artikkel kogumikus
5
artikkel kogumikus
Cyber attacks on power system automation and protection and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Presekal, Alfan
;
Palensky, Peter
Proceedings of 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 26-28 October, 2020
2020
/
p. 247–254
https://doi.org/10.1109/ISGT-Europe47291.2020.9248840
artikkel kogumikus
6
artikkel kogumikus
Cyber attacks on protective relays in digital substations and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Palensky, Peter
8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems(MSCPES), Virtual Workshop, online, from April 21, 2020 : proceedings
2020
/
6 p. : ill
https://doi.org/10.1109/MSCPES49613.2020.9133698
artikkel kogumikus
7
artikkel kogumikus
Cyber commands - universal solution to a universal cyber security problem?
Alatalu, Siim
Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018
2018
/
p. 21-22
https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
artikkel kogumikus
8
artikkel kogumikus
Educational computer game for cyber security : game concept [Online resource]
Sõmer, Tiia
Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology
2015
/
p. 17-19
http://cybercentre.cs.ttu.ee/en/icr2015/
artikkel kogumikus
9
artikkel ajakirjas
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
http://dx.doi.org/10.12716/1001.14.02.01
artikkel ajakirjas
10
artikkel ajakirjas
EU Common position on international law and cyberspace
Osula, Anna-Maria
;
Kasper, Agnes
;
Kajander, Aleksi Oskar Johannes
Masaryk University journal of law and technology
2022
/
p. 89–123
https://doi.org/10.5817/MUJLT2022-1-4
artikkel ajakirjas
11
artikkel kogumikus
How to build a SOC on a budget
Vaarandi, Risto
;
Mäses, Sten
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
2022
/
p. 171-177 : ill
https://doi.org/10.1109/CSR54599.2022.9850281
artikkel kogumikus
12
artikkel ajakirjas
The Main challenges and barriers to the successful "Smart Shipping"
Alop, Anatoli
TransNav: International Journal on Marine Navigation and Safety of Sea Transportation
2019
/
p. 521-528
http://dx.doi.org/10.12716/1001.13.03.05
artikkel ajakirjas
13
artikkel ajakirjas
The regulatory intersections between artificial intelligence, data protection and cyber security : challenges and opportunities for the EU legal framework
Andraško, Jozef
;
Mesarčík, Matúš
;
Hamulak, Ondrej
AI & Society
2021
/
p. 623–636
https://doi.org/10.1007/s00146-020-01125-5
artikkel ajakirjas
14
artikkel kogumikus
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
artikkel kogumikus
15
artikkel kogumikus
Variable self-efficacy as a measurement for behaviors in cyber security operations
Lugo, Ricardo G.
;
Knox, Benjamin J.
;
Josok, Oyvind
;
Sütterlin, Stefan
Augmented Cognition. Human Cognition and Behavior : 14th International Conference, AC 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings, Part II
2020
/
p. 395-404
https://doi.org/10.1007/978-3-030-50439-7_27
artikkel kogumikus
Kirjeid leitud 15, kuvan
1 - 15
võtmesõna
147
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security strategies
5.
cyber-security
6.
national cyber security strategy
7.
autonomous vehicle cyber range
8.
cloud-based cyber-physical systems (C2PS)
9.
cyber
10.
Cyber “Maastricht”
11.
cyber attacks
12.
cyber battle damage assessment
13.
Cyber Bio-analytical Physical Systems (CBPSs)
14.
cyber challenge
15.
cyber command
16.
cyber conflict
17.
cyber contingency
18.
cyber crime
19.
cyber crime pathways
20.
cyber crime scripting
21.
Cyber crisis management
22.
cyber defence
23.
cyber defence exercise
24.
cyber defence exercises
25.
cyber defense exercise
26.
cyber defense exercises
27.
cyber dependence
28.
cyber diplomacy
29.
cyber exercise
30.
cyber hygiene
31.
cyber impact assessment
32.
cyber incidents
33.
cyber insurance
34.
cyber kill chain
35.
cyber operation
36.
cyber operations
37.
cyber physical energy systems
38.
cyber physical power system (CPPS)
39.
Cyber Physical Production System
40.
cyber physical production systems (CPPS)
41.
cyber physical system
42.
cyber power Europe
43.
cyber ranges
44.
cyber red teaming
45.
cyber resilience
46.
cyber risk
47.
cyber situational awareness
48.
cyber stability
49.
cyber team communication
50.
cyber threat
51.
cyber threats
52.
cyber war
53.
cyber warfare
54.
cyber warriors
55.
cyber weapons
56.
cyber-attack
57.
cyber-attack pathways
58.
cyber-insurance
59.
cyber-paternalism
60.
cyber-physical energy systems
61.
cyber-physical social system (CPSS)
62.
cyber-physical system
63.
Cyber-Physical System (CPS)
64.
cyber-physical system logistic robot
65.
cyber-physical systems
66.
Cyber-Physical Systems (CPS)
67.
EU cyber policy
68.
international cyber norms
69.
military cyber
70.
NATO Cyber Range
71.
responsive cyber defence
72.
Socio-Cyber-Physical Systems
73.
technical cyber exercise
74.
ad-hoc sensor networks security
75.
Blockchain security
76.
cache security
77.
communication system security
78.
comprehensive system of economic security
79.
computer security
80.
cooperative security dilemma
81.
data security
82.
drinking water security
83.
economic security
84.
economic security of enterprise
85.
energy security
86.
energy security indicator
87.
graded security
88.
hardware security
89.
hardware security primitive
90.
human security
91.
information security
92.
internal security
93.
international security
94.
investment and innovation security
95.
IPv6 security
96.
IT security
97.
job security
98.
long-term security
99.
metadata model for security measures
100.
Middle Eastern security
101.
Mobile security
102.
national security
103.
NATO. Science for Peace and Security Program
104.
network security
105.
network security monitoring
106.
OSCE (Organization for Security and Co-operation in Europe)
107.
passenger’s security
108.
policy-based routing security
109.
post-quantum security
110.
power system security
111.
quantitative security
112.
regional security
113.
security
114.
security and privacy
115.
security and privacy in smart grids
116.
security closure
117.
Security Coverage
118.
security dataset
119.
security dilemma
120.
Security evaluation
121.
security log analysis
122.
security management
123.
security model
124.
security monitoring
125.
security notion
126.
security objectives
127.
security of data
128.
security of supply
129.
security operation center
130.
security patterns
131.
security problem definition
132.
security proof
133.
security protocols
134.
security requirements
135.
security requirements engineering
136.
security risk assessment
137.
security risk management
138.
security strategies
139.
security testing
140.
security training
141.
security verification
142.
societal security
143.
system of economic security
144.
system security
145.
terrorism security
146.
transmission System Security
147.
voting privacy and security
märksõna
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
National Computer Security Incident Response Teams (N-CSIRTs)
4.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT