Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber kill chain (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/169)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
A case study about the use and evaluation of cyber deceptive methods against highly targeted attacks
Farar, Alexandria Elaine
;
Bahsi, Hayretdin
;
Blumbergs, Bernhards
2017 International Conference On Cyber Incident Response, Coordination, Containment and Control, Cyber Incident 2017 : London, United Kingdom, 19 June 2017 through 20 June 2017
2017
/
[7] p. : ill
https://doi.org/10.1109/CYBERINCIDENT.2017.8054640
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
165
1.
cyber kill chain
2.
alkyl chain-length
3.
alkyl ester chain length
4.
ascending chain condition
5.
block chain
6.
block-chain
7.
chain model
8.
chain of check points
9.
chain of key factors (KFs)
10.
Chain restaurants
11.
concept chain
12.
Continuous Time Markov Chain
13.
demand & supply chain management
14.
digital supply chain
15.
global value chain
16.
green supply chain management
17.
legume supply chain
18.
Logistics and supply chain management
19.
long chain fatty acid (LCFA) inhibition
20.
Markov chain
21.
Markov chain process
22.
multi-chain blockchains
23.
oil shale value chain
24.
on/off-chain data storages
25.
receiver chain
26.
reconfigurable scan-chain
27.
respiratory chain
28.
reverse transcription polymerase chain reaction
29.
risk event chain analyses
30.
road construction supply chain
31.
service supply chain
32.
services value chain collaboration
33.
short chain branching (SCB)
34.
short chain fatty acids
35.
short chain fatty acids (SCFA)
36.
short-chain fatty acids
37.
supplay chain
38.
supply chain
39.
supply chain (SC)
40.
Supply chain adaptability
41.
supply chain competences
42.
supply chain curricula
43.
supply chain engineering
44.
supply chain integration
45.
supply chain management
46.
supply chain model framework
47.
supply chain operations reference (SCOR)
48.
supply chain operations reference (SCOR) model
49.
supply chain planning
50.
supply chain risk
51.
supply chain risk management
52.
supply chain simulation
53.
supply chain skills
54.
supply chain traceability
55.
sustainable supply chain management
56.
sustainalble supply chain management
57.
teaching supply chain management
58.
transmit chain
59.
transparent supply chain
60.
trophic chain
61.
value adding REE chain
62.
value chain
63.
automated cyber defense
64.
autonomous vehicle cyber range
65.
cloud-based cyber-physical systems (C2PS)
66.
cognitive cyber warfare
67.
cyber
68.
Cyber “Maastricht”
69.
cyber architecture
70.
cyber attacks
71.
cyber battle damage assessment
72.
Cyber Bio-analytical Physical Systems (CBPSs)
73.
cyber challenge
74.
cyber command
75.
Cyber Command organisational structure
76.
cyber conflict
77.
cyber contingency
78.
cyber crime
79.
cyber crime pathways
80.
cyber crime scripting
81.
Cyber crisis management
82.
cyber defence
83.
cyber defence exercise
84.
cyber defence exercises
85.
cyber defense education
86.
cyber defense exercise
87.
cyber defense exercises
88.
cyber dependence
89.
cyber diplomacy
90.
cyber exercise
91.
cyber hygiene
92.
cyber impact assessment
93.
cyber incidents
94.
cyber insurance
95.
cyber intrusion detection
96.
cyber operation
97.
cyber operation officer
98.
cyber operations
99.
cyber operations exercises
100.
cyber physical energy systems
101.
cyber physical power system (CPPS)
102.
Cyber Physical Production System
103.
cyber physical production systems (CPPS)
104.
cyber physical social system
105.
cyber physical social systems (cpss)
106.
cyber physical system
107.
Cyber Planning tool
108.
cyber power Europe
109.
cyber ranges
110.
cyber red teaming
111.
cyber resilience
112.
cyber resilience at sea
113.
cyber risk
114.
cyber risk management in shipping
115.
cyber security
116.
cyber security education
117.
cyber security exercises
118.
cyber security monitoring
119.
cyber security monitoring in maritime
120.
cyber security strategies
121.
cyber situational awareness
122.
cyber stability
123.
cyber team communication
124.
cyber threat
125.
cyber threat communication
126.
Cyber Threat Intelligence
127.
cyber threats
128.
cyber war
129.
cyber warfare
130.
cyber warriors
131.
cyber weapons
132.
cyber-attack
133.
cyber-attack pathways
134.
Cyber-attacks
135.
cyber-insurance
136.
cyber-paternalism
137.
cyber-physical energy systems
138.
cyber-physical social system (CPSS)
139.
cyber-physical system
140.
Cyber-Physical System (CPS)
141.
cyber-physical system logistic robot
142.
cyber-physical system security
143.
cyber-physical systems
144.
Cyber-Physical Systems (CPS)
145.
cyber-risks
146.
cyber-security
147.
cyber-space nexus
148.
cyber-vulnerabilities
149.
Defensive Cyber Operations
150.
EU cyber policy
151.
international cyber norms
152.
maritime cyber security
153.
maritime cyber security operations centers
154.
military cyber
155.
mobile cyber-physical system
156.
national cyber security strategy
157.
NATO cyber operations definitions
158.
NATO Cyber Range
159.
Offensive Cyber Operations
160.
perceived cyber risks and threats
161.
responsive cyber defence
162.
Socio-Cyber-Physical Systems
163.
space cyber range
164.
technical cyber exercise
165.
Visualising Cyber Planning
märksõna
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT