Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber kill chain (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/162)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
A case study about the use and evaluation of cyber deceptive methods against highly targeted attacks
Farar, Alexandria Elaine
;
Bahsi, Hayretdin
;
Blumbergs, Bernhards
2017 International Conference On Cyber Incident Response, Coordination, Containment and Control, Cyber Incident 2017 : London, United Kingdom, 19 June 2017 through 20 June 2017
2017
/
[7] p. : ill
https://doi.org/10.1109/CYBERINCIDENT.2017.8054640
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
158
1.
cyber kill chain
2.
alkyl ester chain length
3.
ascending chain condition
4.
block chain
5.
block-chain
6.
chain model
7.
chain of check points
8.
chain of key factors (KFs)
9.
concept chain
10.
Continuous Time Markov Chain
11.
demand & supply chain management
12.
digital supply chain
13.
global value chain
14.
green supply chain management
15.
legume supply chain
16.
Logistics and supply chain management
17.
long chain fatty acid (LCFA) inhibition
18.
Markov chain
19.
Markov chain process
20.
multi-chain blockchains
21.
oil shale value chain
22.
receiver chain
23.
reconfigurable scan-chain
24.
respiratory chain
25.
reverse transcription polymerase chain reaction
26.
risk event chain analyses
27.
road construction supply chain
28.
service supply chain
29.
services value chain collaboration
30.
short chain branching (SCB)
31.
short chain fatty acids
32.
short chain fatty acids (SCFA)
33.
short-chain fatty acids
34.
supplay chain
35.
supply chain
36.
supply chain (SC)
37.
supply chain competences
38.
supply chain curricula
39.
supply chain engineering
40.
supply chain integration
41.
supply chain management
42.
supply chain model framework
43.
supply chain operations reference (SCOR)
44.
supply chain operations reference (SCOR) model
45.
supply chain planning
46.
supply chain risk
47.
supply chain risk management
48.
supply chain simulation
49.
supply chain skills
50.
supply chain traceability
51.
sustainable supply chain management
52.
sustainalble supply chain management
53.
teaching supply chain management
54.
transmit chain
55.
transparent supply chain
56.
trophic chain
57.
value adding REE chain
58.
value chain
59.
autonomous vehicle cyber range
60.
cloud-based cyber-physical systems (C2PS)
61.
cognitive cyber warfare
62.
cyber
63.
Cyber “Maastricht”
64.
cyber architecture
65.
cyber attacks
66.
cyber battle damage assessment
67.
Cyber Bio-analytical Physical Systems (CBPSs)
68.
cyber challenge
69.
cyber command
70.
Cyber Command organisational structure
71.
cyber conflict
72.
cyber contingency
73.
cyber crime
74.
cyber crime pathways
75.
cyber crime scripting
76.
Cyber crisis management
77.
cyber defence
78.
cyber defence exercise
79.
cyber defence exercises
80.
cyber defense education
81.
cyber defense exercise
82.
cyber defense exercises
83.
cyber dependence
84.
cyber diplomacy
85.
cyber exercise
86.
cyber hygiene
87.
cyber impact assessment
88.
cyber incidents
89.
cyber insurance
90.
cyber intrusion detection
91.
cyber operation
92.
cyber operation officer
93.
cyber operations
94.
cyber operations exercises
95.
cyber physical energy systems
96.
cyber physical power system (CPPS)
97.
Cyber Physical Production System
98.
cyber physical production systems (CPPS)
99.
cyber physical social system
100.
cyber physical social systems (cpss)
101.
cyber physical system
102.
Cyber Planning tool
103.
cyber power Europe
104.
cyber ranges
105.
cyber red teaming
106.
cyber resilience
107.
cyber resilience at sea
108.
cyber risk
109.
cyber risk management in shipping
110.
cyber security
111.
cyber security education
112.
cyber security exercises
113.
cyber security monitoring
114.
cyber security strategies
115.
cyber situational awareness
116.
cyber stability
117.
cyber team communication
118.
cyber threat
119.
cyber threat communication
120.
Cyber Threat Intelligence
121.
cyber threats
122.
cyber war
123.
cyber warfare
124.
cyber warriors
125.
cyber weapons
126.
cyber-attack
127.
cyber-attack pathways
128.
Cyber-attacks
129.
cyber-insurance
130.
cyber-paternalism
131.
cyber-physical energy systems
132.
cyber-physical social system (CPSS)
133.
cyber-physical system
134.
Cyber-Physical System (CPS)
135.
cyber-physical system logistic robot
136.
cyber-physical systems
137.
Cyber-Physical Systems (CPS)
138.
cyber-risks
139.
cyber-security
140.
cyber-space nexus
141.
cyber-vulnerabilities
142.
Defensive Cyber Operations
143.
EU cyber policy
144.
international cyber norms
145.
maritime cyber security
146.
maritime cyber security operations centers
147.
military cyber
148.
mobile cyber-physical system
149.
national cyber security strategy
150.
NATO cyber operations definitions
151.
NATO Cyber Range
152.
Offensive Cyber Operations
153.
perceived cyber risks and threats
154.
responsive cyber defence
155.
Socio-Cyber-Physical Systems
156.
space cyber range
157.
technical cyber exercise
158.
Visualising Cyber Planning
märksõna
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT