Toggle navigation
Otsi
Publikatsioonid
Profiilid
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber operations (võtmesõna)
Kõikidelt väljadelt
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
Tühista
teaviku laadid
raamat
artikkel ajakirjas
artikkel ajalehes
artikkel kogumikus
dissertatsioon
Open Access
Teaduspublikatsioon
aasta
Kirjeid leitud
2
Vaata veel..
(6/293)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Cyber operations during the conflict in Ukraine and the role of international law
Valuch, Josef
;
Hamulak, Ondrej
The use of force against Ukraine and international law : jus ad bellum, jus in bello, jus post bellum
2018
/
p. 215-235
https://doi.org/10.1007/978-94-6265-222-4_10
artikkel kogumikus
2
artikkel ajakirjas
Modelling cyberspace to determine cybersecurity training requirements
Venables, Adrian
Frontiers in education
2021
/
art. 768037, 16 p. : ill
https://doi.org/10.3389/feduc.2021.768037
artikkel ajakirjas
Kirjeid leitud 2, kuvan
1 - 2
pealkiri
144
1.
Automating defences against cyber operations in computer networks = Arvutivõrkude kaitse automatiseerimine küberoperatsioonide vastu
2.
Cyber operations during the conflict in Ukraine and the role of international law
3.
Offensive cyber operations exercise kicks off in Estonia [Online resource]
4.
VR/MR supporting the future of defensive cyber operations
5.
Remote exploit development for cyber red team computer network operations targeting industrial control systems
6.
Specialized cyber red team responsive computer network operations = Vastutegevusele orienteeritud punase meeskonna küberoperatsioonid
7.
Variable self-efficacy as a measurement for behaviors in cyber security operations
8.
Planning cyberspace operations: Exercise crossed swords case study
9.
Cyber commands - a universal solution to a universal cyber security challenge?
10.
Cyber commands - universal solution to a universal cyber security problem?
11.
Cyber contingencies impacts analysis in cyber physical power system
12.
Cyber game to cyber exercise : a new methodology for cybersecurity simulations
13.
Adhesive wear resistance of hard metals and their durability in metal forming operations
14.
Advanced hard metal grades and technologies improving their durability in blanking operations
15.
Application of Leddar to optimize image processing operations
16.
Dodek, W. A.; Trokhimenko, V. S. Menger algebras of idempotent n-ary operations : [review]
17.
European Union strategy and capabilities to Counter Hostile Influence Operations
18.
Fast RTL fault simulation using decision diagrams and bitwise set operations
19.
Finite element simulation of metal cutting operations
20.
Hard metals serviceability in sheet metal forming operations
21.
Implementation of parallel operations over streams in extensible processing platforms
22.
Linking active transactional leadership and safety performance in military operations
23.
Multiplicative reasoning and operations with rational numbers in grades 5 to 7
24.
Operations with rational numbers in grades 5 to 7
25.
Russian information operations against the Ukrainian State and defence forces : April-December 2014 in online news
26.
Structure sensitivity of hard metals and their durability in metal forming operations
27.
Targeting conditional operations in sequential test pattern generation
28.
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
29.
Toughness of hardmetals and their durability in metalforming operations
30.
Unsupervised learning of well drilling operations : fuzzy rule-based approach
31.
A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness
32.
Gaps in European Cyber Education and Professional Training WG5 I Education : training, awareness, cyber ranges [Online resource]
33.
A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness
34.
Strategic cyber security : evaluating nation-state cyber attack mitigation strategies with DEMATEL = Strateegiline küberjulgeolek : küberrünnaku leevendamise strateegiate hindamine riiklikul tasandil : DEMATEL-i meetod
35.
Visualising cyber crime based on the E-Crime Project : mapping the journeys of cyber criminals [Online resource]
36.
A comparative framework for cyber threat modelling : case of healthcare and industrial control systems
37.
A conceptual nationwide cyber situational awareness framework for critical infrastructures
38.
A cyber red team oriented technical exercise
39.
A systematic approach to offensive volunteer cyber militia
40.
Advanced technical education in the age of cyber physical systems
41.
Alliance attribution of global cyber attacks : The European Union
42.
Analysis of national cyber situational awareness practices
43.
Are the current system engineering practices sufficient to meet cyber crime?
44.
Artificial intelligence in cyber defence
45.
Artificial intelligence within the military domain and cyber warfare
46.
Autonomous cyber defence capabilities
47.
Building an ontology for cyber defence exercises
48.
Building cyber resilience : the defensive shield for the EU
49.
Capability detection and evaluation metrics for cyber security lab exercises
50.
Career development in cyber security: Bootcamp training programs
51.
case study about the use and evaluation of cyber deceptive methods against highly targeted attacks
52.
Civil defence and cyber security: A contemporary European perspective
53.
Command and control of cyber weapons
54.
Crossed swords : a cyber red team oriented technical exercise
55.
cyber attack taxonomy for microgrid systems
56.
Cyber attacks on power system automation and protection and impact analysis
57.
Cyber attacks on protective relays in digital substations and impact analysis
58.
Cyber hygiene : the big picture
59.
Cyber incident management in low-income countries
60.
Cyber security and intellectual copyright
61.
Cyber security exercises : a comparison of participant evaluation metrics and scoring systems
62.
Cyber Security Risk Analysis for a Virtual Assistant G2C Digital Service Using FAIR Model
63.
Cyber warfare
64.
Cyber-physical control system for autonomous logistic robot
65.
Cyber-physical microgrids : toward flexible energy districts
66.
Cyber-physical universal safety and crash detection system for autonomous robot
67.
CyberPin - Challenges on recognizing youngest cyber talents
68.
Design and implementation of an availability scoring system for cyber defence exercises
69.
Design and verification of Cyber-Physical Systems using TrueTime, evolutionary optimization and UPPAAL
70.
Design of Cyber Bio-analytical Physical Systems : formal methods, architectures, and multi-system interaction strategies
71.
Designing reliable cyber-physical systems
72.
Designing reliable cyber-physical systems : overview associated to the special session at FDL'16
73.
Developing military cyber workforce in a conscript armed forces : recruitment, challenges and options
74.
Development of children's cyber security competencies in Estonia
75.
Development of cyber-physical production systems based on modelling technologies
76.
Distributed signal processing for situation assessment in cyber-physical systems = Hajutatud signaalitöötlus olukorra hindamiseks küberfüüüsikalistes süsteemides
77.
Domain engineering for cyber defense: a case study and implications
78.
Educational computer game for cyber security : game concept [Online resource]
79.
Enhancing cyber defense situational awareness using 3D visualizations
80.
Establishing cyber sovereignty - Russia follows China's example [Online resource]
81.
Estonia’s cyber defence league : a model for the United States?
82.
EU cybersecurity and cyber diplomacy
83.
Feasibility of a multi-tier cyber physical system as a self-aware entity
84.
Finland wins cyber defence exercise Locked Shields 2022 [Online resource]
85.
Formal methods based security for cloud-based manufacturing cyber physical system
86.
14th International Conference on Cyber Conflict : Keep Moving
87.
Frankenstack: real-time cyberattack detection and feedback system for technical cyber exercises
88.
Generating situation awareness in cyber-physical systems : creation and exchange of situational information
89.
Governance of cyber-security in Internet-based elections [Online resource]
90.
Hyperspectral camera with polarized filter as modern supersensor device for cyber-physical systems [Online resource]
91.
Impact assessment of cyber actions on missions or business processes : a systematic literature review
92.
Improving and measuring learning effectiveness at cyber defense exercises
93.
Improving learning efficiency and evaluation fairness for cyber security courses : a case study
94.
Integrated modelling, fault management, verification and reliable design environment for cyber-physical systems
95.
International cyber norms : legal, policy & industry perspectives
96.
i-tee : a fully automated cyber defense competition for students
97.
Making the Cyber Mercenary - Autonomous Weapons Systems and Common Article 1 of the Geneva Conventions
98.
Maritime cyber-insurance : the Norwegian case
99.
Maritime cyber-insurance: the Norwegian case
100.
Methodology for modelling financially motivated cyber crime
101.
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
102.
MPM4CPS : Multi-Paradigm Modelling for Cyber-Physical Systems
103.
Multi-layer cyber-physical control method for mobile robot safety systems
104.
Multi-layer cyber-physical low-level control solution for mobile robots
105.
Multi-purpose cyber environment for maritime sector
106.
On the relationship between health sectors' digitalization and sustainable health goals: A cyber security perspective
107.
Ontologies and other types of semanticware - assets to protect, or instruments to use Cyber Warfare?
108.
Overview of cyber-physical control systems for self-driving vehicles
109.
Parabasis : Cyber-diplomacy in Stalemate
110.
Proceedings of the 2nd Interdisciplinary Cyber Research Workshop 2016 [Online resource]
111.
Proceedings of the 3rd Interdisciplinary Cyber Research Workshop 2017 : 8th of July 2017 [Online resource]
112.
Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018 [Online resource]
113.
Recommendations for enhancing the results of cyber effects
114.
RIA: September's 190 cyber attacks highest monthly total this year so far [Võrguväljaanne]
115.
Self-aware cyber-physical systems
116.
Service measurement map for large-scale cyber defense exercises
117.
Smart cyber-physical system for pattern recognition of illegal 3D designs in 3D printing
118.
Smart cyber-physical system for personal manufacturing = Tark küberfüüsikaline süsteem personaalseks tootmiseks
119.
Software technology for cyber security simulations = Tarkvaratehnika küberturbe simulatsioonide jaoks
120.
Standing Committee on Cyber Security
121.
Strategic cyber security
122.
Taxonomies of cybercrime : an overview and proposal to be used in mapping cyber criminal journeys
123.
The becoming of cyber-military capabilities
124.
The cyber-insurance market in Norway
125.
The fragmented securitization of cyber threats
126.
The invisible front : a cyber resilience perspective
127.
The politics of stability: cement and change in cyber affairs
128.
Threat modeling of cyber-physical systems - a case study of a microgrid system
129.
Time for cyber Maastricht? [Online resource]
130.
Towards a Cyber Maastricht : two steps forward, one step back
131.
2011 : 3rd International Conference on Cyber Conflict : 7-10 June 2011, Tallinn, Estonia : proceedings
132.
Utilising journey mapping and crime scripting to combat cyber crime
133.
Utilising journey mapping and crime scripting to combat cybercrime and cyber warfare attacks
134.
В Тарту прошел финал соревнований по кибербезопасности Cyber Battle of Estonia [Online resource]
135.
14th International Conference on Cyber Conflict : Keep Moving
136.
2011 : 3rd International Conference on Cyber Conflict : 7-10 June 2011, Tallinn, Estonia : proceedings
137.
2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia
138.
2019 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia
139.
Cultural, peace and conflict studies series. Vol. 6, The crisis in Ukraine and information operations of the Russian Federation
140.
Data processing. Vocabulary. Part 2, Arithmetic and logic operations
141.
High resolution TSM mapping of dredging operations using automated UAV activated by online in situ measurements : proof on concept
142.
Information warfare as the Hobbesian concept of modern times - the principles, techniques, and tools of Russian information operations in the Donbass
143.
Invisible battlegrounds in the 21st century : psychological warfare, influence operations and their impact on NATO's future from the Baltic perspective
144.
Smooth coordination and management of impact of EstLink 2 transmission testing on electricity markets, power system operations and system technical performance
võtmesõna
81
1.
cyber operations
2.
cyberspace operations planning
3.
algebraic operations
4.
Clean port operations
5.
commercial operations
6.
computer network operations
7.
influence operations
8.
operations research
9.
supply chain operations reference (SCOR) model
10.
Sweedler operations
11.
term operations
12.
autonomous vehicle cyber range
13.
cloud-based cyber-physical systems (C2PS)
14.
cyber
15.
Cyber “Maastricht”
16.
cyber attacks
17.
cyber battle damage assessment
18.
Cyber Bio-analytical Physical Systems (CBPSs)
19.
cyber challenge
20.
cyber command
21.
cyber conflict
22.
cyber contingency
23.
cyber crime
24.
cyber crime pathways
25.
cyber crime scripting
26.
Cyber crisis management
27.
cyber defence
28.
cyber defence exercise
29.
cyber defence exercises
30.
cyber defense exercises
31.
cyber dependence
32.
cyber diplomacy
33.
cyber exercise
34.
cyber hygiene
35.
cyber impact assessment
36.
cyber incidents
37.
cyber insurance
38.
cyber kill chain
39.
cyber operation
40.
cyber physical energy systems
41.
cyber physical power system (CPPS)
42.
Cyber Physical Production System
43.
cyber physical production systems (CPPS)
44.
cyber physical system
45.
cyber power Europe
46.
cyber ranges
47.
cyber red teaming
48.
cyber resilience
49.
cyber risk
50.
cyber security
51.
cyber security education
52.
cyber security exercises
53.
cyber security strategies
54.
cyber situational awareness
55.
cyber stability
56.
cyber team communication
57.
cyber threat
58.
cyber threats
59.
cyber war
60.
cyber warfare
61.
cyber warriors
62.
cyber weapons
63.
cyber-attack
64.
cyber-attack pathways
65.
cyber-insurance
66.
cyber-paternalism
67.
cyber-physical energy systems
68.
cyber-physical social system (CPSS)
69.
cyber-physical system
70.
Cyber-Physical System (CPS)
71.
cyber-physical system logistic robot
72.
cyber-physical systems
73.
Cyber-Physical Systems (CPS)
74.
cyber-security
75.
EU cyber policy
76.
international cyber norms
77.
military cyber
78.
NATO Cyber Range
79.
responsive cyber defence
80.
Socio-Cyber-Physical Systems
81.
technical cyber exercise
allikas
56
1.
Network operations and management symposium : cognitive mangement in a cyber world, 23-27 april 2018, Taipei, Taiwan
2.
2016 : 8th International Conference on Cyber Conflict : Cyber Power : 31 May-3 June 2016, Tallinn, Estonia
3.
2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
4.
Advanced manufacturing technology : programming research and operations logistics ; [Fourth International IFIP/IFAC Conference on Programming Research and Operations Logistics in Advanced Manufacturing Technology, PROLAM
5.
Operations Research Proceedings 2015 : selected papers of the International Conference of the German, Austrian and Swiss Operations Research Societies (GOR, ÖGOR, SVOR/ASRO), University of Vienna, Austria, September 1-4,
6.
International Conference on Operations Research, Berlin, August 30-September 2, 1994 : program and abstracts
7.
International Journal of Operations & Production Management
8.
Journal of Global Operations and Strategic Sourcing
9.
Proceedings of the Conference on Operations Research OR98, 31 August-03 September 1998, Zürich
10.
Russian information operations against Ukrainian armed forces and Ukrainian countermeasures (2014-2015)
11.
Selected papers of the Symposium on Operations Research (SOR96) , Braunschweig
12.
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
13.
11th International Conference on Operations Research : La Habana, March 11th-14th, 2014
14.
14th International Conference on Operations Research (ICOR), March 3-6, 2020, Havana, Cuba
15.
2017 International Conference On Cyber Incident Response, Coordination, Containment and Control, Cyber Incident 2017 : London, United Kingdom, 19 June 2017 through 20 June 2017
16.
ACM transactions on cyber-physical systems
17.
Autonomous cyber capabilities under international law
18.
Computational intelligence for decision support in cyber-physical systems
19.
Conference on Cyber Conflict : proceedings 2010
20.
Conference on Cyber Warfare : June 17-19, 2009, Tallinn, Estonia
21.
Cyber Defence Situation Awareness : STO-MP-IST-148
22.
Cyber science 2018 : conference programme
23.
Cyber security : analytics, technology and automation
24.
Cyber Security for Microgrids
25.
Directions : Cyber Digital Europe
26.
International cyber norms : legal, policy & industry perspectives
27.
National cyber emergencies: the return to civil defence
28.
Proceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 2017
29.
Proceedings of the 2nd Interdisciplinary Cyber Research Workshop 2016
30.
Proceedings of the 3rd Interdisciplinary Cyber Research Workshop 2017 : 8th of July 2017
31.
Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018
32.
Strategic cyber defense : a multidisciplinary perspective
33.
The Oxford handbook of cyber security
34.
14th International Conference on Cyber Conflict : Keep Moving
35.
16th International Conference on Cyber Warfare and Security (ICCWS 2021) : Online, 25 - 26 February 2021
36.
2011 : 3rd International Conference on Cyber Conflict : 7-10 June 2011, Tallinn, Estonia : proceedings
37.
2012 4th International Conference on Cyber Conflict : 5-8 June 2012, Tallinn, Estonia : proceedings
38.
2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia
39.
2020 12th International Conference on Cyber Conflict : 20/20 vision : the next decade
40.
2021 13th International Conference on Cyber Conflict : Going viral
41.
2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
42.
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
43.
5th International Conference on Cyber Conflict : 4-7 June 2013, Tallinn, Estonia : proceedings
44.
Advances in CAD/CAM : proceedings of the 5th International IFIP/IFAC Conference on Programming Research and Operations Logistics in Advanced Manufacturing Technology ; PROLAMAT 82 , Leningrad, USSR, 16 - 18 May, 1982
45.
Cultural, peace and conflict studies series. Vol. 6, The crisis in Ukraine and information operations of the Russian Federation
46.
From Strategy to Operations in Production and Logistics : proceedings of the CONSA Conference at Linköping University, June 18-19, 2001, Linköping, Sweden
47.
NOMS 2002 : 2002 IEEE/IFIP Network Operations and Management Symposium "Management Solutions for the New Communications World" : proceedings
48.
Proceedings of the Annual Symposium on Management, Operations Research and Economics : Taipei, Taiwan, 9-11 January 2013
49.
Proceedings of the CIB World Building Congress 2016. Volume III, Building up business operations and their logic : shaping materials and technologies
50.
Simulation, Gaming, Training and Business Process Reengineering in Operations : Second International Conference : September 8-9, 2000, Riga, Latvia : proceedings
51.
Symposium of the Operations Research - SOR'97 : Friedrich-Schiller-Universität, Jena, 3.-5. Sept. 1997 : proceedings
52.
World PM2010 proceedings. Vol. 2, Sintering, Secondary and Finishing Operations, Full Density and Alternative Consolidation
53.
2006 IEEE International Conference on Service Operations and Logistics and Informatics : Shanghai, China, June 21-23, 2006
54.
2007 IEEE International Conference on Service Operations and Logistics, and Informatics : Philadelphia, USA, August 27-29, 2007
55.
2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI 2018) : Singapore, 31 July - 2 August 2018
56.
2nd Regional APCOM'97 Symposium on Computer Applications and Operations Research in the Mineral Industries, August 24-28, 1997
kirjastus/väljaandja
6
1.
IEEE Operations Center
2.
Cooperative Cyber Defence Centre of Excellence
3.
EU Cyber Direct
4.
European Cyber Security Organisation
5.
Global Forum on Cyber Expertise
6.
NATO Cooperative Cyber Defence Centre of Excellence
seeria-sari
4
1.
Annals of operations research ; 100
2.
Operations research proceedings
3.
Supply chain, logistics and operations management ; 10
4.
Supply chain, logistics and operations management ; 16
märksõna
2
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle