Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber security strategies (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/256)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
250
1.
cyber security strategies
2.
security strategies
3.
cyber security
4.
cyber security education
5.
cyber security exercises
6.
cyber security monitoring
7.
cyber-security
8.
maritime cyber security
9.
maritime cyber security operations centers
10.
national cyber security strategy
11.
airport strategies
12.
bias mitigation strategies
13.
climate strategies
14.
co-design strategies
15.
collaboration strategies
16.
control optimization strategies
17.
coping strategies
18.
course development strategies
19.
cultural adjustment strategies
20.
cultural tourism strategies
21.
digital strategies
22.
Educational strategies
23.
e-Government policies and strategies
24.
energy management strategies (EMS)
25.
enterprise strategies
26.
EoL strategies
27.
EU policies and strategies
28.
European firefighting strategies
29.
graph and tree search strategies
30.
hybrid strategies
31.
innovation in processing strategies
32.
management strategies
33.
marketing strategies
34.
mitigation strategies
35.
mitigation strategies of UHI effect
36.
passive design strategies
37.
portfolio of strategies
38.
questioning strategies
39.
regional innovation strategies on smart specialization (RIS3)
40.
research strategies
41.
smart specialization strategies (S3)
42.
strategies
43.
strategies and concepts of bioinspired designs
44.
strategies for human resource and local policies
45.
strategies of inquiry
46.
suboptimal feedback strategies
47.
sub-optimal feedback strategies
48.
synthesis strategies
49.
teaching strategies
50.
autonomous vehicle cyber range
51.
cloud-based cyber-physical systems (C2PS)
52.
cognitive cyber warfare
53.
cyber
54.
Cyber “Maastricht”
55.
cyber architecture
56.
cyber attacks
57.
cyber battle damage assessment
58.
Cyber Bio-analytical Physical Systems (CBPSs)
59.
cyber challenge
60.
cyber command
61.
Cyber Command organisational structure
62.
cyber conflict
63.
cyber contingency
64.
cyber crime
65.
cyber crime pathways
66.
cyber crime scripting
67.
Cyber crisis management
68.
cyber defence
69.
cyber defence exercise
70.
cyber defence exercises
71.
cyber defense education
72.
cyber defense exercise
73.
cyber defense exercises
74.
cyber dependence
75.
cyber diplomacy
76.
cyber exercise
77.
cyber hygiene
78.
cyber impact assessment
79.
cyber incidents
80.
cyber insurance
81.
cyber intrusion detection
82.
cyber kill chain
83.
cyber operation
84.
cyber operation officer
85.
cyber operations
86.
cyber operations exercises
87.
cyber physical energy systems
88.
cyber physical power system (CPPS)
89.
Cyber Physical Production System
90.
cyber physical production systems (CPPS)
91.
cyber physical social system
92.
cyber physical social systems (cpss)
93.
cyber physical system
94.
Cyber Planning tool
95.
cyber power Europe
96.
cyber ranges
97.
cyber red teaming
98.
cyber resilience
99.
cyber resilience at sea
100.
cyber risk
101.
cyber risk management in shipping
102.
cyber situational awareness
103.
cyber stability
104.
cyber team communication
105.
cyber threat
106.
cyber threat communication
107.
Cyber Threat Intelligence
108.
cyber threats
109.
cyber war
110.
cyber warfare
111.
cyber warriors
112.
cyber weapons
113.
cyber-attack
114.
cyber-attack pathways
115.
Cyber-attacks
116.
cyber-insurance
117.
cyber-paternalism
118.
cyber-physical energy systems
119.
cyber-physical social system (CPSS)
120.
cyber-physical system
121.
Cyber-Physical System (CPS)
122.
cyber-physical system logistic robot
123.
cyber-physical systems
124.
Cyber-Physical Systems (CPS)
125.
cyber-risks
126.
cyber-space nexus
127.
cyber-vulnerabilities
128.
Defensive Cyber Operations
129.
EU cyber policy
130.
international cyber norms
131.
military cyber
132.
mobile cyber-physical system
133.
NATO cyber operations definitions
134.
NATO Cyber Range
135.
Offensive Cyber Operations
136.
perceived cyber risks and threats
137.
responsive cyber defence
138.
Socio-Cyber-Physical Systems
139.
space cyber range
140.
technical cyber exercise
141.
Visualising Cyber Planning
142.
ad-hoc sensor networks security
143.
Automatic Security Verification
144.
Blockchain security
145.
cache security
146.
communication system security
147.
comprehensive system of economic security
148.
computer security
149.
cooperative security dilemma
150.
data and information security
151.
data security
152.
development of security cameras
153.
digital security practices
154.
drinking water security
155.
economic security
156.
economic security of enterprise
157.
emotional security
158.
energy security
159.
energy security indicator
160.
Estonian information security standard
161.
graded security
162.
hardware security
163.
hardware security primitive
164.
high level of security
165.
Homeland security
166.
human security
167.
information security
168.
information security and privacy
169.
initial level of security
170.
internal security
171.
international security
172.
investment and innovation security
173.
IPv6 security
174.
IT security
175.
IT security management
176.
job security
177.
long-term security
178.
Maritime Security Operations Center (M-SOC)
179.
medium level of security
180.
metadata model for security measures
181.
Middle Eastern security
182.
Mobile security
183.
national security
184.
NATO. Science for Peace and Security Program
185.
network security
186.
network security monitoring
187.
OSCE (Organization for Security and Co-operation in Europe)
188.
passenger’s security
189.
policy-based routing security
190.
political and security cultures
191.
post-quantum security
192.
power system security
193.
quantitative security
194.
regional security
195.
RISC-V Security Verification
196.
Safety and Security in Sea Transportation
197.
safety and security testing
198.
security
199.
security adaptation
200.
security alert prioritization
201.
security analysis
202.
security and justice (AFSJ)
203.
Security and political science
204.
security and privacy
205.
security and privacy in smart grids
206.
Security Assertion Mining
207.
security closure
208.
Security Coverage
209.
security dataset
210.
security dilemma
211.
Security evaluation
212.
security evaluation instruments
213.
Security limitations
214.
security log analysis
215.
security management
216.
security model
217.
security monitoring
218.
security notion
219.
security objectives
220.
security of data
221.
security of supply
222.
security operation center
223.
security operations center
224.
security patterns
225.
security policy
226.
security problem definition
227.
security proof
228.
security protocols
229.
security requirements
230.
security requirements engineering
231.
security risk assessment
232.
security risk management
233.
security risks
234.
security science and technology
235.
security systems for military objects
236.
security testing
237.
security training
238.
security verification
239.
security-by-design
240.
social security planning
241.
societal security
242.
software security
243.
software security level
244.
software security subcharacteristics
245.
sufficient level of security
246.
system of economic security
247.
system security
248.
terrorism security
249.
transmission System Security
250.
voting privacy and security
märksõna
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT