Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
national cyber security strategy (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/211)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
NCSS: A global census of national positions on conflict, neutrality and cooperation
Serrano Iova
;
Serrano-Iova, Radu-Antonio
;
Watashiba, Tomoe
Proceedings of the 22nd European Conference on Cyber Warfare and Security
2023
/
p. 420-428
https://papers.academic-conferences.org/index.php/eccws/issue/view/20/23
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
207
1.
national cyber security strategy
2.
cyber security
3.
cyber security education
4.
cyber security exercises
5.
cyber security strategies
6.
cyber-security
7.
national security
8.
adaptive test strategy generation
9.
AI strategy
10.
behavioural strategy
11.
BESS Control Strategy
12.
branding strategy
13.
business strategy
14.
control strategy
15.
diffusion strategy
16.
education strategy
17.
educational strategy
18.
efficient control strategy
19.
electrode placement strategy
20.
end-of-life (EOL) strategy
21.
enterprise strategy
22.
EU heating and cooling strategy
23.
EU post-2020 biodiversity strategy
24.
EU regulatory strategy
25.
European institutions digital strategy
26.
fault handling strategy
27.
human resource and Strategy Europe 2020
28.
long term renovation strategy
29.
management strategy
30.
manufacturing strategy
31.
marine strategy framework directive
32.
Marine Strategy Framework Directive (MSFD)
33.
market strategy
34.
marketing strategy
35.
modulation strategy
36.
nonlinear control strategy
37.
optimal operation strategy
38.
outsourcing strategy
39.
ownership strategy
40.
passive design strategy
41.
PLM implementation strategy
42.
PLM strategy
43.
Power leveling strategy
44.
proactive strategy
45.
Renovation strategy
46.
scan strategy
47.
scanning strategy
48.
Smart Specialization Strategy
49.
strategy
50.
strategy building
51.
strategy definition
52.
strategy Europe 2020
53.
strategy focus
54.
strategy formation
55.
strategy map
56.
sustainable strategy
57.
teaching strategy
58.
waste management strategy
59.
autonomous vehicle cyber range
60.
cloud-based cyber-physical systems (C2PS)
61.
cyber
62.
Cyber “Maastricht”
63.
cyber architecture
64.
cyber attacks
65.
cyber battle damage assessment
66.
Cyber Bio-analytical Physical Systems (CBPSs)
67.
cyber challenge
68.
cyber command
69.
cyber conflict
70.
cyber contingency
71.
cyber crime
72.
cyber crime pathways
73.
cyber crime scripting
74.
Cyber crisis management
75.
cyber defence
76.
cyber defence exercise
77.
cyber defence exercises
78.
cyber defense exercise
79.
cyber defense exercises
80.
cyber dependence
81.
cyber diplomacy
82.
cyber exercise
83.
cyber hygiene
84.
cyber impact assessment
85.
cyber incidents
86.
cyber insurance
87.
cyber kill chain
88.
cyber operation
89.
cyber operations
90.
cyber physical energy systems
91.
cyber physical power system (CPPS)
92.
Cyber Physical Production System
93.
cyber physical production systems (CPPS)
94.
cyber physical system
95.
cyber power Europe
96.
cyber ranges
97.
cyber red teaming
98.
cyber resilience
99.
cyber risk
100.
cyber situational awareness
101.
cyber stability
102.
cyber team communication
103.
cyber threat
104.
cyber threat communication
105.
cyber threats
106.
cyber war
107.
cyber warfare
108.
cyber warriors
109.
cyber weapons
110.
cyber-attack
111.
cyber-attack pathways
112.
cyber-insurance
113.
cyber-paternalism
114.
cyber-physical energy systems
115.
cyber-physical social system (CPSS)
116.
cyber-physical system
117.
Cyber-Physical System (CPS)
118.
cyber-physical system logistic robot
119.
cyber-physical systems
120.
Cyber-Physical Systems (CPS)
121.
cyber-vulnerabilities
122.
EU cyber policy
123.
international cyber norms
124.
military cyber
125.
mobile cyber-physical system
126.
NATO Cyber Range
127.
responsive cyber defence
128.
Socio-Cyber-Physical Systems
129.
technical cyber exercise
130.
ad-hoc sensor networks security
131.
Blockchain security
132.
cache security
133.
communication system security
134.
comprehensive system of economic security
135.
computer security
136.
cooperative security dilemma
137.
data security
138.
development of security cameras
139.
drinking water security
140.
economic security
141.
economic security of enterprise
142.
emotional security
143.
energy security
144.
energy security indicator
145.
graded security
146.
hardware security
147.
hardware security primitive
148.
human security
149.
information security
150.
internal security
151.
international security
152.
investment and innovation security
153.
IPv6 security
154.
IT security
155.
job security
156.
long-term security
157.
metadata model for security measures
158.
Middle Eastern security
159.
Mobile security
160.
NATO. Science for Peace and Security Program
161.
network security
162.
network security monitoring
163.
OSCE (Organization for Security and Co-operation in Europe)
164.
passenger’s security
165.
policy-based routing security
166.
political and security cultures
167.
post-quantum security
168.
power system security
169.
quantitative security
170.
regional security
171.
security
172.
security and privacy
173.
security and privacy in smart grids
174.
security closure
175.
Security Coverage
176.
security dataset
177.
security dilemma
178.
Security evaluation
179.
security log analysis
180.
security management
181.
security model
182.
security monitoring
183.
security notion
184.
security objectives
185.
security of data
186.
security of supply
187.
security operation center
188.
security patterns
189.
security problem definition
190.
security proof
191.
security protocols
192.
security requirements
193.
security requirements engineering
194.
security risk assessment
195.
security risk management
196.
security strategies
197.
security systems for military objects
198.
security testing
199.
security training
200.
security verification
201.
social security planning
202.
societal security
203.
system of economic security
204.
system security
205.
terrorism security
206.
transmission System Security
207.
voting privacy and security
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
3.
Cyber Battle
4.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT