Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Cyber Threat Intelligence (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(3/159)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Integrating Cyber Threat Intelligence into Threat Modeling for Autonomous Ships Using PASTA and MISP
Erbas, Muhammed
;
Vanharanta, Jani
;
Paavola, Jarkko
;
Tsiopoulos, Leonidas
;
Vaarandi, Risto
2025 IEEE International Conference on Cyber Security and Resilience (CSR)
2025
/
p. 133-139
https://ieeexplore.ieee.org/document/11130108
https://doi.org/10.1109/CSR64739.2025.11130108
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
152
1.
Cyber Threat Intelligence
2.
cyber threat
3.
cyber threat communication
4.
asymmetric threat
5.
group threat theory
6.
hybrid threat
7.
military threat
8.
threat identification
9.
Threat modeling
10.
threat modeling (TM)
11.
threat modelling
12.
ambient intelligence
13.
architectural intelligence
14.
artificial intelligence
15.
artificial intelligence (AI)
16.
artificial intelligence in education
17.
Artificial intelligence in healthcare
18.
autonomous vehicle cyber range
19.
business intelligence
20.
business intelligence and analytics
21.
business intelligence management
22.
business-intelligence (BI)
23.
cloud-based cyber-physical systems (C2PS)
24.
cognitive cyber warfare
25.
collaborative intelligence
26.
collective intelligence
27.
Collective Intelligence (CI) platform
28.
Collective intelligence platforms
29.
competitive intelligence
30.
computational intelligence
31.
connected intelligence
32.
cyber
33.
Cyber “Maastricht”
34.
cyber architecture
35.
cyber attacks
36.
cyber battle damage assessment
37.
Cyber Bio-analytical Physical Systems (CBPSs)
38.
cyber challenge
39.
cyber command
40.
Cyber Command organisational structure
41.
cyber conflict
42.
cyber contingency
43.
cyber crime
44.
cyber crime pathways
45.
cyber crime scripting
46.
Cyber crisis management
47.
cyber defence
48.
cyber defence exercise
49.
cyber defence exercises
50.
cyber defense education
51.
cyber defense exercise
52.
cyber defense exercises
53.
cyber dependence
54.
cyber diplomacy
55.
cyber exercise
56.
cyber hygiene
57.
cyber impact assessment
58.
cyber incidents
59.
cyber insurance
60.
cyber intrusion detection
61.
cyber kill chain
62.
cyber operation
63.
cyber operation officer
64.
cyber operations
65.
cyber operations exercises
66.
cyber physical energy systems
67.
cyber physical power system (CPPS)
68.
Cyber Physical Production System
69.
cyber physical production systems (CPPS)
70.
cyber physical social system
71.
cyber physical social systems (cpss)
72.
cyber physical system
73.
Cyber Planning tool
74.
cyber power Europe
75.
cyber ranges
76.
cyber red teaming
77.
cyber resilience
78.
cyber resilience at sea
79.
cyber risk
80.
cyber risk management in shipping
81.
cyber security
82.
cyber security education
83.
cyber security exercises
84.
cyber security monitoring
85.
cyber security strategies
86.
cyber situational awareness
87.
cyber stability
88.
cyber team communication
89.
cyber threats
90.
cyber war
91.
cyber warfare
92.
cyber warriors
93.
cyber weapons
94.
cyber-attack
95.
cyber-attack pathways
96.
Cyber-attacks
97.
cyber-insurance
98.
cyber-paternalism
99.
cyber-physical energy systems
100.
cyber-physical social system (CPSS)
101.
cyber-physical system
102.
Cyber-Physical System (CPS)
103.
cyber-physical system logistic robot
104.
cyber-physical systems
105.
Cyber-Physical Systems (CPS)
106.
cyber-risks
107.
cyber-security
108.
cyber-space nexus
109.
cyber-vulnerabilities
110.
data-intelligence
111.
Defensive Cyber Operations
112.
Distributed artificial intelligence (DAI)
113.
Emotional Intelligence (EI)
114.
EU cyber policy
115.
explainable artificial intelligence
116.
Explainable Artificial Intelligence (XAI)
117.
generative artificial intelligence
118.
generative artificial intelligence (GAI)
119.
Geospatial Artificial Intelligence (GeoAI)
120.
hybrid intelligence
121.
intelligence
122.
intelligence augmentation
123.
intelligence infrastructure
124.
international cyber norms
125.
language intelligence
126.
learning (artificial intelligence)
127.
manufacturing intelligence
128.
maritime cyber security
129.
maritime cyber security operations centers
130.
market market intelligence
131.
military cyber
132.
mobile cyber-physical system
133.
national cyber security strategy
134.
NATO cyber operations definitions
135.
NATO Cyber Range
136.
Offensive Cyber Operations
137.
open source intelligence
138.
Open Source Intelligence (OSINT)
139.
open source intelligence tools
140.
perceived cyber risks and threats
141.
predictive artificial intelligence
142.
responsive cyber defence
143.
societal intelligence
144.
Socio-Cyber-Physical Systems
145.
space cyber range
146.
super-intelligence
147.
swarm intelligence
148.
swarm intelligence optimization
149.
technical cyber exercise
150.
technology intelligence
151.
trustworthy artificial intelligence
152.
Visualising Cyber Planning
märksõna
6
1.
Artificial Intelligence Controller Interface (AICI)
2.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
3.
Cyber Battle
4.
Estonian Center for Safe and Trustworthy Artificial Intelligence (ECSTAI)
5.
Telia Cyber Battle of Estonia
6.
Telia Cyber Battle of Nordic-Baltics
TTÜ märksõna
1
1.
Goverment Technology and Artificial Intelligence Lab = GovAILab
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT