Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber-physical system security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/258)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Extending cyber threat modeling with physical dependency analysis in DC microgrids
Ali, Saqib
;
Chub, Andrii
;
Bahsi, Hayretdin
;
Khalil, Shaymaa Mamdouh Mohammed Radwan
2025 IEEE 66th International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON)
2025
/
10 p
https://doi.org/10.1109/RTUCON67996.2025.11414838
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
252
1.
cyber-physical system security
2.
cyber physical power system (CPPS)
3.
Cyber Physical Production System
4.
cyber physical social system
5.
cyber physical system
6.
cyber-physical social system (CPSS)
7.
cyber-physical system
8.
Cyber-Physical System (CPS)
9.
cyber-physical system logistic robot
10.
mobile cyber-physical system
11.
cloud-based cyber-physical systems (C2PS)
12.
Cyber Bio-analytical Physical Systems (CBPSs)
13.
cyber physical energy systems
14.
cyber physical production systems (CPPS)
15.
cyber physical social systems (cpss)
16.
cyber-physical energy systems
17.
cyber-physical systems
18.
Cyber-Physical Systems (CPS)
19.
Socio-Cyber-Physical Systems
20.
cyber security
21.
cyber security education
22.
cyber security exercises
23.
cyber security monitoring
24.
cyber security monitoring in maritime
25.
cyber security strategies
26.
cyber-security
27.
maritime cyber security
28.
maritime cyber security operations centers
29.
national cyber security strategy
30.
communication system security
31.
comprehensive system of economic security
32.
power system security
33.
system of economic security
34.
system security
35.
transmission System Security
36.
automated cyber defense
37.
autonomous vehicle cyber range
38.
autonomous-semiautonomous mechanical physical systems
39.
cognitive cyber warfare
40.
cyber
41.
Cyber “Maastricht”
42.
cyber architecture
43.
cyber attacks
44.
cyber battle damage assessment
45.
cyber challenge
46.
cyber command
47.
Cyber Command organisational structure
48.
cyber conflict
49.
cyber contingency
50.
cyber crime
51.
cyber crime pathways
52.
cyber crime scripting
53.
Cyber crisis management
54.
cyber defence
55.
cyber defence exercise
56.
cyber defence exercises
57.
cyber defense education
58.
cyber defense exercise
59.
cyber defense exercises
60.
cyber dependence
61.
cyber diplomacy
62.
cyber exercise
63.
cyber hygiene
64.
cyber impact assessment
65.
cyber incidents
66.
cyber insurance
67.
cyber intrusion detection
68.
cyber kill chain
69.
cyber operation
70.
cyber operation officer
71.
cyber operations
72.
cyber operations exercises
73.
Cyber Planning tool
74.
cyber power Europe
75.
cyber ranges
76.
cyber red teaming
77.
cyber resilience
78.
cyber resilience at sea
79.
cyber risk
80.
cyber risk management in shipping
81.
cyber situational awareness
82.
cyber stability
83.
cyber team communication
84.
cyber threat
85.
cyber threat communication
86.
Cyber Threat Intelligence
87.
cyber threats
88.
cyber war
89.
cyber warfare
90.
cyber warriors
91.
cyber weapons
92.
cyber-attack
93.
cyber-attack pathways
94.
Cyber-attacks
95.
cyber-insurance
96.
cyber-paternalism
97.
cyber-risks
98.
cyber-space nexus
99.
cyber-vulnerabilities
100.
Defensive Cyber Operations
101.
EU cyber policy
102.
fatty acid/physical chemistry
103.
fire-physical phenomenon
104.
impaired physical mobility
105.
international cyber norms
106.
military cyber
107.
NATO cyber operations definitions
108.
NATO Cyber Range
109.
Offensive Cyber Operations
110.
oupled physical-biogeochemical modeling
111.
perceived cyber risks and threats
112.
physical (PHY)
113.
physical activity
114.
physical activity classification
115.
physical and chemical processes
116.
physical asset management
117.
physical chemistry
118.
physical condition
119.
physical control channels
120.
physical defects
121.
physical design
122.
physical education
123.
physical experiment
124.
physical factors
125.
physical fatigue
126.
physical health
127.
physical layer
128.
physical mechanisms
129.
physical modeling
130.
physical oceanography
131.
physical overload
132.
physical overload disease
133.
physical properties
134.
physical unclonable function
135.
physical vapor deposition
136.
physical vapour deposition coatings
137.
physical variations
138.
respect for the physical integrity
139.
responsive cyber defence
140.
soil physical properties
141.
space cyber range
142.
technical cyber exercise
143.
the accurate registration of the physical values
144.
Visualising Cyber Planning
145.
ad-hoc sensor networks security
146.
Automatic Security Verification
147.
Blockchain security
148.
cache security
149.
cloud security
150.
computer security
151.
cooperative security dilemma
152.
data and information security
153.
data security
154.
development of security cameras
155.
digital security practices
156.
drinking water security
157.
economic security
158.
economic security of enterprise
159.
emotional security
160.
energy security
161.
energy security indicator
162.
Estonian information security standard
163.
graded security
164.
hardware security
165.
hardware security primitive
166.
high level of security
167.
Homeland security
168.
human security
169.
information security
170.
information security and privacy
171.
initial level of security
172.
internal security
173.
international security
174.
investment and innovation security
175.
IPv6 security
176.
IT security
177.
IT security management
178.
job security
179.
long-term security
180.
Maritime Security Operations Center (M-SOC)
181.
medium level of security
182.
metadata model for security measures
183.
Middle Eastern security
184.
Mobile security
185.
national security
186.
NATO. Science for Peace and Security Program
187.
network security
188.
network security monitoring
189.
OSCE (Organization for Security and Co-operation in Europe)
190.
passenger’s security
191.
policy-based routing security
192.
political and security cultures
193.
post-quantum security
194.
quantitative security
195.
regional security
196.
RISC-V Security Verification
197.
Safety and Security in Sea Transportation
198.
safety and security testing
199.
security
200.
security adaptation
201.
security alert prioritization
202.
security analysis
203.
security and justice (AFSJ)
204.
Security and political science
205.
security and privacy
206.
security and privacy in smart grids
207.
Security Assertion
208.
Security Assertion Mining
209.
security closure
210.
Security Coverage
211.
security dataset
212.
security dilemma
213.
Security evaluation
214.
security evaluation instruments
215.
Security Level Evaluation
216.
Security limitations
217.
security log analysis
218.
security management
219.
security model
220.
security monitoring
221.
security notion
222.
security objectives
223.
security of data
224.
security of supply
225.
security operation center
226.
security operations center
227.
security patterns
228.
security policy
229.
security problem definition
230.
security proof
231.
security protocols
232.
security requirements
233.
security requirements engineering
234.
security research
235.
security risk assessment
236.
security risk management
237.
security risks
238.
security science and technology
239.
security strategies
240.
security systems for military objects
241.
security testing
242.
security training
243.
security verification
244.
security-by-design
245.
social security planning
246.
societal security
247.
software security
248.
software security level
249.
software security subcharacteristics
250.
sufficient level of security
251.
terrorism security
252.
voting privacy and security
märksõna
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT