Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security training (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/153)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Enterprise security analysis and training experience
Ojamaa, Andres
;
Tõugu, Enn
Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers
2016
/
p. 200-208 : ill
https://doi.org/10.1007/978-3-319-31664-2_21
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
2
book article
Frankenstack : real-time cyberattack detection and feedback system for technical cyber exercises
Pihelgas, Mauno
;
Kont, Markus
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 396-402
https://doi.org/10.1109/CSR51186.2021.9527923
book article
Number of records 2, displaying
1 - 2
keyword
151
1.
security training
2.
cybersecurity practical training
3.
cybersecurity training
4.
ADR Regulations Training Course
5.
ADR regulations training courses
6.
advanced training
7.
adversarial training
8.
aerobic training
9.
care workers training
10.
civil service training
11.
civil-service training
12.
cognitive training
13.
continual training
14.
design management training
15.
DG training courses
16.
distance training
17.
educational and training programs
18.
e-Governance training
19.
general training
20.
high-intensity interval training
21.
incident management training
22.
management training
23.
maritime education and training
24.
maritime higher education and training (MHET)
25.
marketing training
26.
multilingual training
27.
panel training
28.
pedagogical training
29.
PhD training
30.
professional training
31.
research and training scenarios
32.
resistance training
33.
safety training
34.
self-training
35.
simulation training
36.
small training data set
37.
teacher training
38.
technical teacher training
39.
technical training
40.
training
41.
training and education
42.
training and research tool
43.
training data
44.
Training gap detector
45.
training needs analysis
46.
training needs assessment
47.
training set optimization
48.
weakly supervised training
49.
web-based training
50.
vocational education and training
51.
vocational education and training VET
52.
ad-hoc sensor networks security
53.
Automatic Security Verification
54.
Blockchain security
55.
cache security
56.
communication system security
57.
comprehensive system of economic security
58.
computer security
59.
cooperative security dilemma
60.
cyber security
61.
cyber security education
62.
cyber security exercises
63.
cyber security monitoring
64.
cyber security strategies
65.
cyber-security
66.
data security
67.
development of security cameras
68.
drinking water security
69.
economic security
70.
economic security of enterprise
71.
emotional security
72.
energy security
73.
energy security indicator
74.
Estonian information security standard
75.
graded security
76.
hardware security
77.
hardware security primitive
78.
human security
79.
information security
80.
internal security
81.
international security
82.
investment and innovation security
83.
IPv6 security
84.
IT security
85.
IT security management
86.
job security
87.
long-term security
88.
metadata model for security measures
89.
Middle Eastern security
90.
Mobile security
91.
national cyber security strategy
92.
national security
93.
NATO. Science for Peace and Security Program
94.
network security
95.
network security monitoring
96.
OSCE (Organization for Security and Co-operation in Europe)
97.
passenger’s security
98.
policy-based routing security
99.
political and security cultures
100.
post-quantum security
101.
power system security
102.
quantitative security
103.
regional security
104.
RISC-V Security Verification
105.
safety and security testing
106.
security
107.
security adaptation
108.
security alert prioritization
109.
security analysis
110.
security and justice (AFSJ)
111.
Security and political science
112.
security and privacy
113.
security and privacy in smart grids
114.
Security Assertion Mining
115.
security closure
116.
Security Coverage
117.
security dataset
118.
security dilemma
119.
Security evaluation
120.
security evaluation instruments
121.
security log analysis
122.
security management
123.
security model
124.
security monitoring
125.
security notion
126.
security objectives
127.
security of data
128.
security of supply
129.
security operation center
130.
security operations center
131.
security patterns
132.
security policy
133.
security problem definition
134.
security proof
135.
security protocols
136.
security requirements
137.
security requirements engineering
138.
security risk assessment
139.
security risk management
140.
security strategies
141.
security systems for military objects
142.
security testing
143.
security verification
144.
security-by-design
145.
social security planning
146.
societal security
147.
system of economic security
148.
system security
149.
terrorism security
150.
transmission System Security
151.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT