Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security training (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/179)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Enterprise security analysis and training experience
Ojamaa, Andres
;
Tõugu, Enn
Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers
2016
/
p. 200-208 : ill
https://doi.org/10.1007/978-3-319-31664-2_21
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
2
book article
Frankenstack : real-time cyberattack detection and feedback system for technical cyber exercises
Pihelgas, Mauno
;
Kont, Markus
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 396-402
https://doi.org/10.1109/CSR51186.2021.9527923
book article
Number of records 2, displaying
1 - 2
keyword
177
1.
security training
2.
cybersecurity practical training
3.
cybersecurity training
4.
ADR Regulations Training Course
5.
ADR regulations training courses
6.
advanced training
7.
adversarial training
8.
aerobic training
9.
care workers training
10.
civil service training
11.
civil-service training
12.
cognitive training
13.
continual training
14.
design management training
15.
DG training courses
16.
distance training
17.
Education and Training Conference
18.
educational and training programs
19.
e-Governance training
20.
general training
21.
high-intensity interval training
22.
incident management training
23.
Joint training
24.
management training
25.
maritime education and training
26.
maritime higher education and training (MHET)
27.
marketing training
28.
multilingual training
29.
panel training
30.
pedagogical training
31.
PhD training
32.
professional training
33.
research and training scenarios
34.
resistance training
35.
safety training
36.
self-training
37.
simulation training
38.
small training data set
39.
teacher training
40.
technical teacher training
41.
technical training
42.
training
43.
training and education
44.
training and research tool
45.
training data
46.
Training gap detector
47.
training needs analysis
48.
training needs assessment
49.
training set optimization
50.
weakly supervised training
51.
web-based training
52.
vocational education and training
53.
vocational education and training VET
54.
ad-hoc sensor networks security
55.
Automatic Security Verification
56.
Blockchain security
57.
cache security
58.
cloud security
59.
communication system security
60.
comprehensive system of economic security
61.
computer security
62.
cooperative security dilemma
63.
cyber security
64.
cyber security education
65.
cyber security exercises
66.
cyber security monitoring
67.
cyber security monitoring in maritime
68.
cyber security strategies
69.
cyber-physical system security
70.
cyber-security
71.
data and information security
72.
data security
73.
development of security cameras
74.
digital security practices
75.
drinking water security
76.
economic security
77.
economic security of enterprise
78.
emotional security
79.
energy security
80.
energy security indicator
81.
Estonian information security standard
82.
graded security
83.
hardware security
84.
hardware security primitive
85.
high level of security
86.
Homeland security
87.
human security
88.
information security
89.
information security and privacy
90.
initial level of security
91.
internal security
92.
international security
93.
investment and innovation security
94.
IPv6 security
95.
IT security
96.
IT security management
97.
job security
98.
long-term security
99.
maritime cyber security
100.
maritime cyber security operations centers
101.
Maritime Security Operations Center (M-SOC)
102.
medium level of security
103.
metadata model for security measures
104.
Middle Eastern security
105.
Mobile security
106.
national cyber security strategy
107.
national security
108.
NATO. Science for Peace and Security Program
109.
network security
110.
network security monitoring
111.
OSCE (Organization for Security and Co-operation in Europe)
112.
passenger’s security
113.
policy-based routing security
114.
political and security cultures
115.
post-quantum security
116.
power system security
117.
quantitative security
118.
regional security
119.
RISC-V Security Verification
120.
Safety and Security in Sea Transportation
121.
safety and security testing
122.
security
123.
security adaptation
124.
security alert prioritization
125.
security analysis
126.
security and justice (AFSJ)
127.
Security and political science
128.
security and privacy
129.
security and privacy in smart grids
130.
Security Assertion
131.
Security Assertion Mining
132.
security closure
133.
Security Coverage
134.
security dataset
135.
security dilemma
136.
Security evaluation
137.
security evaluation instruments
138.
Security Level Evaluation
139.
Security limitations
140.
security log analysis
141.
security management
142.
security model
143.
security monitoring
144.
security notion
145.
security objectives
146.
security of data
147.
security of supply
148.
security operation center
149.
security operations center
150.
security patterns
151.
security policy
152.
security problem definition
153.
security proof
154.
security protocols
155.
security requirements
156.
security requirements engineering
157.
security research
158.
security risk assessment
159.
security risk management
160.
security risks
161.
security science and technology
162.
security strategies
163.
security systems for military objects
164.
security testing
165.
security verification
166.
security-by-design
167.
social security planning
168.
societal security
169.
software security
170.
software security level
171.
software security subcharacteristics
172.
sufficient level of security
173.
system of economic security
174.
system security
175.
terrorism security
176.
transmission System Security
177.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT