Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
security training (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/132)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Enterprise security analysis and training experience
Ojamaa, Andres
;
Tõugu, Enn
Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers
2016
/
p. 200-208 : ill
https://doi.org/10.1007/978-3-319-31664-2_21
book article
2
book article
Frankenstack: real-time cyberattack detection and feedback system for technical cyber exercises
Pihelgas, Mauno
;
Kont, Markus
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 396–402
https://doi.org/10.1109/CSR51186.2021.9527923
book article
Number of records 2, displaying
1 - 2
keyword
130
1.
security training
2.
cybersecurity training
3.
ADR Regulations Training Course
4.
ADR regulations training courses
5.
advanced training
6.
adversarial training
7.
aerobic training
8.
care workers training
9.
civil-service training
10.
cognitive training
11.
continual training
12.
DG training courses
13.
distance training
14.
e-Governance training
15.
general training
16.
high-intensity interval training
17.
management training
18.
maritime education and training
19.
marketing training
20.
multilingual training
21.
panel training
22.
pedagogical training
23.
PhD training
24.
research and training scenarios
25.
resistance training
26.
safety training
27.
self-training
28.
simulation training
29.
teacher training
30.
technical teacher training
31.
technical training
32.
training
33.
training and education
34.
training and research tool
35.
training data
36.
Training gap detector
37.
training needs analysis
38.
training needs assessment
39.
training set optimization
40.
weakly supervised training
41.
web-based training
42.
vocational education and training
43.
vocational education and training VET
44.
ad-hoc sensor networks security
45.
Automatic Security Verification
46.
Blockchain security
47.
cache security
48.
communication system security
49.
comprehensive system of economic security
50.
computer security
51.
cooperative security dilemma
52.
cyber security
53.
cyber security education
54.
cyber security exercises
55.
cyber security strategies
56.
cyber-security
57.
data security
58.
development of security cameras
59.
drinking water security
60.
economic security
61.
economic security of enterprise
62.
emotional security
63.
energy security
64.
energy security indicator
65.
graded security
66.
hardware security
67.
hardware security primitive
68.
human security
69.
information security
70.
internal security
71.
international security
72.
investment and innovation security
73.
IPv6 security
74.
IT security
75.
job security
76.
long-term security
77.
metadata model for security measures
78.
Middle Eastern security
79.
Mobile security
80.
national cyber security strategy
81.
national security
82.
NATO. Science for Peace and Security Program
83.
network security
84.
network security monitoring
85.
OSCE (Organization for Security and Co-operation in Europe)
86.
passenger’s security
87.
policy-based routing security
88.
political and security cultures
89.
post-quantum security
90.
power system security
91.
quantitative security
92.
regional security
93.
RISC-V Security Verification
94.
security
95.
security and privacy
96.
security and privacy in smart grids
97.
Security Assertion Mining
98.
security closure
99.
Security Coverage
100.
security dataset
101.
security dilemma
102.
Security evaluation
103.
security log analysis
104.
security management
105.
security model
106.
security monitoring
107.
security notion
108.
security objectives
109.
security of data
110.
security of supply
111.
security operation center
112.
security patterns
113.
security problem definition
114.
security proof
115.
security protocols
116.
security requirements
117.
security requirements engineering
118.
security risk assessment
119.
security risk management
120.
security strategies
121.
security systems for military objects
122.
security testing
123.
security verification
124.
social security planning
125.
societal security
126.
system of economic security
127.
system security
128.
terrorism security
129.
transmission System Security
130.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT