Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security exercises (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/208)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
i-tee : a fully automated cyber defense competition for students
Ernits, Margus
;
Tammekänd, Johannes
;
Maennel, Olaf Manuel
SIGCOMM '15 : proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication : August 17-21, 2015, London, United Kingdom
2015
/
p. 113-114 : ill
https://doi.org/10.1145/2785956.2790033
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
203
1.
cyber security exercises
2.
cybersecurity exercises
3.
organising cybersecurity exercises
4.
cyber defence exercises
5.
cyber defense exercises
6.
cyber operations exercises
7.
cyber security
8.
cyber security education
9.
cyber security monitoring
10.
cyber security strategies
11.
cyber-security
12.
national cyber security strategy
13.
aquatic exercises
14.
exercises
15.
autonomous vehicle cyber range
16.
cloud-based cyber-physical systems (C2PS)
17.
cognitive cyber warfare
18.
cyber
19.
Cyber “Maastricht”
20.
cyber architecture
21.
cyber attacks
22.
cyber battle damage assessment
23.
Cyber Bio-analytical Physical Systems (CBPSs)
24.
cyber challenge
25.
cyber command
26.
Cyber Command organisational structure
27.
cyber conflict
28.
cyber contingency
29.
cyber crime
30.
cyber crime pathways
31.
cyber crime scripting
32.
Cyber crisis management
33.
cyber defence
34.
cyber defence exercise
35.
cyber defense education
36.
cyber defense exercise
37.
cyber dependence
38.
cyber diplomacy
39.
cyber exercise
40.
cyber hygiene
41.
cyber impact assessment
42.
cyber incidents
43.
cyber insurance
44.
cyber intrusion detection
45.
cyber kill chain
46.
cyber operation
47.
cyber operation officer
48.
cyber operations
49.
cyber physical energy systems
50.
cyber physical power system (CPPS)
51.
Cyber Physical Production System
52.
cyber physical production systems (CPPS)
53.
cyber physical social system
54.
cyber physical social systems (cpss)
55.
cyber physical system
56.
Cyber Planning tool
57.
cyber power Europe
58.
cyber ranges
59.
cyber red teaming
60.
cyber resilience
61.
cyber risk
62.
cyber situational awareness
63.
cyber stability
64.
cyber team communication
65.
cyber threat
66.
cyber threat communication
67.
Cyber Threat Intelligence
68.
cyber threats
69.
cyber war
70.
cyber warfare
71.
cyber warriors
72.
cyber weapons
73.
cyber-attack
74.
cyber-attack pathways
75.
Cyber-attacks
76.
cyber-insurance
77.
cyber-paternalism
78.
cyber-physical energy systems
79.
cyber-physical social system (CPSS)
80.
cyber-physical system
81.
Cyber-Physical System (CPS)
82.
cyber-physical system logistic robot
83.
cyber-physical systems
84.
Cyber-Physical Systems (CPS)
85.
cyber-risks
86.
cyber-space nexus
87.
cyber-vulnerabilities
88.
Defensive Cyber Operations
89.
EU cyber policy
90.
international cyber norms
91.
military cyber
92.
mobile cyber-physical system
93.
NATO cyber operations definitions
94.
NATO Cyber Range
95.
Offensive Cyber Operations
96.
perceived cyber risks and threats
97.
responsive cyber defence
98.
Socio-Cyber-Physical Systems
99.
space cyber range
100.
technical cyber exercise
101.
Visualising Cyber Planning
102.
ad-hoc sensor networks security
103.
Automatic Security Verification
104.
Blockchain security
105.
cache security
106.
communication system security
107.
comprehensive system of economic security
108.
computer security
109.
cooperative security dilemma
110.
data and information security
111.
data security
112.
development of security cameras
113.
digital security practices
114.
drinking water security
115.
economic security
116.
economic security of enterprise
117.
emotional security
118.
energy security
119.
energy security indicator
120.
Estonian information security standard
121.
graded security
122.
hardware security
123.
hardware security primitive
124.
Homeland security
125.
human security
126.
information security
127.
information security and privacy
128.
internal security
129.
international security
130.
investment and innovation security
131.
IPv6 security
132.
IT security
133.
IT security management
134.
job security
135.
long-term security
136.
metadata model for security measures
137.
Middle Eastern security
138.
Mobile security
139.
national security
140.
NATO. Science for Peace and Security Program
141.
network security
142.
network security monitoring
143.
OSCE (Organization for Security and Co-operation in Europe)
144.
passenger’s security
145.
policy-based routing security
146.
political and security cultures
147.
post-quantum security
148.
power system security
149.
quantitative security
150.
regional security
151.
RISC-V Security Verification
152.
Safety and Security in Sea Transportation
153.
safety and security testing
154.
security
155.
security adaptation
156.
security alert prioritization
157.
security analysis
158.
security and justice (AFSJ)
159.
Security and political science
160.
security and privacy
161.
security and privacy in smart grids
162.
Security Assertion Mining
163.
security closure
164.
Security Coverage
165.
security dataset
166.
security dilemma
167.
Security evaluation
168.
security evaluation instruments
169.
Security limitations
170.
security log analysis
171.
security management
172.
security model
173.
security monitoring
174.
security notion
175.
security objectives
176.
security of data
177.
security of supply
178.
security operation center
179.
security operations center
180.
security patterns
181.
security policy
182.
security problem definition
183.
security proof
184.
security protocols
185.
security requirements
186.
security requirements engineering
187.
security risk assessment
188.
security risk management
189.
security risks
190.
security science and technology
191.
security strategies
192.
security systems for military objects
193.
security testing
194.
security training
195.
security verification
196.
security-by-design
197.
social security planning
198.
societal security
199.
system of economic security
200.
system security
201.
terrorism security
202.
transmission System Security
203.
voting privacy and security
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT