Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security exercises (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/198)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
i-tee : a fully automated cyber defense competition for students
Ernits, Margus
;
Tammekänd, Johannes
;
Maennel, Olaf Manuel
SIGCOMM '15 : proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication : August 17-21, 2015, London, United Kingdom
2015
/
p. 113-114 : ill
https://doi.org/10.1145/2785956.2790033
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
193
1.
cyber security exercises
2.
cybersecurity exercises
3.
organising cybersecurity exercises
4.
cyber defence exercises
5.
cyber defense exercises
6.
cyber security
7.
cyber security education
8.
cyber security monitoring
9.
cyber security strategies
10.
cyber-security
11.
national cyber security strategy
12.
aquatic exercises
13.
exercises
14.
autonomous vehicle cyber range
15.
cloud-based cyber-physical systems (C2PS)
16.
cognitive cyber warfare
17.
cyber
18.
Cyber “Maastricht”
19.
cyber architecture
20.
cyber attacks
21.
cyber battle damage assessment
22.
Cyber Bio-analytical Physical Systems (CBPSs)
23.
cyber challenge
24.
cyber command
25.
cyber conflict
26.
cyber contingency
27.
cyber crime
28.
cyber crime pathways
29.
cyber crime scripting
30.
Cyber crisis management
31.
cyber defence
32.
cyber defence exercise
33.
cyber defense education
34.
cyber defense exercise
35.
cyber dependence
36.
cyber diplomacy
37.
cyber exercise
38.
cyber hygiene
39.
cyber impact assessment
40.
cyber incidents
41.
cyber insurance
42.
cyber intrusion detection
43.
cyber kill chain
44.
cyber operation
45.
cyber operation officer
46.
cyber operations
47.
cyber physical energy systems
48.
cyber physical power system (CPPS)
49.
Cyber Physical Production System
50.
cyber physical production systems (CPPS)
51.
cyber physical social system
52.
cyber physical social systems (cpss)
53.
cyber physical system
54.
cyber power Europe
55.
cyber ranges
56.
cyber red teaming
57.
cyber resilience
58.
cyber risk
59.
cyber situational awareness
60.
cyber stability
61.
cyber team communication
62.
cyber threat
63.
cyber threat communication
64.
cyber threats
65.
cyber war
66.
cyber warfare
67.
cyber warriors
68.
cyber weapons
69.
cyber-attack
70.
cyber-attack pathways
71.
cyber-insurance
72.
cyber-paternalism
73.
cyber-physical energy systems
74.
cyber-physical social system (CPSS)
75.
cyber-physical system
76.
Cyber-Physical System (CPS)
77.
cyber-physical system logistic robot
78.
cyber-physical systems
79.
Cyber-Physical Systems (CPS)
80.
cyber-risks
81.
cyber-space nexus
82.
cyber-vulnerabilities
83.
Defensive Cyber Operations
84.
EU cyber policy
85.
international cyber norms
86.
military cyber
87.
mobile cyber-physical system
88.
NATO cyber operations definitions
89.
NATO Cyber Range
90.
Offensive Cyber Operations
91.
perceived cyber risks and threats
92.
responsive cyber defence
93.
Socio-Cyber-Physical Systems
94.
space cyber range
95.
technical cyber exercise
96.
ad-hoc sensor networks security
97.
Automatic Security Verification
98.
Blockchain security
99.
cache security
100.
communication system security
101.
comprehensive system of economic security
102.
computer security
103.
cooperative security dilemma
104.
data security
105.
development of security cameras
106.
digital security practices
107.
drinking water security
108.
economic security
109.
economic security of enterprise
110.
emotional security
111.
energy security
112.
energy security indicator
113.
Estonian information security standard
114.
graded security
115.
hardware security
116.
hardware security primitive
117.
human security
118.
information security
119.
information security and privacy
120.
internal security
121.
international security
122.
investment and innovation security
123.
IPv6 security
124.
IT security
125.
IT security management
126.
job security
127.
long-term security
128.
metadata model for security measures
129.
Middle Eastern security
130.
Mobile security
131.
national security
132.
NATO. Science for Peace and Security Program
133.
network security
134.
network security monitoring
135.
OSCE (Organization for Security and Co-operation in Europe)
136.
passenger’s security
137.
policy-based routing security
138.
political and security cultures
139.
post-quantum security
140.
power system security
141.
quantitative security
142.
regional security
143.
RISC-V Security Verification
144.
safety and security testing
145.
security
146.
security adaptation
147.
security alert prioritization
148.
security analysis
149.
security and justice (AFSJ)
150.
Security and political science
151.
security and privacy
152.
security and privacy in smart grids
153.
Security Assertion Mining
154.
security closure
155.
Security Coverage
156.
security dataset
157.
security dilemma
158.
Security evaluation
159.
security evaluation instruments
160.
Security limitations
161.
security log analysis
162.
security management
163.
security model
164.
security monitoring
165.
security notion
166.
security objectives
167.
security of data
168.
security of supply
169.
security operation center
170.
security operations center
171.
security patterns
172.
security policy
173.
security problem definition
174.
security proof
175.
security protocols
176.
security requirements
177.
security requirements engineering
178.
security risk assessment
179.
security risk management
180.
security risks
181.
security strategies
182.
security systems for military objects
183.
security testing
184.
security training
185.
security verification
186.
security-by-design
187.
social security planning
188.
societal security
189.
system of economic security
190.
system security
191.
terrorism security
192.
transmission System Security
193.
voting privacy and security
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT