Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security exercises (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/225)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
i-tee : a fully automated cyber defense competition for students
Ernits, Margus
;
Tammekänd, Johannes
;
Maennel, Olaf Manuel
SIGCOMM '15 : proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication : August 17-21, 2015, London, United Kingdom
2015
/
p. 113-114 : ill
https://doi.org/10.1145/2785956.2790033
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
219
1.
cyber security exercises
2.
cybersecurity exercises
3.
organising cybersecurity exercises
4.
cyber defence exercises
5.
cyber defense exercises
6.
cyber operations exercises
7.
cyber security
8.
cyber security education
9.
cyber security monitoring
10.
cyber security strategies
11.
cyber-security
12.
maritime cyber security
13.
maritime cyber security operations centers
14.
national cyber security strategy
15.
aquatic exercises
16.
exercises
17.
autonomous vehicle cyber range
18.
cloud-based cyber-physical systems (C2PS)
19.
cognitive cyber warfare
20.
cyber
21.
Cyber “Maastricht”
22.
cyber architecture
23.
cyber attacks
24.
cyber battle damage assessment
25.
Cyber Bio-analytical Physical Systems (CBPSs)
26.
cyber challenge
27.
cyber command
28.
Cyber Command organisational structure
29.
cyber conflict
30.
cyber contingency
31.
cyber crime
32.
cyber crime pathways
33.
cyber crime scripting
34.
Cyber crisis management
35.
cyber defence
36.
cyber defence exercise
37.
cyber defense education
38.
cyber defense exercise
39.
cyber dependence
40.
cyber diplomacy
41.
cyber exercise
42.
cyber hygiene
43.
cyber impact assessment
44.
cyber incidents
45.
cyber insurance
46.
cyber intrusion detection
47.
cyber kill chain
48.
cyber operation
49.
cyber operation officer
50.
cyber operations
51.
cyber physical energy systems
52.
cyber physical power system (CPPS)
53.
Cyber Physical Production System
54.
cyber physical production systems (CPPS)
55.
cyber physical social system
56.
cyber physical social systems (cpss)
57.
cyber physical system
58.
Cyber Planning tool
59.
cyber power Europe
60.
cyber ranges
61.
cyber red teaming
62.
cyber resilience
63.
cyber resilience at sea
64.
cyber risk
65.
cyber risk management in shipping
66.
cyber situational awareness
67.
cyber stability
68.
cyber team communication
69.
cyber threat
70.
cyber threat communication
71.
Cyber Threat Intelligence
72.
cyber threats
73.
cyber war
74.
cyber warfare
75.
cyber warriors
76.
cyber weapons
77.
cyber-attack
78.
cyber-attack pathways
79.
Cyber-attacks
80.
cyber-insurance
81.
cyber-paternalism
82.
cyber-physical energy systems
83.
cyber-physical social system (CPSS)
84.
cyber-physical system
85.
Cyber-Physical System (CPS)
86.
cyber-physical system logistic robot
87.
cyber-physical systems
88.
Cyber-Physical Systems (CPS)
89.
cyber-risks
90.
cyber-space nexus
91.
cyber-vulnerabilities
92.
Defensive Cyber Operations
93.
EU cyber policy
94.
international cyber norms
95.
military cyber
96.
mobile cyber-physical system
97.
NATO cyber operations definitions
98.
NATO Cyber Range
99.
Offensive Cyber Operations
100.
perceived cyber risks and threats
101.
responsive cyber defence
102.
Socio-Cyber-Physical Systems
103.
space cyber range
104.
technical cyber exercise
105.
Visualising Cyber Planning
106.
ad-hoc sensor networks security
107.
Automatic Security Verification
108.
Blockchain security
109.
cache security
110.
cloud security
111.
communication system security
112.
comprehensive system of economic security
113.
computer security
114.
cooperative security dilemma
115.
data and information security
116.
data security
117.
development of security cameras
118.
digital security practices
119.
drinking water security
120.
economic security
121.
economic security of enterprise
122.
emotional security
123.
energy security
124.
energy security indicator
125.
Estonian information security standard
126.
graded security
127.
hardware security
128.
hardware security primitive
129.
high level of security
130.
Homeland security
131.
human security
132.
information security
133.
information security and privacy
134.
initial level of security
135.
internal security
136.
international security
137.
investment and innovation security
138.
IPv6 security
139.
IT security
140.
IT security management
141.
job security
142.
long-term security
143.
Maritime Security Operations Center (M-SOC)
144.
medium level of security
145.
metadata model for security measures
146.
Middle Eastern security
147.
Mobile security
148.
national security
149.
NATO. Science for Peace and Security Program
150.
network security
151.
network security monitoring
152.
OSCE (Organization for Security and Co-operation in Europe)
153.
passenger’s security
154.
policy-based routing security
155.
political and security cultures
156.
post-quantum security
157.
power system security
158.
quantitative security
159.
regional security
160.
RISC-V Security Verification
161.
Safety and Security in Sea Transportation
162.
safety and security testing
163.
security
164.
security adaptation
165.
security alert prioritization
166.
security analysis
167.
security and justice (AFSJ)
168.
Security and political science
169.
security and privacy
170.
security and privacy in smart grids
171.
Security Assertion
172.
Security Assertion Mining
173.
security closure
174.
Security Coverage
175.
security dataset
176.
security dilemma
177.
Security evaluation
178.
security evaluation instruments
179.
Security Level Evaluation
180.
Security limitations
181.
security log analysis
182.
security management
183.
security model
184.
security monitoring
185.
security notion
186.
security objectives
187.
security of data
188.
security of supply
189.
security operation center
190.
security operations center
191.
security patterns
192.
security policy
193.
security problem definition
194.
security proof
195.
security protocols
196.
security requirements
197.
security requirements engineering
198.
security research
199.
security risk assessment
200.
security risk management
201.
security risks
202.
security science and technology
203.
security strategies
204.
security systems for military objects
205.
security testing
206.
security training
207.
security verification
208.
security-by-design
209.
social security planning
210.
societal security
211.
software security
212.
software security level
213.
software security subcharacteristics
214.
sufficient level of security
215.
system of economic security
216.
system security
217.
terrorism security
218.
transmission System Security
219.
voting privacy and security
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT