Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security training (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/159)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Enterprise security analysis and training experience
Ojamaa, Andres
;
Tõugu, Enn
Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers
2016
/
p. 200-208 : ill
https://doi.org/10.1007/978-3-319-31664-2_21
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus
Frankenstack : real-time cyberattack detection and feedback system for technical cyber exercises
Pihelgas, Mauno
;
Kont, Markus
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 396-402
https://doi.org/10.1109/CSR51186.2021.9527923
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
157
1.
security training
2.
cybersecurity practical training
3.
cybersecurity training
4.
ADR Regulations Training Course
5.
ADR regulations training courses
6.
advanced training
7.
adversarial training
8.
aerobic training
9.
care workers training
10.
civil service training
11.
civil-service training
12.
cognitive training
13.
continual training
14.
design management training
15.
DG training courses
16.
distance training
17.
educational and training programs
18.
e-Governance training
19.
general training
20.
high-intensity interval training
21.
incident management training
22.
management training
23.
maritime education and training
24.
maritime higher education and training (MHET)
25.
marketing training
26.
multilingual training
27.
panel training
28.
pedagogical training
29.
PhD training
30.
professional training
31.
research and training scenarios
32.
resistance training
33.
safety training
34.
self-training
35.
simulation training
36.
small training data set
37.
teacher training
38.
technical teacher training
39.
technical training
40.
training
41.
training and education
42.
training and research tool
43.
training data
44.
Training gap detector
45.
training needs analysis
46.
training needs assessment
47.
training set optimization
48.
weakly supervised training
49.
web-based training
50.
vocational education and training
51.
vocational education and training VET
52.
ad-hoc sensor networks security
53.
Automatic Security Verification
54.
Blockchain security
55.
cache security
56.
communication system security
57.
comprehensive system of economic security
58.
computer security
59.
cooperative security dilemma
60.
cyber security
61.
cyber security education
62.
cyber security exercises
63.
cyber security monitoring
64.
cyber security strategies
65.
cyber-security
66.
data and information security
67.
data security
68.
development of security cameras
69.
digital security practices
70.
drinking water security
71.
economic security
72.
economic security of enterprise
73.
emotional security
74.
energy security
75.
energy security indicator
76.
Estonian information security standard
77.
graded security
78.
hardware security
79.
hardware security primitive
80.
human security
81.
information security
82.
information security and privacy
83.
internal security
84.
international security
85.
investment and innovation security
86.
IPv6 security
87.
IT security
88.
IT security management
89.
job security
90.
long-term security
91.
metadata model for security measures
92.
Middle Eastern security
93.
Mobile security
94.
national cyber security strategy
95.
national security
96.
NATO. Science for Peace and Security Program
97.
network security
98.
network security monitoring
99.
OSCE (Organization for Security and Co-operation in Europe)
100.
passenger’s security
101.
policy-based routing security
102.
political and security cultures
103.
post-quantum security
104.
power system security
105.
quantitative security
106.
regional security
107.
RISC-V Security Verification
108.
safety and security testing
109.
security
110.
security adaptation
111.
security alert prioritization
112.
security analysis
113.
security and justice (AFSJ)
114.
Security and political science
115.
security and privacy
116.
security and privacy in smart grids
117.
Security Assertion Mining
118.
security closure
119.
Security Coverage
120.
security dataset
121.
security dilemma
122.
Security evaluation
123.
security evaluation instruments
124.
Security limitations
125.
security log analysis
126.
security management
127.
security model
128.
security monitoring
129.
security notion
130.
security objectives
131.
security of data
132.
security of supply
133.
security operation center
134.
security operations center
135.
security patterns
136.
security policy
137.
security problem definition
138.
security proof
139.
security protocols
140.
security requirements
141.
security requirements engineering
142.
security risk assessment
143.
security risk management
144.
security risks
145.
security science and technology
146.
security strategies
147.
security systems for military objects
148.
security testing
149.
security verification
150.
security-by-design
151.
social security planning
152.
societal security
153.
system of economic security
154.
system security
155.
terrorism security
156.
transmission System Security
157.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT