Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber security exercises (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/198)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
i-tee : a fully automated cyber defense competition for students
Ernits, Margus
;
Tammekänd, Johannes
;
Maennel, Olaf Manuel
SIGCOMM '15 : proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication : August 17-21, 2015, London, United Kingdom
2015
/
p. 113-114 : ill
https://doi.org/10.1145/2785956.2790033
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
193
1.
cyber security exercises
2.
cybersecurity exercises
3.
organising cybersecurity exercises
4.
cyber defence exercises
5.
cyber defense exercises
6.
cyber security
7.
cyber security education
8.
cyber security monitoring
9.
cyber security strategies
10.
cyber-security
11.
national cyber security strategy
12.
aquatic exercises
13.
exercises
14.
autonomous vehicle cyber range
15.
cloud-based cyber-physical systems (C2PS)
16.
cognitive cyber warfare
17.
cyber
18.
Cyber “Maastricht”
19.
cyber architecture
20.
cyber attacks
21.
cyber battle damage assessment
22.
Cyber Bio-analytical Physical Systems (CBPSs)
23.
cyber challenge
24.
cyber command
25.
cyber conflict
26.
cyber contingency
27.
cyber crime
28.
cyber crime pathways
29.
cyber crime scripting
30.
Cyber crisis management
31.
cyber defence
32.
cyber defence exercise
33.
cyber defense education
34.
cyber defense exercise
35.
cyber dependence
36.
cyber diplomacy
37.
cyber exercise
38.
cyber hygiene
39.
cyber impact assessment
40.
cyber incidents
41.
cyber insurance
42.
cyber intrusion detection
43.
cyber kill chain
44.
cyber operation
45.
cyber operation officer
46.
cyber operations
47.
cyber physical energy systems
48.
cyber physical power system (CPPS)
49.
Cyber Physical Production System
50.
cyber physical production systems (CPPS)
51.
cyber physical social system
52.
cyber physical social systems (cpss)
53.
cyber physical system
54.
cyber power Europe
55.
cyber ranges
56.
cyber red teaming
57.
cyber resilience
58.
cyber risk
59.
cyber situational awareness
60.
cyber stability
61.
cyber team communication
62.
cyber threat
63.
cyber threat communication
64.
cyber threats
65.
cyber war
66.
cyber warfare
67.
cyber warriors
68.
cyber weapons
69.
cyber-attack
70.
cyber-attack pathways
71.
cyber-insurance
72.
cyber-paternalism
73.
cyber-physical energy systems
74.
cyber-physical social system (CPSS)
75.
cyber-physical system
76.
Cyber-Physical System (CPS)
77.
cyber-physical system logistic robot
78.
cyber-physical systems
79.
Cyber-Physical Systems (CPS)
80.
cyber-risks
81.
cyber-space nexus
82.
cyber-vulnerabilities
83.
Defensive Cyber Operations
84.
EU cyber policy
85.
international cyber norms
86.
military cyber
87.
mobile cyber-physical system
88.
NATO cyber operations definitions
89.
NATO Cyber Range
90.
Offensive Cyber Operations
91.
perceived cyber risks and threats
92.
responsive cyber defence
93.
Socio-Cyber-Physical Systems
94.
space cyber range
95.
technical cyber exercise
96.
ad-hoc sensor networks security
97.
Automatic Security Verification
98.
Blockchain security
99.
cache security
100.
communication system security
101.
comprehensive system of economic security
102.
computer security
103.
cooperative security dilemma
104.
data security
105.
development of security cameras
106.
digital security practices
107.
drinking water security
108.
economic security
109.
economic security of enterprise
110.
emotional security
111.
energy security
112.
energy security indicator
113.
Estonian information security standard
114.
graded security
115.
hardware security
116.
hardware security primitive
117.
human security
118.
information security
119.
information security and privacy
120.
internal security
121.
international security
122.
investment and innovation security
123.
IPv6 security
124.
IT security
125.
IT security management
126.
job security
127.
long-term security
128.
metadata model for security measures
129.
Middle Eastern security
130.
Mobile security
131.
national security
132.
NATO. Science for Peace and Security Program
133.
network security
134.
network security monitoring
135.
OSCE (Organization for Security and Co-operation in Europe)
136.
passenger’s security
137.
policy-based routing security
138.
political and security cultures
139.
post-quantum security
140.
power system security
141.
quantitative security
142.
regional security
143.
RISC-V Security Verification
144.
safety and security testing
145.
security
146.
security adaptation
147.
security alert prioritization
148.
security analysis
149.
security and justice (AFSJ)
150.
Security and political science
151.
security and privacy
152.
security and privacy in smart grids
153.
Security Assertion Mining
154.
security closure
155.
Security Coverage
156.
security dataset
157.
security dilemma
158.
Security evaluation
159.
security evaluation instruments
160.
Security limitations
161.
security log analysis
162.
security management
163.
security model
164.
security monitoring
165.
security notion
166.
security objectives
167.
security of data
168.
security of supply
169.
security operation center
170.
security operations center
171.
security patterns
172.
security policy
173.
security problem definition
174.
security proof
175.
security protocols
176.
security requirements
177.
security requirements engineering
178.
security risk assessment
179.
security risk management
180.
security risks
181.
security strategies
182.
security systems for military objects
183.
security testing
184.
security training
185.
security verification
186.
security-by-design
187.
social security planning
188.
societal security
189.
system of economic security
190.
system security
191.
terrorism security
192.
transmission System Security
193.
voting privacy and security
märksõna
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT