Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber security exercises (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/225)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
i-tee : a fully automated cyber defense competition for students
Ernits, Margus
;
Tammekänd, Johannes
;
Maennel, Olaf Manuel
SIGCOMM '15 : proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication : August 17-21, 2015, London, United Kingdom
2015
/
p. 113-114 : ill
https://doi.org/10.1145/2785956.2790033
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
219
1.
cyber security exercises
2.
cybersecurity exercises
3.
organising cybersecurity exercises
4.
cyber defence exercises
5.
cyber defense exercises
6.
cyber operations exercises
7.
cyber security
8.
cyber security education
9.
cyber security monitoring
10.
cyber security strategies
11.
cyber-security
12.
maritime cyber security
13.
maritime cyber security operations centers
14.
national cyber security strategy
15.
aquatic exercises
16.
exercises
17.
autonomous vehicle cyber range
18.
cloud-based cyber-physical systems (C2PS)
19.
cognitive cyber warfare
20.
cyber
21.
Cyber “Maastricht”
22.
cyber architecture
23.
cyber attacks
24.
cyber battle damage assessment
25.
Cyber Bio-analytical Physical Systems (CBPSs)
26.
cyber challenge
27.
cyber command
28.
Cyber Command organisational structure
29.
cyber conflict
30.
cyber contingency
31.
cyber crime
32.
cyber crime pathways
33.
cyber crime scripting
34.
Cyber crisis management
35.
cyber defence
36.
cyber defence exercise
37.
cyber defense education
38.
cyber defense exercise
39.
cyber dependence
40.
cyber diplomacy
41.
cyber exercise
42.
cyber hygiene
43.
cyber impact assessment
44.
cyber incidents
45.
cyber insurance
46.
cyber intrusion detection
47.
cyber kill chain
48.
cyber operation
49.
cyber operation officer
50.
cyber operations
51.
cyber physical energy systems
52.
cyber physical power system (CPPS)
53.
Cyber Physical Production System
54.
cyber physical production systems (CPPS)
55.
cyber physical social system
56.
cyber physical social systems (cpss)
57.
cyber physical system
58.
Cyber Planning tool
59.
cyber power Europe
60.
cyber ranges
61.
cyber red teaming
62.
cyber resilience
63.
cyber resilience at sea
64.
cyber risk
65.
cyber risk management in shipping
66.
cyber situational awareness
67.
cyber stability
68.
cyber team communication
69.
cyber threat
70.
cyber threat communication
71.
Cyber Threat Intelligence
72.
cyber threats
73.
cyber war
74.
cyber warfare
75.
cyber warriors
76.
cyber weapons
77.
cyber-attack
78.
cyber-attack pathways
79.
Cyber-attacks
80.
cyber-insurance
81.
cyber-paternalism
82.
cyber-physical energy systems
83.
cyber-physical social system (CPSS)
84.
cyber-physical system
85.
Cyber-Physical System (CPS)
86.
cyber-physical system logistic robot
87.
cyber-physical systems
88.
Cyber-Physical Systems (CPS)
89.
cyber-risks
90.
cyber-space nexus
91.
cyber-vulnerabilities
92.
Defensive Cyber Operations
93.
EU cyber policy
94.
international cyber norms
95.
military cyber
96.
mobile cyber-physical system
97.
NATO cyber operations definitions
98.
NATO Cyber Range
99.
Offensive Cyber Operations
100.
perceived cyber risks and threats
101.
responsive cyber defence
102.
Socio-Cyber-Physical Systems
103.
space cyber range
104.
technical cyber exercise
105.
Visualising Cyber Planning
106.
ad-hoc sensor networks security
107.
Automatic Security Verification
108.
Blockchain security
109.
cache security
110.
cloud security
111.
communication system security
112.
comprehensive system of economic security
113.
computer security
114.
cooperative security dilemma
115.
data and information security
116.
data security
117.
development of security cameras
118.
digital security practices
119.
drinking water security
120.
economic security
121.
economic security of enterprise
122.
emotional security
123.
energy security
124.
energy security indicator
125.
Estonian information security standard
126.
graded security
127.
hardware security
128.
hardware security primitive
129.
high level of security
130.
Homeland security
131.
human security
132.
information security
133.
information security and privacy
134.
initial level of security
135.
internal security
136.
international security
137.
investment and innovation security
138.
IPv6 security
139.
IT security
140.
IT security management
141.
job security
142.
long-term security
143.
Maritime Security Operations Center (M-SOC)
144.
medium level of security
145.
metadata model for security measures
146.
Middle Eastern security
147.
Mobile security
148.
national security
149.
NATO. Science for Peace and Security Program
150.
network security
151.
network security monitoring
152.
OSCE (Organization for Security and Co-operation in Europe)
153.
passenger’s security
154.
policy-based routing security
155.
political and security cultures
156.
post-quantum security
157.
power system security
158.
quantitative security
159.
regional security
160.
RISC-V Security Verification
161.
Safety and Security in Sea Transportation
162.
safety and security testing
163.
security
164.
security adaptation
165.
security alert prioritization
166.
security analysis
167.
security and justice (AFSJ)
168.
Security and political science
169.
security and privacy
170.
security and privacy in smart grids
171.
Security Assertion
172.
Security Assertion Mining
173.
security closure
174.
Security Coverage
175.
security dataset
176.
security dilemma
177.
Security evaluation
178.
security evaluation instruments
179.
Security Level Evaluation
180.
Security limitations
181.
security log analysis
182.
security management
183.
security model
184.
security monitoring
185.
security notion
186.
security objectives
187.
security of data
188.
security of supply
189.
security operation center
190.
security operations center
191.
security patterns
192.
security policy
193.
security problem definition
194.
security proof
195.
security protocols
196.
security requirements
197.
security requirements engineering
198.
security research
199.
security risk assessment
200.
security risk management
201.
security risks
202.
security science and technology
203.
security strategies
204.
security systems for military objects
205.
security testing
206.
security training
207.
security verification
208.
security-by-design
209.
social security planning
210.
societal security
211.
software security
212.
software security level
213.
software security subcharacteristics
214.
sufficient level of security
215.
system of economic security
216.
system security
217.
terrorism security
218.
transmission System Security
219.
voting privacy and security
märksõna
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT