Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security training (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/149)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Enterprise security analysis and training experience
Ojamaa, Andres
;
Tõugu, Enn
Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers
2016
/
p. 200-208 : ill
https://doi.org/10.1007/978-3-319-31664-2_21
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
2
book article
Frankenstack : real-time cyberattack detection and feedback system for technical cyber exercises
Pihelgas, Mauno
;
Kont, Markus
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 396-402
https://doi.org/10.1109/CSR51186.2021.9527923
book article
Number of records 2, displaying
1 - 2
keyword
147
1.
security training
2.
cybersecurity practical training
3.
cybersecurity training
4.
ADR Regulations Training Course
5.
ADR regulations training courses
6.
advanced training
7.
adversarial training
8.
aerobic training
9.
care workers training
10.
civil service training
11.
civil-service training
12.
cognitive training
13.
continual training
14.
design management training
15.
DG training courses
16.
distance training
17.
educational and training programs
18.
e-Governance training
19.
general training
20.
high-intensity interval training
21.
management training
22.
maritime education and training
23.
maritime higher education and training (MHET)
24.
marketing training
25.
multilingual training
26.
panel training
27.
pedagogical training
28.
PhD training
29.
research and training scenarios
30.
resistance training
31.
safety training
32.
self-training
33.
simulation training
34.
small training data set
35.
teacher training
36.
technical teacher training
37.
technical training
38.
training
39.
training and education
40.
training and research tool
41.
training data
42.
Training gap detector
43.
training needs analysis
44.
training needs assessment
45.
training set optimization
46.
weakly supervised training
47.
web-based training
48.
vocational education and training
49.
vocational education and training VET
50.
ad-hoc sensor networks security
51.
Automatic Security Verification
52.
Blockchain security
53.
cache security
54.
communication system security
55.
comprehensive system of economic security
56.
computer security
57.
cooperative security dilemma
58.
cyber security
59.
cyber security education
60.
cyber security exercises
61.
cyber security strategies
62.
cyber-security
63.
data security
64.
development of security cameras
65.
drinking water security
66.
economic security
67.
economic security of enterprise
68.
emotional security
69.
energy security
70.
energy security indicator
71.
Estonian information security standard
72.
graded security
73.
hardware security
74.
hardware security primitive
75.
human security
76.
information security
77.
internal security
78.
international security
79.
investment and innovation security
80.
IPv6 security
81.
IT security
82.
IT security management
83.
job security
84.
long-term security
85.
metadata model for security measures
86.
Middle Eastern security
87.
Mobile security
88.
national cyber security strategy
89.
national security
90.
NATO. Science for Peace and Security Program
91.
network security
92.
network security monitoring
93.
OSCE (Organization for Security and Co-operation in Europe)
94.
passenger’s security
95.
policy-based routing security
96.
political and security cultures
97.
post-quantum security
98.
power system security
99.
quantitative security
100.
regional security
101.
RISC-V Security Verification
102.
safety and security testing
103.
security
104.
security adaptation
105.
security alert prioritization
106.
security analysis
107.
security and justice (AFSJ)
108.
security and privacy
109.
security and privacy in smart grids
110.
Security Assertion Mining
111.
security closure
112.
Security Coverage
113.
security dataset
114.
security dilemma
115.
Security evaluation
116.
security evaluation instruments
117.
security log analysis
118.
security management
119.
security model
120.
security monitoring
121.
security notion
122.
security objectives
123.
security of data
124.
security of supply
125.
security operation center
126.
security operations center
127.
security patterns
128.
security policy
129.
security problem definition
130.
security proof
131.
security protocols
132.
security requirements
133.
security requirements engineering
134.
security risk assessment
135.
security risk management
136.
security strategies
137.
security systems for military objects
138.
security testing
139.
security verification
140.
security-by-design
141.
social security planning
142.
societal security
143.
system of economic security
144.
system security
145.
terrorism security
146.
transmission System Security
147.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT