Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security training (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/156)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Enterprise security analysis and training experience
Ojamaa, Andres
;
Tõugu, Enn
Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers
2016
/
p. 200-208 : ill
https://doi.org/10.1007/978-3-319-31664-2_21
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
2
book article
Frankenstack : real-time cyberattack detection and feedback system for technical cyber exercises
Pihelgas, Mauno
;
Kont, Markus
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 396-402
https://doi.org/10.1109/CSR51186.2021.9527923
book article
Number of records 2, displaying
1 - 2
keyword
154
1.
security training
2.
cybersecurity practical training
3.
cybersecurity training
4.
ADR Regulations Training Course
5.
ADR regulations training courses
6.
advanced training
7.
adversarial training
8.
aerobic training
9.
care workers training
10.
civil service training
11.
civil-service training
12.
cognitive training
13.
continual training
14.
design management training
15.
DG training courses
16.
distance training
17.
educational and training programs
18.
e-Governance training
19.
general training
20.
high-intensity interval training
21.
incident management training
22.
management training
23.
maritime education and training
24.
maritime higher education and training (MHET)
25.
marketing training
26.
multilingual training
27.
panel training
28.
pedagogical training
29.
PhD training
30.
professional training
31.
research and training scenarios
32.
resistance training
33.
safety training
34.
self-training
35.
simulation training
36.
small training data set
37.
teacher training
38.
technical teacher training
39.
technical training
40.
training
41.
training and education
42.
training and research tool
43.
training data
44.
Training gap detector
45.
training needs analysis
46.
training needs assessment
47.
training set optimization
48.
weakly supervised training
49.
web-based training
50.
vocational education and training
51.
vocational education and training VET
52.
ad-hoc sensor networks security
53.
Automatic Security Verification
54.
Blockchain security
55.
cache security
56.
communication system security
57.
comprehensive system of economic security
58.
computer security
59.
cooperative security dilemma
60.
cyber security
61.
cyber security education
62.
cyber security exercises
63.
cyber security monitoring
64.
cyber security strategies
65.
cyber-security
66.
data security
67.
development of security cameras
68.
drinking water security
69.
economic security
70.
economic security of enterprise
71.
emotional security
72.
energy security
73.
energy security indicator
74.
Estonian information security standard
75.
graded security
76.
hardware security
77.
hardware security primitive
78.
human security
79.
information security
80.
information security and privacy
81.
internal security
82.
international security
83.
investment and innovation security
84.
IPv6 security
85.
IT security
86.
IT security management
87.
job security
88.
long-term security
89.
metadata model for security measures
90.
Middle Eastern security
91.
Mobile security
92.
national cyber security strategy
93.
national security
94.
NATO. Science for Peace and Security Program
95.
network security
96.
network security monitoring
97.
OSCE (Organization for Security and Co-operation in Europe)
98.
passenger’s security
99.
policy-based routing security
100.
political and security cultures
101.
post-quantum security
102.
power system security
103.
quantitative security
104.
regional security
105.
RISC-V Security Verification
106.
safety and security testing
107.
security
108.
security adaptation
109.
security alert prioritization
110.
security analysis
111.
security and justice (AFSJ)
112.
Security and political science
113.
security and privacy
114.
security and privacy in smart grids
115.
Security Assertion Mining
116.
security closure
117.
Security Coverage
118.
security dataset
119.
security dilemma
120.
Security evaluation
121.
security evaluation instruments
122.
Security limitations
123.
security log analysis
124.
security management
125.
security model
126.
security monitoring
127.
security notion
128.
security objectives
129.
security of data
130.
security of supply
131.
security operation center
132.
security operations center
133.
security patterns
134.
security policy
135.
security problem definition
136.
security proof
137.
security protocols
138.
security requirements
139.
security requirements engineering
140.
security risk assessment
141.
security risk management
142.
security risks
143.
security strategies
144.
security systems for military objects
145.
security testing
146.
security verification
147.
security-by-design
148.
social security planning
149.
societal security
150.
system of economic security
151.
system security
152.
terrorism security
153.
transmission System Security
154.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT