Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security training (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/159)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Enterprise security analysis and training experience
Ojamaa, Andres
;
Tõugu, Enn
Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers
2016
/
p. 200-208 : ill
https://doi.org/10.1007/978-3-319-31664-2_21
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
2
book article
Frankenstack : real-time cyberattack detection and feedback system for technical cyber exercises
Pihelgas, Mauno
;
Kont, Markus
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 396-402
https://doi.org/10.1109/CSR51186.2021.9527923
book article
Number of records 2, displaying
1 - 2
keyword
157
1.
security training
2.
cybersecurity practical training
3.
cybersecurity training
4.
ADR Regulations Training Course
5.
ADR regulations training courses
6.
advanced training
7.
adversarial training
8.
aerobic training
9.
care workers training
10.
civil service training
11.
civil-service training
12.
cognitive training
13.
continual training
14.
design management training
15.
DG training courses
16.
distance training
17.
educational and training programs
18.
e-Governance training
19.
general training
20.
high-intensity interval training
21.
incident management training
22.
management training
23.
maritime education and training
24.
maritime higher education and training (MHET)
25.
marketing training
26.
multilingual training
27.
panel training
28.
pedagogical training
29.
PhD training
30.
professional training
31.
research and training scenarios
32.
resistance training
33.
safety training
34.
self-training
35.
simulation training
36.
small training data set
37.
teacher training
38.
technical teacher training
39.
technical training
40.
training
41.
training and education
42.
training and research tool
43.
training data
44.
Training gap detector
45.
training needs analysis
46.
training needs assessment
47.
training set optimization
48.
weakly supervised training
49.
web-based training
50.
vocational education and training
51.
vocational education and training VET
52.
ad-hoc sensor networks security
53.
Automatic Security Verification
54.
Blockchain security
55.
cache security
56.
communication system security
57.
comprehensive system of economic security
58.
computer security
59.
cooperative security dilemma
60.
cyber security
61.
cyber security education
62.
cyber security exercises
63.
cyber security monitoring
64.
cyber security strategies
65.
cyber-security
66.
data and information security
67.
data security
68.
development of security cameras
69.
digital security practices
70.
drinking water security
71.
economic security
72.
economic security of enterprise
73.
emotional security
74.
energy security
75.
energy security indicator
76.
Estonian information security standard
77.
graded security
78.
hardware security
79.
hardware security primitive
80.
human security
81.
information security
82.
information security and privacy
83.
internal security
84.
international security
85.
investment and innovation security
86.
IPv6 security
87.
IT security
88.
IT security management
89.
job security
90.
long-term security
91.
metadata model for security measures
92.
Middle Eastern security
93.
Mobile security
94.
national cyber security strategy
95.
national security
96.
NATO. Science for Peace and Security Program
97.
network security
98.
network security monitoring
99.
OSCE (Organization for Security and Co-operation in Europe)
100.
passenger’s security
101.
policy-based routing security
102.
political and security cultures
103.
post-quantum security
104.
power system security
105.
quantitative security
106.
regional security
107.
RISC-V Security Verification
108.
safety and security testing
109.
security
110.
security adaptation
111.
security alert prioritization
112.
security analysis
113.
security and justice (AFSJ)
114.
Security and political science
115.
security and privacy
116.
security and privacy in smart grids
117.
Security Assertion Mining
118.
security closure
119.
Security Coverage
120.
security dataset
121.
security dilemma
122.
Security evaluation
123.
security evaluation instruments
124.
Security limitations
125.
security log analysis
126.
security management
127.
security model
128.
security monitoring
129.
security notion
130.
security objectives
131.
security of data
132.
security of supply
133.
security operation center
134.
security operations center
135.
security patterns
136.
security policy
137.
security problem definition
138.
security proof
139.
security protocols
140.
security requirements
141.
security requirements engineering
142.
security risk assessment
143.
security risk management
144.
security risks
145.
security science and technology
146.
security strategies
147.
security systems for military objects
148.
security testing
149.
security verification
150.
security-by-design
151.
social security planning
152.
societal security
153.
system of economic security
154.
system security
155.
terrorism security
156.
transmission System Security
157.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT