Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security training (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/180)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Enterprise security analysis and training experience
Ojamaa, Andres
;
Tõugu, Enn
Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers
2016
/
p. 200-208 : ill
https://doi.org/10.1007/978-3-319-31664-2_21
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
2
book article
Frankenstack : real-time cyberattack detection and feedback system for technical cyber exercises
Pihelgas, Mauno
;
Kont, Markus
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 396-402
https://doi.org/10.1109/CSR51186.2021.9527923
book article
Number of records 2, displaying
1 - 2
keyword
178
1.
security training
2.
cybersecurity practical training
3.
cybersecurity training
4.
ADR Regulations Training Course
5.
ADR regulations training courses
6.
advanced training
7.
adversarial training
8.
aerobic training
9.
care workers training
10.
civil service training
11.
civil-service training
12.
cognitive training
13.
continual training
14.
design management training
15.
DG training courses
16.
distance training
17.
Education and Training Conference
18.
educational and training programs
19.
e-Governance training
20.
general training
21.
high-intensity interval training
22.
incident management training
23.
Joint training
24.
management training
25.
maritime education and training
26.
maritime higher education and training (MHET)
27.
marketing training
28.
multilingual training
29.
panel training
30.
pedagogical training
31.
PhD training
32.
professional training
33.
research and training scenarios
34.
resistance training
35.
safety training
36.
self-training
37.
simulation training
38.
small training data set
39.
teacher training
40.
teacher-training
41.
technical teacher training
42.
technical training
43.
training
44.
training and education
45.
training and research tool
46.
training data
47.
Training gap detector
48.
training needs analysis
49.
training needs assessment
50.
training set optimization
51.
weakly supervised training
52.
web-based training
53.
vocational education and training
54.
vocational education and training VET
55.
ad-hoc sensor networks security
56.
Automatic Security Verification
57.
Blockchain security
58.
cache security
59.
cloud security
60.
communication system security
61.
comprehensive system of economic security
62.
computer security
63.
cooperative security dilemma
64.
cyber security
65.
cyber security education
66.
cyber security exercises
67.
cyber security monitoring
68.
cyber security monitoring in maritime
69.
cyber security strategies
70.
cyber-physical system security
71.
cyber-security
72.
data and information security
73.
data security
74.
development of security cameras
75.
digital security practices
76.
drinking water security
77.
economic security
78.
economic security of enterprise
79.
emotional security
80.
energy security
81.
energy security indicator
82.
Estonian information security standard
83.
graded security
84.
hardware security
85.
hardware security primitive
86.
high level of security
87.
Homeland security
88.
human security
89.
information security
90.
information security and privacy
91.
initial level of security
92.
internal security
93.
international security
94.
investment and innovation security
95.
IPv6 security
96.
IT security
97.
IT security management
98.
job security
99.
long-term security
100.
maritime cyber security
101.
maritime cyber security operations centers
102.
Maritime Security Operations Center (M-SOC)
103.
medium level of security
104.
metadata model for security measures
105.
Middle Eastern security
106.
Mobile security
107.
national cyber security strategy
108.
national security
109.
NATO. Science for Peace and Security Program
110.
network security
111.
network security monitoring
112.
OSCE (Organization for Security and Co-operation in Europe)
113.
passenger’s security
114.
policy-based routing security
115.
political and security cultures
116.
post-quantum security
117.
power system security
118.
quantitative security
119.
regional security
120.
RISC-V Security Verification
121.
safety and security in sea transportation
122.
safety and security testing
123.
security
124.
security adaptation
125.
security alert prioritization
126.
security analysis
127.
security and justice (AFSJ)
128.
Security and political science
129.
security and privacy
130.
security and privacy in smart grids
131.
Security Assertion
132.
Security Assertion Mining
133.
security closure
134.
Security Coverage
135.
security dataset
136.
security dilemma
137.
Security evaluation
138.
security evaluation instruments
139.
Security Level Evaluation
140.
Security limitations
141.
security log analysis
142.
security management
143.
security model
144.
security monitoring
145.
security notion
146.
security objectives
147.
security of data
148.
security of supply
149.
security operation center
150.
security operations center
151.
security patterns
152.
security policy
153.
security problem definition
154.
security proof
155.
security protocols
156.
security requirements
157.
security requirements engineering
158.
security research
159.
security risk assessment
160.
security risk management
161.
security risks
162.
security science and technology
163.
security strategies
164.
security systems for military objects
165.
security testing
166.
security verification
167.
security-by-design
168.
social security planning
169.
societal security
170.
software security
171.
software security level
172.
software security subcharacteristics
173.
sufficient level of security
174.
system of economic security
175.
system security
176.
terrorism security
177.
transmission System Security
178.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT