Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
cyber security exercises (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/164)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
i-tee : a fully automated cyber defense competition for students
Ernits, Margus
;
Tammekänd, Johannes
;
Maennel, Olaf Manuel
SIGCOMM '15 : proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication : August 17-21, 2015, London, United Kingdom
2015
/
p. 113-114 : ill
http://dx.doi.org/10.1145/2785956.2790033
book article
Number of records 1, displaying
1 - 1
keyword
160
1.
cyber security exercises
2.
cybersecurity exercises
3.
organising cybersecurity exercises
4.
cyber defence exercises
5.
cyber defense exercises
6.
cyber security
7.
cyber security education
8.
cyber security strategies
9.
cyber-security
10.
national cyber security strategy
11.
aquatic exercises
12.
exercises
13.
autonomous vehicle cyber range
14.
cloud-based cyber-physical systems (C2PS)
15.
cyber
16.
Cyber “Maastricht”
17.
cyber architecture
18.
cyber attacks
19.
cyber battle damage assessment
20.
Cyber Bio-analytical Physical Systems (CBPSs)
21.
cyber challenge
22.
cyber command
23.
cyber conflict
24.
cyber contingency
25.
cyber crime
26.
cyber crime pathways
27.
cyber crime scripting
28.
Cyber crisis management
29.
cyber defence
30.
cyber defence exercise
31.
cyber defense exercise
32.
cyber dependence
33.
cyber diplomacy
34.
cyber exercise
35.
cyber hygiene
36.
cyber impact assessment
37.
cyber incidents
38.
cyber insurance
39.
cyber kill chain
40.
cyber operation
41.
cyber operations
42.
cyber physical energy systems
43.
cyber physical power system (CPPS)
44.
Cyber Physical Production System
45.
cyber physical production systems (CPPS)
46.
cyber physical system
47.
cyber power Europe
48.
cyber ranges
49.
cyber red teaming
50.
cyber resilience
51.
cyber risk
52.
cyber situational awareness
53.
cyber stability
54.
cyber team communication
55.
cyber threat
56.
cyber threat communication
57.
cyber threats
58.
cyber war
59.
cyber warfare
60.
cyber warriors
61.
cyber weapons
62.
cyber-attack
63.
cyber-attack pathways
64.
cyber-insurance
65.
cyber-paternalism
66.
cyber-physical energy systems
67.
cyber-physical social system (CPSS)
68.
cyber-physical system
69.
Cyber-Physical System (CPS)
70.
cyber-physical system logistic robot
71.
cyber-physical systems
72.
Cyber-Physical Systems (CPS)
73.
cyber-vulnerabilities
74.
EU cyber policy
75.
international cyber norms
76.
military cyber
77.
mobile cyber-physical system
78.
NATO Cyber Range
79.
responsive cyber defence
80.
Socio-Cyber-Physical Systems
81.
technical cyber exercise
82.
ad-hoc sensor networks security
83.
Blockchain security
84.
cache security
85.
communication system security
86.
comprehensive system of economic security
87.
computer security
88.
cooperative security dilemma
89.
data security
90.
development of security cameras
91.
drinking water security
92.
economic security
93.
economic security of enterprise
94.
emotional security
95.
energy security
96.
energy security indicator
97.
graded security
98.
hardware security
99.
hardware security primitive
100.
human security
101.
information security
102.
internal security
103.
international security
104.
investment and innovation security
105.
IPv6 security
106.
IT security
107.
job security
108.
long-term security
109.
metadata model for security measures
110.
Middle Eastern security
111.
Mobile security
112.
national security
113.
NATO. Science for Peace and Security Program
114.
network security
115.
network security monitoring
116.
OSCE (Organization for Security and Co-operation in Europe)
117.
passenger’s security
118.
policy-based routing security
119.
political and security cultures
120.
post-quantum security
121.
power system security
122.
quantitative security
123.
regional security
124.
security
125.
security and privacy
126.
security and privacy in smart grids
127.
security closure
128.
Security Coverage
129.
security dataset
130.
security dilemma
131.
Security evaluation
132.
security log analysis
133.
security management
134.
security model
135.
security monitoring
136.
security notion
137.
security objectives
138.
security of data
139.
security of supply
140.
security operation center
141.
security patterns
142.
security problem definition
143.
security proof
144.
security protocols
145.
security requirements
146.
security requirements engineering
147.
security risk assessment
148.
security risk management
149.
security strategies
150.
security systems for military objects
151.
security testing
152.
security training
153.
security verification
154.
social security planning
155.
societal security
156.
system of economic security
157.
system security
158.
terrorism security
159.
transmission System Security
160.
voting privacy and security
subject term
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
National Computer Security Incident Response Teams (N-CSIRTs)
4.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT