Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
security training (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/135)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Enterprise security analysis and training experience
Ojamaa, Andres
;
Tõugu, Enn
Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers
2016
/
p. 200-208 : ill
https://doi.org/10.1007/978-3-319-31664-2_21
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
2
book article
Frankenstack: real-time cyberattack detection and feedback system for technical cyber exercises
Pihelgas, Mauno
;
Kont, Markus
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 396–402
https://doi.org/10.1109/CSR51186.2021.9527923
book article
Number of records 2, displaying
1 - 2
keyword
133
1.
security training
2.
cybersecurity training
3.
ADR Regulations Training Course
4.
ADR regulations training courses
5.
advanced training
6.
adversarial training
7.
aerobic training
8.
care workers training
9.
civil-service training
10.
cognitive training
11.
continual training
12.
DG training courses
13.
distance training
14.
e-Governance training
15.
general training
16.
high-intensity interval training
17.
management training
18.
maritime education and training
19.
marketing training
20.
multilingual training
21.
panel training
22.
pedagogical training
23.
PhD training
24.
research and training scenarios
25.
resistance training
26.
safety training
27.
self-training
28.
simulation training
29.
teacher training
30.
technical teacher training
31.
technical training
32.
training
33.
training and education
34.
training and research tool
35.
training data
36.
Training gap detector
37.
training needs analysis
38.
training needs assessment
39.
training set optimization
40.
weakly supervised training
41.
web-based training
42.
vocational education and training
43.
vocational education and training VET
44.
ad-hoc sensor networks security
45.
Automatic Security Verification
46.
Blockchain security
47.
cache security
48.
communication system security
49.
comprehensive system of economic security
50.
computer security
51.
cooperative security dilemma
52.
cyber security
53.
cyber security education
54.
cyber security exercises
55.
cyber security strategies
56.
cyber-security
57.
data security
58.
development of security cameras
59.
drinking water security
60.
economic security
61.
economic security of enterprise
62.
emotional security
63.
energy security
64.
energy security indicator
65.
graded security
66.
hardware security
67.
hardware security primitive
68.
human security
69.
information security
70.
internal security
71.
international security
72.
investment and innovation security
73.
IPv6 security
74.
IT security
75.
IT security management
76.
job security
77.
long-term security
78.
metadata model for security measures
79.
Middle Eastern security
80.
Mobile security
81.
national cyber security strategy
82.
national security
83.
NATO. Science for Peace and Security Program
84.
network security
85.
network security monitoring
86.
OSCE (Organization for Security and Co-operation in Europe)
87.
passenger’s security
88.
policy-based routing security
89.
political and security cultures
90.
post-quantum security
91.
power system security
92.
quantitative security
93.
regional security
94.
RISC-V Security Verification
95.
security
96.
security and justice (AFSJ)
97.
security and privacy
98.
security and privacy in smart grids
99.
Security Assertion Mining
100.
security closure
101.
Security Coverage
102.
security dataset
103.
security dilemma
104.
Security evaluation
105.
security log analysis
106.
security management
107.
security model
108.
security monitoring
109.
security notion
110.
security objectives
111.
security of data
112.
security of supply
113.
security operation center
114.
security patterns
115.
security policy
116.
security problem definition
117.
security proof
118.
security protocols
119.
security requirements
120.
security requirements engineering
121.
security risk assessment
122.
security risk management
123.
security strategies
124.
security systems for military objects
125.
security testing
126.
security verification
127.
social security planning
128.
societal security
129.
system of economic security
130.
system security
131.
terrorism security
132.
transmission System Security
133.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT