Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security exercises (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/228)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
i-tee : a fully automated cyber defense competition for students
Ernits, Margus
;
Tammekänd, Johannes
;
Maennel, Olaf Manuel
SIGCOMM '15 : proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication : August 17-21, 2015, London, United Kingdom
2015
/
p. 113-114 : ill
https://doi.org/10.1145/2785956.2790033
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
222
1.
cyber security exercises
2.
cybersecurity exercises
3.
organising cybersecurity exercises
4.
cyber defence exercises
5.
cyber defense exercises
6.
cyber operations exercises
7.
cyber security
8.
cyber security education
9.
cyber security monitoring
10.
cyber security monitoring in maritime
11.
cyber security strategies
12.
cyber-physical system security
13.
cyber-security
14.
maritime cyber security
15.
maritime cyber security operations centers
16.
national cyber security strategy
17.
aquatic exercises
18.
exercises
19.
automated cyber defense
20.
autonomous vehicle cyber range
21.
cloud-based cyber-physical systems (C2PS)
22.
cognitive cyber warfare
23.
cyber
24.
Cyber “Maastricht”
25.
cyber architecture
26.
cyber attacks
27.
cyber battle damage assessment
28.
Cyber Bio-analytical Physical Systems (CBPSs)
29.
cyber challenge
30.
cyber command
31.
Cyber Command organisational structure
32.
cyber conflict
33.
cyber contingency
34.
cyber crime
35.
cyber crime pathways
36.
cyber crime scripting
37.
Cyber crisis management
38.
cyber defence
39.
cyber defence exercise
40.
cyber defense education
41.
cyber defense exercise
42.
cyber dependence
43.
cyber diplomacy
44.
cyber exercise
45.
cyber hygiene
46.
cyber impact assessment
47.
cyber incidents
48.
cyber insurance
49.
cyber intrusion detection
50.
cyber kill chain
51.
cyber operation
52.
cyber operation officer
53.
cyber operations
54.
cyber physical energy systems
55.
cyber physical power system (CPPS)
56.
Cyber Physical Production System
57.
cyber physical production systems (CPPS)
58.
cyber physical social system
59.
cyber physical social systems (cpss)
60.
cyber physical system
61.
Cyber Planning tool
62.
cyber power Europe
63.
cyber ranges
64.
cyber red teaming
65.
cyber resilience
66.
cyber resilience at sea
67.
cyber risk
68.
cyber risk management in shipping
69.
cyber situational awareness
70.
cyber stability
71.
cyber team communication
72.
cyber threat
73.
cyber threat communication
74.
Cyber Threat Intelligence
75.
cyber threats
76.
cyber war
77.
cyber warfare
78.
cyber warriors
79.
cyber weapons
80.
cyber-attack
81.
cyber-attack pathways
82.
Cyber-attacks
83.
cyber-insurance
84.
cyber-paternalism
85.
cyber-physical energy systems
86.
cyber-physical social system (CPSS)
87.
cyber-physical system
88.
Cyber-Physical System (CPS)
89.
cyber-physical system logistic robot
90.
cyber-physical systems
91.
Cyber-Physical Systems (CPS)
92.
cyber-risks
93.
cyber-space nexus
94.
cyber-vulnerabilities
95.
Defensive Cyber Operations
96.
EU cyber policy
97.
international cyber norms
98.
military cyber
99.
mobile cyber-physical system
100.
NATO cyber operations definitions
101.
NATO Cyber Range
102.
Offensive Cyber Operations
103.
perceived cyber risks and threats
104.
responsive cyber defence
105.
Socio-Cyber-Physical Systems
106.
space cyber range
107.
technical cyber exercise
108.
Visualising Cyber Planning
109.
ad-hoc sensor networks security
110.
Automatic Security Verification
111.
Blockchain security
112.
cache security
113.
cloud security
114.
communication system security
115.
comprehensive system of economic security
116.
computer security
117.
cooperative security dilemma
118.
data and information security
119.
data security
120.
development of security cameras
121.
digital security practices
122.
drinking water security
123.
economic security
124.
economic security of enterprise
125.
emotional security
126.
energy security
127.
energy security indicator
128.
Estonian information security standard
129.
graded security
130.
hardware security
131.
hardware security primitive
132.
high level of security
133.
Homeland security
134.
human security
135.
information security
136.
information security and privacy
137.
initial level of security
138.
internal security
139.
international security
140.
investment and innovation security
141.
IPv6 security
142.
IT security
143.
IT security management
144.
job security
145.
long-term security
146.
Maritime Security Operations Center (M-SOC)
147.
medium level of security
148.
metadata model for security measures
149.
Middle Eastern security
150.
Mobile security
151.
national security
152.
NATO. Science for Peace and Security Program
153.
network security
154.
network security monitoring
155.
OSCE (Organization for Security and Co-operation in Europe)
156.
passenger’s security
157.
policy-based routing security
158.
political and security cultures
159.
post-quantum security
160.
power system security
161.
quantitative security
162.
regional security
163.
RISC-V Security Verification
164.
Safety and Security in Sea Transportation
165.
safety and security testing
166.
security
167.
security adaptation
168.
security alert prioritization
169.
security analysis
170.
security and justice (AFSJ)
171.
Security and political science
172.
security and privacy
173.
security and privacy in smart grids
174.
Security Assertion
175.
Security Assertion Mining
176.
security closure
177.
Security Coverage
178.
security dataset
179.
security dilemma
180.
Security evaluation
181.
security evaluation instruments
182.
Security Level Evaluation
183.
Security limitations
184.
security log analysis
185.
security management
186.
security model
187.
security monitoring
188.
security notion
189.
security objectives
190.
security of data
191.
security of supply
192.
security operation center
193.
security operations center
194.
security patterns
195.
security policy
196.
security problem definition
197.
security proof
198.
security protocols
199.
security requirements
200.
security requirements engineering
201.
security research
202.
security risk assessment
203.
security risk management
204.
security risks
205.
security science and technology
206.
security strategies
207.
security systems for military objects
208.
security testing
209.
security training
210.
security verification
211.
security-by-design
212.
social security planning
213.
societal security
214.
software security
215.
software security level
216.
software security subcharacteristics
217.
sufficient level of security
218.
system of economic security
219.
system security
220.
terrorism security
221.
transmission System Security
222.
voting privacy and security
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT