Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security exercises (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/221)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
i-tee : a fully automated cyber defense competition for students
Ernits, Margus
;
Tammekänd, Johannes
;
Maennel, Olaf Manuel
SIGCOMM '15 : proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication : August 17-21, 2015, London, United Kingdom
2015
/
p. 113-114 : ill
https://doi.org/10.1145/2785956.2790033
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
215
1.
cyber security exercises
2.
cybersecurity exercises
3.
organising cybersecurity exercises
4.
cyber defence exercises
5.
cyber defense exercises
6.
cyber operations exercises
7.
cyber security
8.
cyber security education
9.
cyber security monitoring
10.
cyber security strategies
11.
cyber-security
12.
maritime cyber security
13.
maritime cyber security operations centers
14.
national cyber security strategy
15.
aquatic exercises
16.
exercises
17.
autonomous vehicle cyber range
18.
cloud-based cyber-physical systems (C2PS)
19.
cognitive cyber warfare
20.
cyber
21.
Cyber “Maastricht”
22.
cyber architecture
23.
cyber attacks
24.
cyber battle damage assessment
25.
Cyber Bio-analytical Physical Systems (CBPSs)
26.
cyber challenge
27.
cyber command
28.
Cyber Command organisational structure
29.
cyber conflict
30.
cyber contingency
31.
cyber crime
32.
cyber crime pathways
33.
cyber crime scripting
34.
Cyber crisis management
35.
cyber defence
36.
cyber defence exercise
37.
cyber defense education
38.
cyber defense exercise
39.
cyber dependence
40.
cyber diplomacy
41.
cyber exercise
42.
cyber hygiene
43.
cyber impact assessment
44.
cyber incidents
45.
cyber insurance
46.
cyber intrusion detection
47.
cyber kill chain
48.
cyber operation
49.
cyber operation officer
50.
cyber operations
51.
cyber physical energy systems
52.
cyber physical power system (CPPS)
53.
Cyber Physical Production System
54.
cyber physical production systems (CPPS)
55.
cyber physical social system
56.
cyber physical social systems (cpss)
57.
cyber physical system
58.
Cyber Planning tool
59.
cyber power Europe
60.
cyber ranges
61.
cyber red teaming
62.
cyber resilience
63.
cyber resilience at sea
64.
cyber risk
65.
cyber risk management in shipping
66.
cyber situational awareness
67.
cyber stability
68.
cyber team communication
69.
cyber threat
70.
cyber threat communication
71.
Cyber Threat Intelligence
72.
cyber threats
73.
cyber war
74.
cyber warfare
75.
cyber warriors
76.
cyber weapons
77.
cyber-attack
78.
cyber-attack pathways
79.
Cyber-attacks
80.
cyber-insurance
81.
cyber-paternalism
82.
cyber-physical energy systems
83.
cyber-physical social system (CPSS)
84.
cyber-physical system
85.
Cyber-Physical System (CPS)
86.
cyber-physical system logistic robot
87.
cyber-physical systems
88.
Cyber-Physical Systems (CPS)
89.
cyber-risks
90.
cyber-space nexus
91.
cyber-vulnerabilities
92.
Defensive Cyber Operations
93.
EU cyber policy
94.
international cyber norms
95.
military cyber
96.
mobile cyber-physical system
97.
NATO cyber operations definitions
98.
NATO Cyber Range
99.
Offensive Cyber Operations
100.
perceived cyber risks and threats
101.
responsive cyber defence
102.
Socio-Cyber-Physical Systems
103.
space cyber range
104.
technical cyber exercise
105.
Visualising Cyber Planning
106.
ad-hoc sensor networks security
107.
Automatic Security Verification
108.
Blockchain security
109.
cache security
110.
communication system security
111.
comprehensive system of economic security
112.
computer security
113.
cooperative security dilemma
114.
data and information security
115.
data security
116.
development of security cameras
117.
digital security practices
118.
drinking water security
119.
economic security
120.
economic security of enterprise
121.
emotional security
122.
energy security
123.
energy security indicator
124.
Estonian information security standard
125.
graded security
126.
hardware security
127.
hardware security primitive
128.
high level of security
129.
Homeland security
130.
human security
131.
information security
132.
information security and privacy
133.
initial level of security
134.
internal security
135.
international security
136.
investment and innovation security
137.
IPv6 security
138.
IT security
139.
IT security management
140.
job security
141.
long-term security
142.
Maritime Security Operations Center (M-SOC)
143.
medium level of security
144.
metadata model for security measures
145.
Middle Eastern security
146.
Mobile security
147.
national security
148.
NATO. Science for Peace and Security Program
149.
network security
150.
network security monitoring
151.
OSCE (Organization for Security and Co-operation in Europe)
152.
passenger’s security
153.
policy-based routing security
154.
political and security cultures
155.
post-quantum security
156.
power system security
157.
quantitative security
158.
regional security
159.
RISC-V Security Verification
160.
Safety and Security in Sea Transportation
161.
safety and security testing
162.
security
163.
security adaptation
164.
security alert prioritization
165.
security analysis
166.
security and justice (AFSJ)
167.
Security and political science
168.
security and privacy
169.
security and privacy in smart grids
170.
Security Assertion Mining
171.
security closure
172.
Security Coverage
173.
security dataset
174.
security dilemma
175.
Security evaluation
176.
security evaluation instruments
177.
Security limitations
178.
security log analysis
179.
security management
180.
security model
181.
security monitoring
182.
security notion
183.
security objectives
184.
security of data
185.
security of supply
186.
security operation center
187.
security operations center
188.
security patterns
189.
security policy
190.
security problem definition
191.
security proof
192.
security protocols
193.
security requirements
194.
security requirements engineering
195.
security risk assessment
196.
security risk management
197.
security risks
198.
security science and technology
199.
security strategies
200.
security systems for military objects
201.
security testing
202.
security training
203.
security verification
204.
security-by-design
205.
social security planning
206.
societal security
207.
software security
208.
software security level
209.
software security subcharacteristics
210.
sufficient level of security
211.
system of economic security
212.
system security
213.
terrorism security
214.
transmission System Security
215.
voting privacy and security
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT