Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security training (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/157)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Enterprise security analysis and training experience
Ojamaa, Andres
;
Tõugu, Enn
Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers
2016
/
p. 200-208 : ill
https://doi.org/10.1007/978-3-319-31664-2_21
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
2
book article
Frankenstack : real-time cyberattack detection and feedback system for technical cyber exercises
Pihelgas, Mauno
;
Kont, Markus
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 396-402
https://doi.org/10.1109/CSR51186.2021.9527923
book article
Number of records 2, displaying
1 - 2
keyword
155
1.
security training
2.
cybersecurity practical training
3.
cybersecurity training
4.
ADR Regulations Training Course
5.
ADR regulations training courses
6.
advanced training
7.
adversarial training
8.
aerobic training
9.
care workers training
10.
civil service training
11.
civil-service training
12.
cognitive training
13.
continual training
14.
design management training
15.
DG training courses
16.
distance training
17.
educational and training programs
18.
e-Governance training
19.
general training
20.
high-intensity interval training
21.
incident management training
22.
management training
23.
maritime education and training
24.
maritime higher education and training (MHET)
25.
marketing training
26.
multilingual training
27.
panel training
28.
pedagogical training
29.
PhD training
30.
professional training
31.
research and training scenarios
32.
resistance training
33.
safety training
34.
self-training
35.
simulation training
36.
small training data set
37.
teacher training
38.
technical teacher training
39.
technical training
40.
training
41.
training and education
42.
training and research tool
43.
training data
44.
Training gap detector
45.
training needs analysis
46.
training needs assessment
47.
training set optimization
48.
weakly supervised training
49.
web-based training
50.
vocational education and training
51.
vocational education and training VET
52.
ad-hoc sensor networks security
53.
Automatic Security Verification
54.
Blockchain security
55.
cache security
56.
communication system security
57.
comprehensive system of economic security
58.
computer security
59.
cooperative security dilemma
60.
cyber security
61.
cyber security education
62.
cyber security exercises
63.
cyber security monitoring
64.
cyber security strategies
65.
cyber-security
66.
data security
67.
development of security cameras
68.
digital security practices
69.
drinking water security
70.
economic security
71.
economic security of enterprise
72.
emotional security
73.
energy security
74.
energy security indicator
75.
Estonian information security standard
76.
graded security
77.
hardware security
78.
hardware security primitive
79.
human security
80.
information security
81.
information security and privacy
82.
internal security
83.
international security
84.
investment and innovation security
85.
IPv6 security
86.
IT security
87.
IT security management
88.
job security
89.
long-term security
90.
metadata model for security measures
91.
Middle Eastern security
92.
Mobile security
93.
national cyber security strategy
94.
national security
95.
NATO. Science for Peace and Security Program
96.
network security
97.
network security monitoring
98.
OSCE (Organization for Security and Co-operation in Europe)
99.
passenger’s security
100.
policy-based routing security
101.
political and security cultures
102.
post-quantum security
103.
power system security
104.
quantitative security
105.
regional security
106.
RISC-V Security Verification
107.
safety and security testing
108.
security
109.
security adaptation
110.
security alert prioritization
111.
security analysis
112.
security and justice (AFSJ)
113.
Security and political science
114.
security and privacy
115.
security and privacy in smart grids
116.
Security Assertion Mining
117.
security closure
118.
Security Coverage
119.
security dataset
120.
security dilemma
121.
Security evaluation
122.
security evaluation instruments
123.
Security limitations
124.
security log analysis
125.
security management
126.
security model
127.
security monitoring
128.
security notion
129.
security objectives
130.
security of data
131.
security of supply
132.
security operation center
133.
security operations center
134.
security patterns
135.
security policy
136.
security problem definition
137.
security proof
138.
security protocols
139.
security requirements
140.
security requirements engineering
141.
security risk assessment
142.
security risk management
143.
security risks
144.
security strategies
145.
security systems for military objects
146.
security testing
147.
security verification
148.
security-by-design
149.
social security planning
150.
societal security
151.
system of economic security
152.
system security
153.
terrorism security
154.
transmission System Security
155.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT