Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber defence exercises (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/124)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Art and automation of teaching malware reverse engineering
Lepik, Toomas
;
Maennel, Kaie
;
Ernits, Margus
;
Maennel, Olaf Manuel
Learning and Collaboration Technologies : Learning and Teaching : 5th International Conference : LCT 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018 : Proceedings, Part II
2018
/
p. 461-472
https://doi.org/10.1007/978-3-319-91152-6_35
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
120
1.
cyber defence exercises
2.
cyber defense exercises
3.
cyber operations exercises
4.
cyber security exercises
5.
cyber defence
6.
cyber defence exercise
7.
responsive cyber defence
8.
aquatic exercises
9.
cybersecurity exercises
10.
exercises
11.
organising cybersecurity exercises
12.
defence
13.
defence industry
14.
defence industry governance
15.
Estonian defence forces
16.
Estonian defence industry
17.
Estonian maritime defence
18.
EU defence industrial policy
19.
European defence
20.
European Defence Fund
21.
maritime defence
22.
national maritime defence
23.
self-defence
24.
automated cyber defense
25.
autonomous vehicle cyber range
26.
cloud-based cyber-physical systems (C2PS)
27.
cognitive cyber warfare
28.
cyber
29.
Cyber “Maastricht”
30.
cyber architecture
31.
cyber attacks
32.
cyber battle damage assessment
33.
Cyber Bio-analytical Physical Systems (CBPSs)
34.
cyber challenge
35.
cyber command
36.
Cyber Command organisational structure
37.
cyber conflict
38.
cyber contingency
39.
cyber crime
40.
cyber crime pathways
41.
cyber crime scripting
42.
Cyber crisis management
43.
cyber defense education
44.
cyber defense exercise
45.
cyber dependence
46.
cyber diplomacy
47.
cyber exercise
48.
cyber hygiene
49.
cyber impact assessment
50.
cyber incidents
51.
cyber insurance
52.
cyber intrusion detection
53.
cyber kill chain
54.
cyber operation
55.
cyber operation officer
56.
cyber operations
57.
cyber physical energy systems
58.
cyber physical power system (CPPS)
59.
Cyber Physical Production System
60.
cyber physical production systems (CPPS)
61.
cyber physical social system
62.
cyber physical social systems (cpss)
63.
cyber physical system
64.
Cyber Planning tool
65.
cyber power Europe
66.
cyber ranges
67.
cyber red teaming
68.
cyber resilience
69.
cyber resilience at sea
70.
cyber risk
71.
cyber risk management in shipping
72.
cyber security
73.
cyber security education
74.
cyber security monitoring
75.
cyber security monitoring in maritime
76.
cyber security strategies
77.
cyber situational awareness
78.
cyber stability
79.
cyber team communication
80.
cyber threat
81.
cyber threat communication
82.
Cyber Threat Intelligence
83.
cyber threats
84.
cyber war
85.
cyber warfare
86.
cyber warriors
87.
cyber weapons
88.
cyber-attack
89.
cyber-attack pathways
90.
Cyber-attacks
91.
cyber-insurance
92.
cyber-paternalism
93.
cyber-physical energy systems
94.
cyber-physical social system (CPSS)
95.
cyber-physical system
96.
Cyber-Physical System (CPS)
97.
cyber-physical system logistic robot
98.
cyber-physical system security
99.
cyber-physical systems
100.
Cyber-Physical Systems (CPS)
101.
cyber-risks
102.
cyber-security
103.
cyber-space nexus
104.
cyber-vulnerabilities
105.
Defensive Cyber Operations
106.
EU cyber policy
107.
international cyber norms
108.
maritime cyber security
109.
maritime cyber security operations centers
110.
military cyber
111.
mobile cyber-physical system
112.
national cyber security strategy
113.
NATO cyber operations definitions
114.
NATO Cyber Range
115.
Offensive Cyber Operations
116.
perceived cyber risks and threats
117.
Socio-Cyber-Physical Systems
118.
space cyber range
119.
technical cyber exercise
120.
Visualising Cyber Planning
subject term
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT