Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security training (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/177)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Enterprise security analysis and training experience
Ojamaa, Andres
;
Tõugu, Enn
Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers
2016
/
p. 200-208 : ill
https://doi.org/10.1007/978-3-319-31664-2_21
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus
Frankenstack : real-time cyberattack detection and feedback system for technical cyber exercises
Pihelgas, Mauno
;
Kont, Markus
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 396-402
https://doi.org/10.1109/CSR51186.2021.9527923
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
175
1.
security training
2.
cybersecurity practical training
3.
cybersecurity training
4.
ADR Regulations Training Course
5.
ADR regulations training courses
6.
advanced training
7.
adversarial training
8.
aerobic training
9.
care workers training
10.
civil service training
11.
civil-service training
12.
cognitive training
13.
continual training
14.
design management training
15.
DG training courses
16.
distance training
17.
Education and Training Conference
18.
educational and training programs
19.
e-Governance training
20.
general training
21.
high-intensity interval training
22.
incident management training
23.
Joint training
24.
management training
25.
maritime education and training
26.
maritime higher education and training (MHET)
27.
marketing training
28.
multilingual training
29.
panel training
30.
pedagogical training
31.
PhD training
32.
professional training
33.
research and training scenarios
34.
resistance training
35.
safety training
36.
self-training
37.
simulation training
38.
small training data set
39.
teacher training
40.
technical teacher training
41.
technical training
42.
training
43.
training and education
44.
training and research tool
45.
training data
46.
Training gap detector
47.
training needs analysis
48.
training needs assessment
49.
training set optimization
50.
weakly supervised training
51.
web-based training
52.
vocational education and training
53.
vocational education and training VET
54.
ad-hoc sensor networks security
55.
Automatic Security Verification
56.
Blockchain security
57.
cache security
58.
cloud security
59.
communication system security
60.
comprehensive system of economic security
61.
computer security
62.
cooperative security dilemma
63.
cyber security
64.
cyber security education
65.
cyber security exercises
66.
cyber security monitoring
67.
cyber security strategies
68.
cyber-security
69.
data and information security
70.
data security
71.
development of security cameras
72.
digital security practices
73.
drinking water security
74.
economic security
75.
economic security of enterprise
76.
emotional security
77.
energy security
78.
energy security indicator
79.
Estonian information security standard
80.
graded security
81.
hardware security
82.
hardware security primitive
83.
high level of security
84.
Homeland security
85.
human security
86.
information security
87.
information security and privacy
88.
initial level of security
89.
internal security
90.
international security
91.
investment and innovation security
92.
IPv6 security
93.
IT security
94.
IT security management
95.
job security
96.
long-term security
97.
maritime cyber security
98.
maritime cyber security operations centers
99.
Maritime Security Operations Center (M-SOC)
100.
medium level of security
101.
metadata model for security measures
102.
Middle Eastern security
103.
Mobile security
104.
national cyber security strategy
105.
national security
106.
NATO. Science for Peace and Security Program
107.
network security
108.
network security monitoring
109.
OSCE (Organization for Security and Co-operation in Europe)
110.
passenger’s security
111.
policy-based routing security
112.
political and security cultures
113.
post-quantum security
114.
power system security
115.
quantitative security
116.
regional security
117.
RISC-V Security Verification
118.
Safety and Security in Sea Transportation
119.
safety and security testing
120.
security
121.
security adaptation
122.
security alert prioritization
123.
security analysis
124.
security and justice (AFSJ)
125.
Security and political science
126.
security and privacy
127.
security and privacy in smart grids
128.
Security Assertion
129.
Security Assertion Mining
130.
security closure
131.
Security Coverage
132.
security dataset
133.
security dilemma
134.
Security evaluation
135.
security evaluation instruments
136.
Security Level Evaluation
137.
Security limitations
138.
security log analysis
139.
security management
140.
security model
141.
security monitoring
142.
security notion
143.
security objectives
144.
security of data
145.
security of supply
146.
security operation center
147.
security operations center
148.
security patterns
149.
security policy
150.
security problem definition
151.
security proof
152.
security protocols
153.
security requirements
154.
security requirements engineering
155.
security research
156.
security risk assessment
157.
security risk management
158.
security risks
159.
security science and technology
160.
security strategies
161.
security systems for military objects
162.
security testing
163.
security verification
164.
security-by-design
165.
social security planning
166.
societal security
167.
software security
168.
software security level
169.
software security subcharacteristics
170.
sufficient level of security
171.
system of economic security
172.
system security
173.
terrorism security
174.
transmission System Security
175.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT