Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security training (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/175)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Enterprise security analysis and training experience
Ojamaa, Andres
;
Tõugu, Enn
Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers
2016
/
p. 200-208 : ill
https://doi.org/10.1007/978-3-319-31664-2_21
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus
Frankenstack : real-time cyberattack detection and feedback system for technical cyber exercises
Pihelgas, Mauno
;
Kont, Markus
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 396-402
https://doi.org/10.1109/CSR51186.2021.9527923
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
173
1.
security training
2.
cybersecurity practical training
3.
cybersecurity training
4.
ADR Regulations Training Course
5.
ADR regulations training courses
6.
advanced training
7.
adversarial training
8.
aerobic training
9.
care workers training
10.
civil service training
11.
civil-service training
12.
cognitive training
13.
continual training
14.
design management training
15.
DG training courses
16.
distance training
17.
Education and Training Conference
18.
educational and training programs
19.
e-Governance training
20.
general training
21.
high-intensity interval training
22.
incident management training
23.
Joint training
24.
management training
25.
maritime education and training
26.
maritime higher education and training (MHET)
27.
marketing training
28.
multilingual training
29.
panel training
30.
pedagogical training
31.
PhD training
32.
professional training
33.
research and training scenarios
34.
resistance training
35.
safety training
36.
self-training
37.
simulation training
38.
small training data set
39.
teacher training
40.
technical teacher training
41.
technical training
42.
training
43.
training and education
44.
training and research tool
45.
training data
46.
Training gap detector
47.
training needs analysis
48.
training needs assessment
49.
training set optimization
50.
weakly supervised training
51.
web-based training
52.
vocational education and training
53.
vocational education and training VET
54.
ad-hoc sensor networks security
55.
Automatic Security Verification
56.
Blockchain security
57.
cache security
58.
communication system security
59.
comprehensive system of economic security
60.
computer security
61.
cooperative security dilemma
62.
cyber security
63.
cyber security education
64.
cyber security exercises
65.
cyber security monitoring
66.
cyber security strategies
67.
cyber-security
68.
data and information security
69.
data security
70.
development of security cameras
71.
digital security practices
72.
drinking water security
73.
economic security
74.
economic security of enterprise
75.
emotional security
76.
energy security
77.
energy security indicator
78.
Estonian information security standard
79.
graded security
80.
hardware security
81.
hardware security primitive
82.
high level of security
83.
Homeland security
84.
human security
85.
information security
86.
information security and privacy
87.
initial level of security
88.
internal security
89.
international security
90.
investment and innovation security
91.
IPv6 security
92.
IT security
93.
IT security management
94.
job security
95.
long-term security
96.
maritime cyber security
97.
maritime cyber security operations centers
98.
Maritime Security Operations Center (M-SOC)
99.
medium level of security
100.
metadata model for security measures
101.
Middle Eastern security
102.
Mobile security
103.
national cyber security strategy
104.
national security
105.
NATO. Science for Peace and Security Program
106.
network security
107.
network security monitoring
108.
OSCE (Organization for Security and Co-operation in Europe)
109.
passenger’s security
110.
policy-based routing security
111.
political and security cultures
112.
post-quantum security
113.
power system security
114.
quantitative security
115.
regional security
116.
RISC-V Security Verification
117.
Safety and Security in Sea Transportation
118.
safety and security testing
119.
security
120.
security adaptation
121.
security alert prioritization
122.
security analysis
123.
security and justice (AFSJ)
124.
Security and political science
125.
security and privacy
126.
security and privacy in smart grids
127.
Security Assertion Mining
128.
security closure
129.
Security Coverage
130.
security dataset
131.
security dilemma
132.
Security evaluation
133.
security evaluation instruments
134.
Security Level Evaluation
135.
Security limitations
136.
security log analysis
137.
security management
138.
security model
139.
security monitoring
140.
security notion
141.
security objectives
142.
security of data
143.
security of supply
144.
security operation center
145.
security operations center
146.
security patterns
147.
security policy
148.
security problem definition
149.
security proof
150.
security protocols
151.
security requirements
152.
security requirements engineering
153.
security research
154.
security risk assessment
155.
security risk management
156.
security risks
157.
security science and technology
158.
security strategies
159.
security systems for military objects
160.
security testing
161.
security verification
162.
security-by-design
163.
social security planning
164.
societal security
165.
software security
166.
software security level
167.
software security subcharacteristics
168.
sufficient level of security
169.
system of economic security
170.
system security
171.
terrorism security
172.
transmission System Security
173.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT