Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security training (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/179)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Enterprise security analysis and training experience
Ojamaa, Andres
;
Tõugu, Enn
Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers
2016
/
p. 200-208 : ill
https://doi.org/10.1007/978-3-319-31664-2_21
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus
Frankenstack : real-time cyberattack detection and feedback system for technical cyber exercises
Pihelgas, Mauno
;
Kont, Markus
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 396-402
https://doi.org/10.1109/CSR51186.2021.9527923
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
177
1.
security training
2.
cybersecurity practical training
3.
cybersecurity training
4.
ADR Regulations Training Course
5.
ADR regulations training courses
6.
advanced training
7.
adversarial training
8.
aerobic training
9.
care workers training
10.
civil service training
11.
civil-service training
12.
cognitive training
13.
continual training
14.
design management training
15.
DG training courses
16.
distance training
17.
Education and Training Conference
18.
educational and training programs
19.
e-Governance training
20.
general training
21.
high-intensity interval training
22.
incident management training
23.
Joint training
24.
management training
25.
maritime education and training
26.
maritime higher education and training (MHET)
27.
marketing training
28.
multilingual training
29.
panel training
30.
pedagogical training
31.
PhD training
32.
professional training
33.
research and training scenarios
34.
resistance training
35.
safety training
36.
self-training
37.
simulation training
38.
small training data set
39.
teacher training
40.
technical teacher training
41.
technical training
42.
training
43.
training and education
44.
training and research tool
45.
training data
46.
Training gap detector
47.
training needs analysis
48.
training needs assessment
49.
training set optimization
50.
weakly supervised training
51.
web-based training
52.
vocational education and training
53.
vocational education and training VET
54.
ad-hoc sensor networks security
55.
Automatic Security Verification
56.
Blockchain security
57.
cache security
58.
cloud security
59.
communication system security
60.
comprehensive system of economic security
61.
computer security
62.
cooperative security dilemma
63.
cyber security
64.
cyber security education
65.
cyber security exercises
66.
cyber security monitoring
67.
cyber security monitoring in maritime
68.
cyber security strategies
69.
cyber-physical system security
70.
cyber-security
71.
data and information security
72.
data security
73.
development of security cameras
74.
digital security practices
75.
drinking water security
76.
economic security
77.
economic security of enterprise
78.
emotional security
79.
energy security
80.
energy security indicator
81.
Estonian information security standard
82.
graded security
83.
hardware security
84.
hardware security primitive
85.
high level of security
86.
Homeland security
87.
human security
88.
information security
89.
information security and privacy
90.
initial level of security
91.
internal security
92.
international security
93.
investment and innovation security
94.
IPv6 security
95.
IT security
96.
IT security management
97.
job security
98.
long-term security
99.
maritime cyber security
100.
maritime cyber security operations centers
101.
Maritime Security Operations Center (M-SOC)
102.
medium level of security
103.
metadata model for security measures
104.
Middle Eastern security
105.
Mobile security
106.
national cyber security strategy
107.
national security
108.
NATO. Science for Peace and Security Program
109.
network security
110.
network security monitoring
111.
OSCE (Organization for Security and Co-operation in Europe)
112.
passenger’s security
113.
policy-based routing security
114.
political and security cultures
115.
post-quantum security
116.
power system security
117.
quantitative security
118.
regional security
119.
RISC-V Security Verification
120.
Safety and Security in Sea Transportation
121.
safety and security testing
122.
security
123.
security adaptation
124.
security alert prioritization
125.
security analysis
126.
security and justice (AFSJ)
127.
Security and political science
128.
security and privacy
129.
security and privacy in smart grids
130.
Security Assertion
131.
Security Assertion Mining
132.
security closure
133.
Security Coverage
134.
security dataset
135.
security dilemma
136.
Security evaluation
137.
security evaluation instruments
138.
Security Level Evaluation
139.
Security limitations
140.
security log analysis
141.
security management
142.
security model
143.
security monitoring
144.
security notion
145.
security objectives
146.
security of data
147.
security of supply
148.
security operation center
149.
security operations center
150.
security patterns
151.
security policy
152.
security problem definition
153.
security proof
154.
security protocols
155.
security requirements
156.
security requirements engineering
157.
security research
158.
security risk assessment
159.
security risk management
160.
security risks
161.
security science and technology
162.
security strategies
163.
security systems for military objects
164.
security testing
165.
security verification
166.
security-by-design
167.
social security planning
168.
societal security
169.
software security
170.
software security level
171.
software security subcharacteristics
172.
sufficient level of security
173.
system of economic security
174.
system security
175.
terrorism security
176.
transmission System Security
177.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT