Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
European Cyber Security Organisation (kirjastus/väljaandja)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/204)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Gaps in European Cyber Education and Professional Training WG5 I Education : training, awareness, cyber ranges [Online resource]
Maennel, Olaf Manuel
;
Csaba, Virag
2018
https://www.ecs-org.eu/documents/publications/5bf7e01bf3ed0.pdf
raamat
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
199
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security strategies
6.
cyber-security
7.
national cyber security strategy
8.
Dimensions of Learning Organisation Questionnaire (DLOQ)
9.
organisation
10.
self-organisation
11.
the dimensions of the learning organisation
12.
The organisation for economic cooperation and development (OECD)
13.
virtual organisation (VO)
14.
work organisation
15.
European and European Union Patents Court (EEUPC)
16.
European Federation of National Academies of Sciences and Humanities All European Academies, (ALLEA)
17.
autonomous vehicle cyber range
18.
cloud-based cyber-physical systems (C2PS)
19.
cognitive cyber warfare
20.
cyber
21.
Cyber “Maastricht”
22.
cyber architecture
23.
cyber attacks
24.
cyber battle damage assessment
25.
Cyber Bio-analytical Physical Systems (CBPSs)
26.
cyber challenge
27.
cyber command
28.
cyber conflict
29.
cyber contingency
30.
cyber crime
31.
cyber crime pathways
32.
cyber crime scripting
33.
Cyber crisis management
34.
cyber defence
35.
cyber defence exercise
36.
cyber defence exercises
37.
cyber defense education
38.
cyber defense exercise
39.
cyber defense exercises
40.
cyber dependence
41.
cyber diplomacy
42.
cyber exercise
43.
cyber hygiene
44.
cyber impact assessment
45.
cyber incidents
46.
cyber insurance
47.
cyber intrusion detection
48.
cyber kill chain
49.
cyber operation
50.
cyber operation officer
51.
cyber operations
52.
cyber physical energy systems
53.
cyber physical power system (CPPS)
54.
Cyber Physical Production System
55.
cyber physical production systems (CPPS)
56.
cyber physical social system
57.
cyber physical social systems (cpss)
58.
cyber physical system
59.
cyber power Europe
60.
cyber ranges
61.
cyber red teaming
62.
cyber resilience
63.
cyber risk
64.
cyber situational awareness
65.
cyber stability
66.
cyber team communication
67.
cyber threat
68.
cyber threat communication
69.
cyber threats
70.
cyber war
71.
cyber warfare
72.
cyber warriors
73.
cyber weapons
74.
cyber-attack
75.
cyber-attack pathways
76.
cyber-insurance
77.
cyber-paternalism
78.
cyber-physical energy systems
79.
cyber-physical social system (CPSS)
80.
cyber-physical system
81.
Cyber-Physical System (CPS)
82.
cyber-physical system logistic robot
83.
cyber-physical systems
84.
Cyber-Physical Systems (CPS)
85.
cyber-risks
86.
cyber-space nexus
87.
cyber-vulnerabilities
88.
Defensive Cyber Operations
89.
EU cyber policy
90.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
91.
international cyber norms
92.
military cyber
93.
mobile cyber-physical system
94.
NATO cyber operations definitions
95.
NATO Cyber Range
96.
Offensive Cyber Operations
97.
perceived cyber risks and threats
98.
responsive cyber defence
99.
Socio-Cyber-Physical Systems
100.
space cyber range
101.
technical cyber exercise
102.
ad-hoc sensor networks security
103.
Automatic Security Verification
104.
Blockchain security
105.
cache security
106.
communication system security
107.
comprehensive system of economic security
108.
computer security
109.
cooperative security dilemma
110.
data security
111.
development of security cameras
112.
digital security practices
113.
drinking water security
114.
economic security
115.
economic security of enterprise
116.
emotional security
117.
energy security
118.
energy security indicator
119.
Estonian information security standard
120.
graded security
121.
hardware security
122.
hardware security primitive
123.
human security
124.
information security
125.
information security and privacy
126.
internal security
127.
international security
128.
investment and innovation security
129.
IPv6 security
130.
IT security
131.
IT security management
132.
job security
133.
long-term security
134.
metadata model for security measures
135.
Middle Eastern security
136.
Mobile security
137.
national security
138.
NATO. Science for Peace and Security Program
139.
network security
140.
network security monitoring
141.
OSCE (Organization for Security and Co-operation in Europe)
142.
passenger’s security
143.
policy-based routing security
144.
political and security cultures
145.
post-quantum security
146.
power system security
147.
quantitative security
148.
regional security
149.
RISC-V Security Verification
150.
safety and security testing
151.
security
152.
security adaptation
153.
security alert prioritization
154.
security analysis
155.
security and justice (AFSJ)
156.
Security and political science
157.
security and privacy
158.
security and privacy in smart grids
159.
Security Assertion Mining
160.
security closure
161.
Security Coverage
162.
security dataset
163.
security dilemma
164.
Security evaluation
165.
security evaluation instruments
166.
Security limitations
167.
security log analysis
168.
security management
169.
security model
170.
security monitoring
171.
security notion
172.
security objectives
173.
security of data
174.
security of supply
175.
security operation center
176.
security operations center
177.
security patterns
178.
security policy
179.
security problem definition
180.
security proof
181.
security protocols
182.
security requirements
183.
security requirements engineering
184.
security risk assessment
185.
security risk management
186.
security risks
187.
security strategies
188.
security systems for military objects
189.
security testing
190.
security training
191.
security verification
192.
security-by-design
193.
social security planning
194.
societal security
195.
system of economic security
196.
system security
197.
terrorism security
198.
transmission System Security
199.
voting privacy and security
märksõna
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT