Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
European Cyber Security Organisation (kirjastus/väljaandja)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/227)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Gaps in European Cyber Education and Professional Training WG5 I Education : training, awareness, cyber ranges [Online resource]
Maennel, Olaf Manuel
;
Csaba, Virag
2018
https://www.ecs-org.eu/documents/publications/5bf7e01bf3ed0.pdf
raamat
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
221
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security strategies
6.
cyber-security
7.
maritime cyber security
8.
maritime cyber security operations centers
9.
national cyber security strategy
10.
Dimensions of Learning Organisation Questionnaire (DLOQ)
11.
organisation
12.
self-organisation
13.
the dimensions of the learning organisation
14.
The organisation for economic cooperation and development (OECD)
15.
virtual organisation (VO)
16.
work organisation
17.
European and European Union Patents Court (EEUPC)
18.
European Federation of National Academies of Sciences and Humanities All European Academies, (ALLEA)
19.
autonomous vehicle cyber range
20.
cloud-based cyber-physical systems (C2PS)
21.
cognitive cyber warfare
22.
cyber
23.
Cyber “Maastricht”
24.
cyber architecture
25.
cyber attacks
26.
cyber battle damage assessment
27.
Cyber Bio-analytical Physical Systems (CBPSs)
28.
cyber challenge
29.
cyber command
30.
Cyber Command organisational structure
31.
cyber conflict
32.
cyber contingency
33.
cyber crime
34.
cyber crime pathways
35.
cyber crime scripting
36.
Cyber crisis management
37.
cyber defence
38.
cyber defence exercise
39.
cyber defence exercises
40.
cyber defense education
41.
cyber defense exercise
42.
cyber defense exercises
43.
cyber dependence
44.
cyber diplomacy
45.
cyber exercise
46.
cyber hygiene
47.
cyber impact assessment
48.
cyber incidents
49.
cyber insurance
50.
cyber intrusion detection
51.
cyber kill chain
52.
cyber operation
53.
cyber operation officer
54.
cyber operations
55.
cyber operations exercises
56.
cyber physical energy systems
57.
cyber physical power system (CPPS)
58.
Cyber Physical Production System
59.
cyber physical production systems (CPPS)
60.
cyber physical social system
61.
cyber physical social systems (cpss)
62.
cyber physical system
63.
Cyber Planning tool
64.
cyber power Europe
65.
cyber ranges
66.
cyber red teaming
67.
cyber resilience
68.
cyber resilience at sea
69.
cyber risk
70.
cyber risk management in shipping
71.
cyber situational awareness
72.
cyber stability
73.
cyber team communication
74.
cyber threat
75.
cyber threat communication
76.
Cyber Threat Intelligence
77.
cyber threats
78.
cyber war
79.
cyber warfare
80.
cyber warriors
81.
cyber weapons
82.
cyber-attack
83.
cyber-attack pathways
84.
Cyber-attacks
85.
cyber-insurance
86.
cyber-paternalism
87.
cyber-physical energy systems
88.
cyber-physical social system (CPSS)
89.
cyber-physical system
90.
Cyber-Physical System (CPS)
91.
cyber-physical system logistic robot
92.
cyber-physical systems
93.
Cyber-Physical Systems (CPS)
94.
cyber-risks
95.
cyber-space nexus
96.
cyber-vulnerabilities
97.
Defensive Cyber Operations
98.
EU cyber policy
99.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
100.
international cyber norms
101.
military cyber
102.
mobile cyber-physical system
103.
NATO cyber operations definitions
104.
NATO Cyber Range
105.
Offensive Cyber Operations
106.
perceived cyber risks and threats
107.
responsive cyber defence
108.
Socio-Cyber-Physical Systems
109.
space cyber range
110.
technical cyber exercise
111.
Visualising Cyber Planning
112.
ad-hoc sensor networks security
113.
Automatic Security Verification
114.
Blockchain security
115.
cache security
116.
communication system security
117.
comprehensive system of economic security
118.
computer security
119.
cooperative security dilemma
120.
data and information security
121.
data security
122.
development of security cameras
123.
digital security practices
124.
drinking water security
125.
economic security
126.
economic security of enterprise
127.
emotional security
128.
energy security
129.
energy security indicator
130.
Estonian information security standard
131.
graded security
132.
hardware security
133.
hardware security primitive
134.
high level of security
135.
Homeland security
136.
human security
137.
information security
138.
information security and privacy
139.
initial level of security
140.
internal security
141.
international security
142.
investment and innovation security
143.
IPv6 security
144.
IT security
145.
IT security management
146.
job security
147.
long-term security
148.
Maritime Security Operations Center (M-SOC)
149.
medium level of security
150.
metadata model for security measures
151.
Middle Eastern security
152.
Mobile security
153.
national security
154.
NATO. Science for Peace and Security Program
155.
network security
156.
network security monitoring
157.
OSCE (Organization for Security and Co-operation in Europe)
158.
passenger’s security
159.
policy-based routing security
160.
political and security cultures
161.
post-quantum security
162.
power system security
163.
quantitative security
164.
regional security
165.
RISC-V Security Verification
166.
Safety and Security in Sea Transportation
167.
safety and security testing
168.
security
169.
security adaptation
170.
security alert prioritization
171.
security analysis
172.
security and justice (AFSJ)
173.
Security and political science
174.
security and privacy
175.
security and privacy in smart grids
176.
Security Assertion Mining
177.
security closure
178.
Security Coverage
179.
security dataset
180.
security dilemma
181.
Security evaluation
182.
security evaluation instruments
183.
Security limitations
184.
security log analysis
185.
security management
186.
security model
187.
security monitoring
188.
security notion
189.
security objectives
190.
security of data
191.
security of supply
192.
security operation center
193.
security operations center
194.
security patterns
195.
security policy
196.
security problem definition
197.
security proof
198.
security protocols
199.
security requirements
200.
security requirements engineering
201.
security risk assessment
202.
security risk management
203.
security risks
204.
security science and technology
205.
security strategies
206.
security systems for military objects
207.
security testing
208.
security training
209.
security verification
210.
security-by-design
211.
social security planning
212.
societal security
213.
software security
214.
software security level
215.
software security subcharacteristics
216.
sufficient level of security
217.
system of economic security
218.
system security
219.
terrorism security
220.
transmission System Security
221.
voting privacy and security
märksõna
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT