Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
6
Look more..
(4/260)
Export
export all inquiry results
(6)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Artificial intelligence approach to identifying propaganda techniques and objects, taking into account ethical and legal aspects
Molchanova, Maryna
;
Dutt, Pawan Kumar
Computer Systems and Information Technologies
2025
/
p. 97-103
https://doi.org/10.31891/csit-2025-2-11
https://csitjournal.khmnu.edu.ua/index.php/csit/article/view/423
journal article EST
/
journal article ENG
2
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
3
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
4
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
5
journal article EST
/
journal article ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
6
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 6, displaying
1 - 6
keyword
256
1.
data and information security
2.
Estonian information security standard
3.
information security
4.
information security and privacy
5.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
cloud security
11.
communication system security
12.
comprehensive system of economic security
13.
computer security
14.
cooperative security dilemma
15.
cyber security
16.
cyber security education
17.
cyber security exercises
18.
cyber security monitoring
19.
cyber security monitoring in maritime
20.
cyber security strategies
21.
cyber-physical system security
22.
cyber-security
23.
data security
24.
development of security cameras
25.
digital security practices
26.
drinking water security
27.
economic security
28.
economic security of enterprise
29.
emotional security
30.
energy security
31.
energy security indicator
32.
graded security
33.
hardware security
34.
hardware security primitive
35.
high level of security
36.
Homeland security
37.
human security
38.
initial level of security
39.
internal security
40.
international security
41.
investment and innovation security
42.
IPv6 security
43.
IT security
44.
IT security management
45.
job security
46.
long-term security
47.
maritime cyber security
48.
maritime cyber security operations centers
49.
Maritime Security Operations Center (M-SOC)
50.
medium level of security
51.
metadata model for security measures
52.
Middle Eastern security
53.
Mobile security
54.
national cyber security strategy
55.
national security
56.
NATO. Science for Peace and Security Program
57.
network security
58.
network security monitoring
59.
OSCE (Organization for Security and Co-operation in Europe)
60.
passenger’s security
61.
policy-based routing security
62.
political and security cultures
63.
post-quantum security
64.
power system security
65.
quantitative security
66.
regional security
67.
RISC-V Security Verification
68.
Safety and Security in Sea Transportation
69.
safety and security testing
70.
security
71.
security adaptation
72.
security alert prioritization
73.
security analysis
74.
security and justice (AFSJ)
75.
Security and political science
76.
security and privacy
77.
security and privacy in smart grids
78.
Security Assertion
79.
Security Assertion Mining
80.
security closure
81.
Security Coverage
82.
security dataset
83.
security dilemma
84.
Security evaluation
85.
security evaluation instruments
86.
Security Level Evaluation
87.
Security limitations
88.
security log analysis
89.
security management
90.
security model
91.
security monitoring
92.
security notion
93.
security objectives
94.
security of data
95.
security of supply
96.
security operation center
97.
security operations center
98.
security patterns
99.
security policy
100.
security problem definition
101.
security proof
102.
security protocols
103.
security requirements
104.
security requirements engineering
105.
security research
106.
security risk assessment
107.
security risk management
108.
security risks
109.
security science and technology
110.
security strategies
111.
security systems for military objects
112.
security testing
113.
security training
114.
security verification
115.
security-by-design
116.
social security planning
117.
societal security
118.
software security
119.
software security level
120.
software security subcharacteristics
121.
sufficient level of security
122.
system of economic security
123.
system security
124.
terrorism security
125.
transmission System Security
126.
voting privacy and security
127.
access to information
128.
age of information
129.
banking information
130.
building information modelling
131.
building information modeling
132.
Building Information Modeling (BIM)
133.
building information modelling
134.
Building Information Modelling (BIM)
135.
Building Information Modelling (BIM) adoption
136.
business information technology
137.
city information modelling (CIM)
138.
communication channels (information theory)
139.
Community Statistics on Information Society (CSIS)
140.
court information system
141.
critical information infrastructure
142.
Data-information-knowledgewisdom (DIKW)
143.
discrete information bottle-neck
144.
dissemination of information
145.
enterprise information systems
146.
Estonian National Health Information System
147.
estonian national health information system (ENHIS)
148.
Estonian nationwide Health Information System (EHIS)
149.
evolutionary information systems
150.
financial information
151.
general theory of information transfer
152.
Geographic Information System (GIS)
153.
geographical information system
154.
health information exchange
155.
health information purpose
156.
health information sharing maturity
157.
health information systems
158.
Healthcare information systems
159.
high-performance computing systems, Information processing
160.
HL7 Version 3: Reference Information Model (RIM)
161.
ICT (information and communication technology)
162.
information
163.
information analysis
164.
information and communication technologies
165.
Information and Communication Technologies (ICT)
166.
Information and communication technologies (ICT) digitalisation
167.
Information and Communication Technologies (ICT) laws
168.
Information and Communication Technologies (ICTs)
169.
Information and Communication Technologies for Development
170.
information and communication technology
171.
information and communication technology (ICT)
172.
information and communications technology
173.
information and consultation
174.
information architecture
175.
information asymmetry
176.
information commons
177.
information communication technology
178.
information content
179.
information control
180.
information dissemination
181.
information economy
182.
information entropy
183.
information exchange
184.
information extraction
185.
information filtering
186.
information flow control
187.
information fusion
188.
information governance
189.
information integration
190.
information literacy
191.
information literacy cooperation
192.
information logistics
193.
information management
194.
information measures
195.
information model
196.
information model-based urban planning
197.
information polity
198.
information potential
199.
information preprocessing
200.
information processing
201.
information processing system
202.
information rate
203.
information realities
204.
information retrieval
205.
information revolution
206.
information seeking behaviour
207.
information sharing
208.
information society
209.
Information sufficiency
210.
information system
211.
Information System Authority (RIA)
212.
information systems
213.
information systems development
214.
Information Systems research
215.
information technologies
216.
Information technology
217.
information technology (IT)
218.
information theory
219.
information to individual consumers
220.
information tool
221.
information use
222.
information value
223.
information war
224.
information warfare
225.
information visualization
226.
information volume
227.
Information-seeking activity
228.
intelligent information technology
229.
interoperability and evolutionary criteria of information systems
230.
laboratory information management system (LIMS)
231.
laboratory information management systems
232.
LIMS (laboratory information management systems)
233.
medical information
234.
Medical information policy
235.
middleware (for subscription and distribution of situational information)
236.
mobile information system
237.
multilingual information retrieval
238.
multimodal information
239.
open architecture for information exchange
240.
perception of visual information
241.
performance information
242.
performance information use
243.
philosophy of information
244.
process modeling and information systems within the extended enterprise
245.
provision of information to workers
246.
quality evaluation of scientific information
247.
real time information
248.
real-time information
249.
Reaxys Chemistry database information
250.
scientific information
251.
SIS II (Schengen Information System II)
252.
tactile information
253.
traffic information system (TIS)
254.
tree information database
255.
website information
256.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TalTech subject term
1
1.
Building Information Modeling
TalTech department
1
1.
School of Information Technologies
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT