Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(4/229)
Export
export all inquiry results
(5)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
2
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
3
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
4
journal article EST
/
journal article ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
225
1.
Estonian information security standard
2.
information security
3.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
data security
19.
development of security cameras
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
metadata model for security measures
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
Security and political science
62.
security and privacy
63.
security and privacy in smart grids
64.
Security Assertion Mining
65.
security closure
66.
Security Coverage
67.
security dataset
68.
security dilemma
69.
Security evaluation
70.
security evaluation instruments
71.
security log analysis
72.
security management
73.
security model
74.
security monitoring
75.
security notion
76.
security objectives
77.
security of data
78.
security of supply
79.
security operation center
80.
security operations center
81.
security patterns
82.
security policy
83.
security problem definition
84.
security proof
85.
security protocols
86.
security requirements
87.
security requirements engineering
88.
security risk assessment
89.
security risk management
90.
security strategies
91.
security systems for military objects
92.
security testing
93.
security training
94.
security verification
95.
security-by-design
96.
social security planning
97.
societal security
98.
system of economic security
99.
system security
100.
terrorism security
101.
transmission System Security
102.
voting privacy and security
103.
access to information
104.
age of information
105.
banking information
106.
building information modelling
107.
building information modeling
108.
Building Information Modeling (BIM)
109.
building information modelling
110.
Building Information Modelling (BIM)
111.
Building Information Modelling (BIM) adoption
112.
business information technology
113.
city information modelling (CIM)
114.
communication channels (information theory)
115.
Community Statistics on Information Society (CSIS)
116.
court information system
117.
critical information infrastructure
118.
Data-information-knowledgewisdom (DIKW)
119.
discrete information bottle-neck
120.
dissemination of information
121.
enterprise information systems
122.
Estonian National Health Information System
123.
estonian national health information system (ENHIS)
124.
Estonian nationwide Health Information System (EHIS)
125.
evolutionary information systems
126.
financial information
127.
general theory of information transfer
128.
Geographic Information System (GIS)
129.
geographical information system
130.
health information exchange
131.
health information purpose
132.
health information sharing maturity
133.
health information systems
134.
Healthcare information systems
135.
high-performance computing systems, Information processing
136.
HL7 Version 3: Reference Information Model (RIM)
137.
ICT (information and communication technology)
138.
information
139.
information analysis
140.
information and communication technologies
141.
Information and communication technologies (ICT) digitalisation
142.
Information and Communication Technologies (ICT) laws
143.
Information and Communication Technologies (ICTs)
144.
Information and Communication Technologies for Development
145.
information and communication technology
146.
information and communication technology (ICT)
147.
information and communications technology
148.
information architecture
149.
information asymmetry
150.
information commons
151.
information communication technology
152.
information content
153.
information control
154.
information dissemination
155.
information economy
156.
information entropy
157.
information exchange
158.
information extraction
159.
information filtering
160.
information flow control
161.
information fusion
162.
information governance
163.
information integration
164.
information literacy
165.
information literacy cooperation
166.
information logistics
167.
information management
168.
information measures
169.
information model
170.
information model-based urban planning
171.
information polity
172.
information potential
173.
information processing
174.
information processing system
175.
information rate
176.
information realities
177.
information retrieval
178.
information revolution
179.
information seeking behaviour
180.
information sharing
181.
information society
182.
Information sufficiency
183.
information system
184.
Information System Authority (RIA)
185.
information systems
186.
information systems development
187.
Information Systems research
188.
information technologies
189.
Information technology
190.
information technology (IT)
191.
information theory
192.
information to individual consumers
193.
information tool
194.
information value
195.
information warfare
196.
information visualization
197.
information volume
198.
Information-seeking activity
199.
intelligent information technology
200.
interoperability and evolutionary criteria of information systems
201.
laboratory information management system (LIMS)
202.
laboratory information management systems
203.
LIMS (laboratory information management systems)
204.
medical information
205.
Medical information policy
206.
middleware (for subscription and distribution of situational information)
207.
mobile information system
208.
multilingual information retrieval
209.
multimodal information
210.
open architecture for information exchange
211.
perception of visual information
212.
performance information
213.
performance information use
214.
philosophy of information
215.
process modeling and information systems within the extended enterprise
216.
quality evaluation of scientific information
217.
real time information
218.
real-time information
219.
Reaxys Chemistry database information
220.
scientific information
221.
SIS II (Schengen Information System II)
222.
traffic information system (TIS)
223.
tree information database
224.
website information
225.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TalTech subject term
1
1.
Building Information Modeling
TalTech department
1
1.
School of Information Technologies
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT