Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/221)
Export
export all inquiry results
(5)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
2
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
3
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
4
journal article EST
/
journal article ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
218
1.
Estonian information security standard
2.
information security
3.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security strategies
16.
cyber-security
17.
data security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
internal security
30.
international security
31.
investment and innovation security
32.
IPv6 security
33.
IT security
34.
IT security management
35.
job security
36.
long-term security
37.
metadata model for security measures
38.
Middle Eastern security
39.
Mobile security
40.
national cyber security strategy
41.
national security
42.
NATO. Science for Peace and Security Program
43.
network security
44.
network security monitoring
45.
OSCE (Organization for Security and Co-operation in Europe)
46.
passenger’s security
47.
policy-based routing security
48.
political and security cultures
49.
post-quantum security
50.
power system security
51.
quantitative security
52.
regional security
53.
RISC-V Security Verification
54.
security
55.
security adaptation
56.
security analysis
57.
security and justice (AFSJ)
58.
security and privacy
59.
security and privacy in smart grids
60.
Security Assertion Mining
61.
security closure
62.
Security Coverage
63.
security dataset
64.
security dilemma
65.
Security evaluation
66.
security evaluation instruments
67.
security log analysis
68.
security management
69.
security model
70.
security monitoring
71.
security notion
72.
security objectives
73.
security of data
74.
security of supply
75.
security operation center
76.
security operations center
77.
security patterns
78.
security policy
79.
security problem definition
80.
security proof
81.
security protocols
82.
security requirements
83.
security requirements engineering
84.
security risk assessment
85.
security risk management
86.
security strategies
87.
security systems for military objects
88.
security testing
89.
security training
90.
security verification
91.
security-by-design
92.
social security planning
93.
societal security
94.
system of economic security
95.
system security
96.
terrorism security
97.
transmission System Security
98.
voting privacy and security
99.
access to information
100.
age of information
101.
banking information
102.
building information modelling
103.
building information modeling
104.
Building Information Modeling (BIM)
105.
building information modelling
106.
Building Information Modelling (BIM)
107.
Building Information Modelling (BIM) adoption
108.
business information technology
109.
city information modelling (CIM)
110.
communication channels (information theory)
111.
Community Statistics on Information Society (CSIS)
112.
court information system
113.
critical information infrastructure
114.
Data-information-knowledgewisdom (DIKW)
115.
discrete information bottle-neck
116.
dissemination of information
117.
enterprise information systems
118.
Estonian National Health Information System
119.
Estonian nationwide Health Information System (EHIS)
120.
evolutionary information systems
121.
financial information
122.
general theory of information transfer
123.
Geographic Information System (GIS)
124.
Geographic Information Systems (GIS)
125.
geographical information system
126.
health information exchange
127.
health information purpose
128.
health information sharing maturity
129.
health information systems
130.
Healthcare information systems
131.
high-performance computing systems, Information processing
132.
HL7 Version 3: Reference Information Model (RIM)
133.
ICT (information and communication technology)
134.
information
135.
information and communication technologies
136.
Information and communication technologies (ICT) digitalisation
137.
Information and Communication Technologies (ICT) laws
138.
Information and Communication Technologies (ICTs)
139.
Information and Communication Technologies for Development
140.
information and communication technology
141.
information and communication technology (ICT)
142.
information and communications technology
143.
information architecture
144.
information asymmetry
145.
information commons
146.
information communication technology
147.
information content
148.
information control
149.
information dissemination
150.
information economy
151.
information entropy
152.
information exchange
153.
information extraction
154.
information flow control
155.
information fusion
156.
information governance
157.
information integration
158.
information literacy
159.
information literacy cooperation
160.
information logistics
161.
information management
162.
information measures
163.
information model
164.
information model-based urban planning
165.
information polity
166.
information potential
167.
information processing
168.
information processing system
169.
information rate
170.
information realities
171.
information retrieval
172.
information revolution
173.
information seeking behaviour
174.
information sharing
175.
information society
176.
Information sufficiency
177.
information system
178.
Information System Authority (RIA)
179.
information systems
180.
information systems development
181.
Information Systems research
182.
information technologies
183.
Information technology
184.
information technology (IT)
185.
information theory
186.
information to individual consumers
187.
information tool
188.
information value
189.
information warfare
190.
information visualization
191.
Information-seeking activity
192.
intelligent information technology
193.
interoperability and evolutionary criteria of information systems
194.
laboratory information management system (LIMS)
195.
laboratory information management systems
196.
LIMS (laboratory information management systems)
197.
medical information
198.
Medical information policy
199.
middleware (for subscription and distribution of situational information)
200.
mobile information system
201.
multilingual information retrieval
202.
multimodal information
203.
open architecture for information exchange
204.
perception of visual information
205.
performance information
206.
performance information use
207.
philosophy of information
208.
process modeling and information systems within the extended enterprise
209.
quality evaluation of scientific information
210.
real time information
211.
real-time information
212.
Reaxys Chemistry database information
213.
scientific information
214.
SIS II (Schengen Information System II)
215.
traffic information system (TIS)
216.
tree information database
217.
website information
218.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ subject term
1
1.
Building Information Modeling
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT