Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/207)
Export
export all inquiry results
(5)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
2
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
3
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
4
journal article
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
journal article
5
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
204
1.
information security
2.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security strategies
15.
cyber-security
16.
data security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
graded security
25.
hardware security
26.
hardware security primitive
27.
human security
28.
internal security
29.
international security
30.
investment and innovation security
31.
IPv6 security
32.
IT security
33.
job security
34.
long-term security
35.
metadata model for security measures
36.
Middle Eastern security
37.
Mobile security
38.
national cyber security strategy
39.
national security
40.
NATO. Science for Peace and Security Program
41.
network security
42.
network security monitoring
43.
OSCE (Organization for Security and Co-operation in Europe)
44.
passenger’s security
45.
policy-based routing security
46.
political and security cultures
47.
post-quantum security
48.
power system security
49.
quantitative security
50.
regional security
51.
RISC-V Security Verification
52.
security
53.
security and privacy
54.
security and privacy in smart grids
55.
Security Assertion Mining
56.
security closure
57.
Security Coverage
58.
security dataset
59.
security dilemma
60.
Security evaluation
61.
security log analysis
62.
security management
63.
security model
64.
security monitoring
65.
security notion
66.
security objectives
67.
security of data
68.
security of supply
69.
security operation center
70.
security patterns
71.
security problem definition
72.
security proof
73.
security protocols
74.
security requirements
75.
security requirements engineering
76.
security risk assessment
77.
security risk management
78.
security strategies
79.
security systems for military objects
80.
security testing
81.
security training
82.
security verification
83.
social security planning
84.
societal security
85.
system of economic security
86.
system security
87.
terrorism security
88.
transmission System Security
89.
voting privacy and security
90.
access to information
91.
age of information
92.
banking information
93.
building information modelling
94.
building information modeling
95.
Building Information Modeling (BIM)
96.
building information modelling
97.
Building Information Modelling (BIM)
98.
Building Information Modelling (BIM) adoption
99.
business information technology
100.
city information modelling (CIM)
101.
communication channels (information theory)
102.
Community Statistics on Information Society (CSIS)
103.
court information system
104.
critical information infrastructure
105.
Data-information-knowledgewisdom (DIKW)
106.
discrete information bottle-neck
107.
dissemination of information
108.
enterprise information systems
109.
Estonian National Health Information System
110.
Estonian nationwide Health Information System (EHIS)
111.
evolutionary information systems
112.
financial information
113.
general theory of information transfer
114.
Geographic Information System (GIS)
115.
Geographic Information Systems (GIS)
116.
geographical information system
117.
health information exchange
118.
health information systems
119.
Healthcare information systems
120.
high-performance computing systems, Information processing
121.
HL7 Version 3: Reference Information Model (RIM)
122.
ICT (information and communication technology)
123.
information
124.
information and communication technologies
125.
Information and communication technologies (ICT) digitalisation
126.
Information and Communication Technologies (ICT) laws
127.
Information and Communication Technologies (ICTs)
128.
Information and Communication Technologies for Development
129.
information and communication technology
130.
information and communication technology (ICT)
131.
information and communications technology
132.
information architecture
133.
information asymmetry
134.
information commons
135.
information communication technology
136.
information content
137.
information control
138.
information dissemination
139.
information economy
140.
information entropy
141.
information exchange
142.
information extraction
143.
information flow control
144.
information fusion
145.
information governance
146.
information integration
147.
information literacy
148.
information literacy cooperation
149.
information logistics
150.
information management
151.
information measures
152.
information model
153.
information polity
154.
information potential
155.
information processing
156.
information processing system
157.
information rate
158.
information realities
159.
information retrieval
160.
information revolution
161.
information seeking behaviour
162.
information sharing
163.
information society
164.
Information sufficiency
165.
information system
166.
Information System Authority (RIA)
167.
information systems
168.
information systems development
169.
Information Systems research
170.
information technologies
171.
Information technology
172.
information technology (IT)
173.
information theory
174.
information to individual consumers
175.
information tool
176.
information value
177.
information warfare
178.
information visualization
179.
Information-seeking activity
180.
intelligent information technology
181.
interoperability and evolutionary criteria of information systems
182.
laboratory information management system (LIMS)
183.
laboratory information management systems
184.
LIMS (laboratory information management systems)
185.
medical information
186.
Medical information policy
187.
middleware (for subscription and distribution of situational information)
188.
multilingual information retrieval
189.
multimodal information
190.
open architecture for information exchange
191.
perception of visual information
192.
performance information
193.
performance information use
194.
philosophy of information
195.
process modeling and information systems within the extended enterprise
196.
quality evaluation of scientific information
197.
real time information
198.
real-time information
199.
Reaxys Chemistry database information
200.
scientific information
201.
SIS II (Schengen Information System II)
202.
traffic information system (TIS)
203.
website information
204.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ subject term
1
1.
Building Information Modeling
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT