Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(4/242)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
2
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
3
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
4
journal article EST
/
journal article ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
238
1.
data and information security
2.
Estonian information security standard
3.
information security
4.
information security and privacy
5.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
computer security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
data security
21.
development of security cameras
22.
digital security practices
23.
drinking water security
24.
economic security
25.
economic security of enterprise
26.
emotional security
27.
energy security
28.
energy security indicator
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
human security
33.
internal security
34.
international security
35.
investment and innovation security
36.
IPv6 security
37.
IT security
38.
IT security management
39.
job security
40.
long-term security
41.
metadata model for security measures
42.
Middle Eastern security
43.
Mobile security
44.
national cyber security strategy
45.
national security
46.
NATO. Science for Peace and Security Program
47.
network security
48.
network security monitoring
49.
OSCE (Organization for Security and Co-operation in Europe)
50.
passenger’s security
51.
policy-based routing security
52.
political and security cultures
53.
post-quantum security
54.
power system security
55.
quantitative security
56.
regional security
57.
RISC-V Security Verification
58.
Safety and Security in Sea Transportation
59.
safety and security testing
60.
security
61.
security adaptation
62.
security alert prioritization
63.
security analysis
64.
security and justice (AFSJ)
65.
Security and political science
66.
security and privacy
67.
security and privacy in smart grids
68.
Security Assertion Mining
69.
security closure
70.
Security Coverage
71.
security dataset
72.
security dilemma
73.
Security evaluation
74.
security evaluation instruments
75.
Security limitations
76.
security log analysis
77.
security management
78.
security model
79.
security monitoring
80.
security notion
81.
security objectives
82.
security of data
83.
security of supply
84.
security operation center
85.
security operations center
86.
security patterns
87.
security policy
88.
security problem definition
89.
security proof
90.
security protocols
91.
security requirements
92.
security requirements engineering
93.
security risk assessment
94.
security risk management
95.
security risks
96.
security science and technology
97.
security strategies
98.
security systems for military objects
99.
security testing
100.
security training
101.
security verification
102.
security-by-design
103.
social security planning
104.
societal security
105.
system of economic security
106.
system security
107.
terrorism security
108.
transmission System Security
109.
voting privacy and security
110.
access to information
111.
age of information
112.
banking information
113.
building information modelling
114.
building information modeling
115.
Building Information Modeling (BIM)
116.
building information modelling
117.
Building Information Modelling (BIM)
118.
Building Information Modelling (BIM) adoption
119.
business information technology
120.
city information modelling (CIM)
121.
communication channels (information theory)
122.
Community Statistics on Information Society (CSIS)
123.
court information system
124.
critical information infrastructure
125.
Data-information-knowledgewisdom (DIKW)
126.
discrete information bottle-neck
127.
dissemination of information
128.
enterprise information systems
129.
Estonian National Health Information System
130.
estonian national health information system (ENHIS)
131.
Estonian nationwide Health Information System (EHIS)
132.
evolutionary information systems
133.
financial information
134.
general theory of information transfer
135.
Geographic Information System (GIS)
136.
geographical information system
137.
health information exchange
138.
health information purpose
139.
health information sharing maturity
140.
health information systems
141.
Healthcare information systems
142.
high-performance computing systems, Information processing
143.
HL7 Version 3: Reference Information Model (RIM)
144.
ICT (information and communication technology)
145.
information
146.
information analysis
147.
information and communication technologies
148.
Information and Communication Technologies (ICT)
149.
Information and communication technologies (ICT) digitalisation
150.
Information and Communication Technologies (ICT) laws
151.
Information and Communication Technologies (ICTs)
152.
Information and Communication Technologies for Development
153.
information and communication technology
154.
information and communication technology (ICT)
155.
information and communications technology
156.
information and consultation
157.
information architecture
158.
information asymmetry
159.
information commons
160.
information communication technology
161.
information content
162.
information control
163.
information dissemination
164.
information economy
165.
information entropy
166.
information exchange
167.
information extraction
168.
information filtering
169.
information flow control
170.
information fusion
171.
information governance
172.
information integration
173.
information literacy
174.
information literacy cooperation
175.
information logistics
176.
information management
177.
information measures
178.
information model
179.
information model-based urban planning
180.
information polity
181.
information potential
182.
information preprocessing
183.
information processing
184.
information processing system
185.
information rate
186.
information realities
187.
information retrieval
188.
information revolution
189.
information seeking behaviour
190.
information sharing
191.
information society
192.
Information sufficiency
193.
information system
194.
Information System Authority (RIA)
195.
information systems
196.
information systems development
197.
Information Systems research
198.
information technologies
199.
Information technology
200.
information technology (IT)
201.
information theory
202.
information to individual consumers
203.
information tool
204.
information use
205.
information value
206.
information warfare
207.
information visualization
208.
information volume
209.
Information-seeking activity
210.
intelligent information technology
211.
interoperability and evolutionary criteria of information systems
212.
laboratory information management system (LIMS)
213.
laboratory information management systems
214.
LIMS (laboratory information management systems)
215.
medical information
216.
Medical information policy
217.
middleware (for subscription and distribution of situational information)
218.
mobile information system
219.
multilingual information retrieval
220.
multimodal information
221.
open architecture for information exchange
222.
perception of visual information
223.
performance information
224.
performance information use
225.
philosophy of information
226.
process modeling and information systems within the extended enterprise
227.
provision of information to workers
228.
quality evaluation of scientific information
229.
real time information
230.
real-time information
231.
Reaxys Chemistry database information
232.
scientific information
233.
SIS II (Schengen Information System II)
234.
tactile information
235.
traffic information system (TIS)
236.
tree information database
237.
website information
238.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TalTech subject term
1
1.
Building Information Modeling
TalTech department
1
1.
School of Information Technologies
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT