Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
6
Look more..
(4/259)
Export
export all inquiry results
(6)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Artificial intelligence approach to identifying propaganda techniques and objects, taking into account ethical and legal aspects
Molchanova, Maryna
;
Dutt, Pawan Kumar
Computer Systems and Information Technologies
2025
/
p. 97-103
https://doi.org/10.31891/csit-2025-2-11
https://csitjournal.khmnu.edu.ua/index.php/csit/article/view/423
journal article EST
/
journal article ENG
2
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
3
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
4
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
5
journal article EST
/
journal article ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
6
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 6, displaying
1 - 6
keyword
255
1.
data and information security
2.
Estonian information security standard
3.
information security
4.
information security and privacy
5.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
cloud security
11.
communication system security
12.
comprehensive system of economic security
13.
computer security
14.
cooperative security dilemma
15.
cyber security
16.
cyber security education
17.
cyber security exercises
18.
cyber security monitoring
19.
cyber security strategies
20.
cyber-physical system security
21.
cyber-security
22.
data security
23.
development of security cameras
24.
digital security practices
25.
drinking water security
26.
economic security
27.
economic security of enterprise
28.
emotional security
29.
energy security
30.
energy security indicator
31.
graded security
32.
hardware security
33.
hardware security primitive
34.
high level of security
35.
Homeland security
36.
human security
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
maritime cyber security
47.
maritime cyber security operations centers
48.
Maritime Security Operations Center (M-SOC)
49.
medium level of security
50.
metadata model for security measures
51.
Middle Eastern security
52.
Mobile security
53.
national cyber security strategy
54.
national security
55.
NATO. Science for Peace and Security Program
56.
network security
57.
network security monitoring
58.
OSCE (Organization for Security and Co-operation in Europe)
59.
passenger’s security
60.
policy-based routing security
61.
political and security cultures
62.
post-quantum security
63.
power system security
64.
quantitative security
65.
regional security
66.
RISC-V Security Verification
67.
Safety and Security in Sea Transportation
68.
safety and security testing
69.
security
70.
security adaptation
71.
security alert prioritization
72.
security analysis
73.
security and justice (AFSJ)
74.
Security and political science
75.
security and privacy
76.
security and privacy in smart grids
77.
Security Assertion
78.
Security Assertion Mining
79.
security closure
80.
Security Coverage
81.
security dataset
82.
security dilemma
83.
Security evaluation
84.
security evaluation instruments
85.
Security Level Evaluation
86.
Security limitations
87.
security log analysis
88.
security management
89.
security model
90.
security monitoring
91.
security notion
92.
security objectives
93.
security of data
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security research
105.
security risk assessment
106.
security risk management
107.
security risks
108.
security science and technology
109.
security strategies
110.
security systems for military objects
111.
security testing
112.
security training
113.
security verification
114.
security-by-design
115.
social security planning
116.
societal security
117.
software security
118.
software security level
119.
software security subcharacteristics
120.
sufficient level of security
121.
system of economic security
122.
system security
123.
terrorism security
124.
transmission System Security
125.
voting privacy and security
126.
access to information
127.
age of information
128.
banking information
129.
building information modelling
130.
building information modeling
131.
Building Information Modeling (BIM)
132.
building information modelling
133.
Building Information Modelling (BIM)
134.
Building Information Modelling (BIM) adoption
135.
business information technology
136.
city information modelling (CIM)
137.
communication channels (information theory)
138.
Community Statistics on Information Society (CSIS)
139.
court information system
140.
critical information infrastructure
141.
Data-information-knowledgewisdom (DIKW)
142.
discrete information bottle-neck
143.
dissemination of information
144.
enterprise information systems
145.
Estonian National Health Information System
146.
estonian national health information system (ENHIS)
147.
Estonian nationwide Health Information System (EHIS)
148.
evolutionary information systems
149.
financial information
150.
general theory of information transfer
151.
Geographic Information System (GIS)
152.
geographical information system
153.
health information exchange
154.
health information purpose
155.
health information sharing maturity
156.
health information systems
157.
Healthcare information systems
158.
high-performance computing systems, Information processing
159.
HL7 Version 3: Reference Information Model (RIM)
160.
ICT (information and communication technology)
161.
information
162.
information analysis
163.
information and communication technologies
164.
Information and Communication Technologies (ICT)
165.
Information and communication technologies (ICT) digitalisation
166.
Information and Communication Technologies (ICT) laws
167.
Information and Communication Technologies (ICTs)
168.
Information and Communication Technologies for Development
169.
information and communication technology
170.
information and communication technology (ICT)
171.
information and communications technology
172.
information and consultation
173.
information architecture
174.
information asymmetry
175.
information commons
176.
information communication technology
177.
information content
178.
information control
179.
information dissemination
180.
information economy
181.
information entropy
182.
information exchange
183.
information extraction
184.
information filtering
185.
information flow control
186.
information fusion
187.
information governance
188.
information integration
189.
information literacy
190.
information literacy cooperation
191.
information logistics
192.
information management
193.
information measures
194.
information model
195.
information model-based urban planning
196.
information polity
197.
information potential
198.
information preprocessing
199.
information processing
200.
information processing system
201.
information rate
202.
information realities
203.
information retrieval
204.
information revolution
205.
information seeking behaviour
206.
information sharing
207.
information society
208.
Information sufficiency
209.
information system
210.
Information System Authority (RIA)
211.
information systems
212.
information systems development
213.
Information Systems research
214.
information technologies
215.
Information technology
216.
information technology (IT)
217.
information theory
218.
information to individual consumers
219.
information tool
220.
information use
221.
information value
222.
information war
223.
information warfare
224.
information visualization
225.
information volume
226.
Information-seeking activity
227.
intelligent information technology
228.
interoperability and evolutionary criteria of information systems
229.
laboratory information management system (LIMS)
230.
laboratory information management systems
231.
LIMS (laboratory information management systems)
232.
medical information
233.
Medical information policy
234.
middleware (for subscription and distribution of situational information)
235.
mobile information system
236.
multilingual information retrieval
237.
multimodal information
238.
open architecture for information exchange
239.
perception of visual information
240.
performance information
241.
performance information use
242.
philosophy of information
243.
process modeling and information systems within the extended enterprise
244.
provision of information to workers
245.
quality evaluation of scientific information
246.
real time information
247.
real-time information
248.
Reaxys Chemistry database information
249.
scientific information
250.
SIS II (Schengen Information System II)
251.
tactile information
252.
traffic information system (TIS)
253.
tree information database
254.
website information
255.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TalTech subject term
1
1.
Building Information Modeling
TalTech department
1
1.
School of Information Technologies
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT