Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(4/236)
Export
export all inquiry results
(5)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
2
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
3
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
4
journal article EST
/
journal article ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
232
1.
Estonian information security standard
2.
information security
3.
information security and privacy
4.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security strategies
18.
cyber-security
19.
data security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
human security
32.
internal security
33.
international security
34.
investment and innovation security
35.
IPv6 security
36.
IT security
37.
IT security management
38.
job security
39.
long-term security
40.
metadata model for security measures
41.
Middle Eastern security
42.
Mobile security
43.
national cyber security strategy
44.
national security
45.
NATO. Science for Peace and Security Program
46.
network security
47.
network security monitoring
48.
OSCE (Organization for Security and Co-operation in Europe)
49.
passenger’s security
50.
policy-based routing security
51.
political and security cultures
52.
post-quantum security
53.
power system security
54.
quantitative security
55.
regional security
56.
RISC-V Security Verification
57.
safety and security testing
58.
security
59.
security adaptation
60.
security alert prioritization
61.
security analysis
62.
security and justice (AFSJ)
63.
Security and political science
64.
security and privacy
65.
security and privacy in smart grids
66.
Security Assertion Mining
67.
security closure
68.
Security Coverage
69.
security dataset
70.
security dilemma
71.
Security evaluation
72.
security evaluation instruments
73.
Security limitations
74.
security log analysis
75.
security management
76.
security model
77.
security monitoring
78.
security notion
79.
security objectives
80.
security of data
81.
security of supply
82.
security operation center
83.
security operations center
84.
security patterns
85.
security policy
86.
security problem definition
87.
security proof
88.
security protocols
89.
security requirements
90.
security requirements engineering
91.
security risk assessment
92.
security risk management
93.
security risks
94.
security strategies
95.
security systems for military objects
96.
security testing
97.
security training
98.
security verification
99.
security-by-design
100.
social security planning
101.
societal security
102.
system of economic security
103.
system security
104.
terrorism security
105.
transmission System Security
106.
voting privacy and security
107.
access to information
108.
age of information
109.
banking information
110.
building information modelling
111.
building information modeling
112.
Building Information Modeling (BIM)
113.
building information modelling
114.
Building Information Modelling (BIM)
115.
Building Information Modelling (BIM) adoption
116.
business information technology
117.
city information modelling (CIM)
118.
communication channels (information theory)
119.
Community Statistics on Information Society (CSIS)
120.
court information system
121.
critical information infrastructure
122.
Data-information-knowledgewisdom (DIKW)
123.
discrete information bottle-neck
124.
dissemination of information
125.
enterprise information systems
126.
Estonian National Health Information System
127.
estonian national health information system (ENHIS)
128.
Estonian nationwide Health Information System (EHIS)
129.
evolutionary information systems
130.
financial information
131.
general theory of information transfer
132.
Geographic Information System (GIS)
133.
geographical information system
134.
health information exchange
135.
health information purpose
136.
health information sharing maturity
137.
health information systems
138.
Healthcare information systems
139.
high-performance computing systems, Information processing
140.
HL7 Version 3: Reference Information Model (RIM)
141.
ICT (information and communication technology)
142.
information
143.
information analysis
144.
information and communication technologies
145.
Information and Communication Technologies (ICT)
146.
Information and communication technologies (ICT) digitalisation
147.
Information and Communication Technologies (ICT) laws
148.
Information and Communication Technologies (ICTs)
149.
Information and Communication Technologies for Development
150.
information and communication technology
151.
information and communication technology (ICT)
152.
information and communications technology
153.
information and consultation
154.
information architecture
155.
information asymmetry
156.
information commons
157.
information communication technology
158.
information content
159.
information control
160.
information dissemination
161.
information economy
162.
information entropy
163.
information exchange
164.
information extraction
165.
information filtering
166.
information flow control
167.
information fusion
168.
information governance
169.
information integration
170.
information literacy
171.
information literacy cooperation
172.
information logistics
173.
information management
174.
information measures
175.
information model
176.
information model-based urban planning
177.
information polity
178.
information potential
179.
information processing
180.
information processing system
181.
information rate
182.
information realities
183.
information retrieval
184.
information revolution
185.
information seeking behaviour
186.
information sharing
187.
information society
188.
Information sufficiency
189.
information system
190.
Information System Authority (RIA)
191.
information systems
192.
information systems development
193.
Information Systems research
194.
information technologies
195.
Information technology
196.
information technology (IT)
197.
information theory
198.
information to individual consumers
199.
information tool
200.
information value
201.
information warfare
202.
information visualization
203.
information volume
204.
Information-seeking activity
205.
intelligent information technology
206.
interoperability and evolutionary criteria of information systems
207.
laboratory information management system (LIMS)
208.
laboratory information management systems
209.
LIMS (laboratory information management systems)
210.
medical information
211.
Medical information policy
212.
middleware (for subscription and distribution of situational information)
213.
mobile information system
214.
multilingual information retrieval
215.
multimodal information
216.
open architecture for information exchange
217.
perception of visual information
218.
performance information
219.
performance information use
220.
philosophy of information
221.
process modeling and information systems within the extended enterprise
222.
provision of information to workers
223.
quality evaluation of scientific information
224.
real time information
225.
real-time information
226.
Reaxys Chemistry database information
227.
scientific information
228.
SIS II (Schengen Information System II)
229.
traffic information system (TIS)
230.
tree information database
231.
website information
232.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TalTech subject term
1
1.
Building Information Modeling
TalTech department
1
1.
School of Information Technologies
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT