Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(4/230)
Export
export all inquiry results
(5)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
2
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
3
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
4
journal article EST
/
journal article ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
226
1.
Estonian information security standard
2.
information security
3.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
data security
19.
development of security cameras
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
metadata model for security measures
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
Security and political science
62.
security and privacy
63.
security and privacy in smart grids
64.
Security Assertion Mining
65.
security closure
66.
Security Coverage
67.
security dataset
68.
security dilemma
69.
Security evaluation
70.
security evaluation instruments
71.
security log analysis
72.
security management
73.
security model
74.
security monitoring
75.
security notion
76.
security objectives
77.
security of data
78.
security of supply
79.
security operation center
80.
security operations center
81.
security patterns
82.
security policy
83.
security problem definition
84.
security proof
85.
security protocols
86.
security requirements
87.
security requirements engineering
88.
security risk assessment
89.
security risk management
90.
security strategies
91.
security systems for military objects
92.
security testing
93.
security training
94.
security verification
95.
security-by-design
96.
social security planning
97.
societal security
98.
system of economic security
99.
system security
100.
terrorism security
101.
transmission System Security
102.
voting privacy and security
103.
access to information
104.
age of information
105.
banking information
106.
building information modelling
107.
building information modeling
108.
Building Information Modeling (BIM)
109.
building information modelling
110.
Building Information Modelling (BIM)
111.
Building Information Modelling (BIM) adoption
112.
business information technology
113.
city information modelling (CIM)
114.
communication channels (information theory)
115.
Community Statistics on Information Society (CSIS)
116.
court information system
117.
critical information infrastructure
118.
Data-information-knowledgewisdom (DIKW)
119.
discrete information bottle-neck
120.
dissemination of information
121.
enterprise information systems
122.
Estonian National Health Information System
123.
estonian national health information system (ENHIS)
124.
Estonian nationwide Health Information System (EHIS)
125.
evolutionary information systems
126.
financial information
127.
general theory of information transfer
128.
Geographic Information System (GIS)
129.
geographical information system
130.
health information exchange
131.
health information purpose
132.
health information sharing maturity
133.
health information systems
134.
Healthcare information systems
135.
high-performance computing systems, Information processing
136.
HL7 Version 3: Reference Information Model (RIM)
137.
ICT (information and communication technology)
138.
information
139.
information analysis
140.
information and communication technologies
141.
Information and Communication Technologies (ICT)
142.
Information and communication technologies (ICT) digitalisation
143.
Information and Communication Technologies (ICT) laws
144.
Information and Communication Technologies (ICTs)
145.
Information and Communication Technologies for Development
146.
information and communication technology
147.
information and communication technology (ICT)
148.
information and communications technology
149.
information architecture
150.
information asymmetry
151.
information commons
152.
information communication technology
153.
information content
154.
information control
155.
information dissemination
156.
information economy
157.
information entropy
158.
information exchange
159.
information extraction
160.
information filtering
161.
information flow control
162.
information fusion
163.
information governance
164.
information integration
165.
information literacy
166.
information literacy cooperation
167.
information logistics
168.
information management
169.
information measures
170.
information model
171.
information model-based urban planning
172.
information polity
173.
information potential
174.
information processing
175.
information processing system
176.
information rate
177.
information realities
178.
information retrieval
179.
information revolution
180.
information seeking behaviour
181.
information sharing
182.
information society
183.
Information sufficiency
184.
information system
185.
Information System Authority (RIA)
186.
information systems
187.
information systems development
188.
Information Systems research
189.
information technologies
190.
Information technology
191.
information technology (IT)
192.
information theory
193.
information to individual consumers
194.
information tool
195.
information value
196.
information warfare
197.
information visualization
198.
information volume
199.
Information-seeking activity
200.
intelligent information technology
201.
interoperability and evolutionary criteria of information systems
202.
laboratory information management system (LIMS)
203.
laboratory information management systems
204.
LIMS (laboratory information management systems)
205.
medical information
206.
Medical information policy
207.
middleware (for subscription and distribution of situational information)
208.
mobile information system
209.
multilingual information retrieval
210.
multimodal information
211.
open architecture for information exchange
212.
perception of visual information
213.
performance information
214.
performance information use
215.
philosophy of information
216.
process modeling and information systems within the extended enterprise
217.
quality evaluation of scientific information
218.
real time information
219.
real-time information
220.
Reaxys Chemistry database information
221.
scientific information
222.
SIS II (Schengen Information System II)
223.
traffic information system (TIS)
224.
tree information database
225.
website information
226.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TalTech subject term
1
1.
Building Information Modeling
TalTech department
1
1.
School of Information Technologies
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT