Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
computer security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
7
Look more..
(2/180)
Export
export all inquiry results
(7)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
Are the current system engineering practices sufficient to meet cyber crime?
Buldas, Ahto
;
Saarepera, Märt
Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017 : held as part of HCI International 2017, Vancouver, BC, Canada, July 9–14, 2017 : proceedings
2017
/
p. 451-463
https://doi.org/10.1007/978-3-319-58460-7_31
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
book article
EU cybersecurity governance – stakeholders and normative intentions towards integration
Kasper, Agnes
The future of the European Union : demisting the debate
2020
/
p. 166−185
https://www.um.edu.mt/library/oar/handle/123456789/52308
https://www.um.edu.mt/library/oar/bitstream/123456789/52308/1/EU_cybersecurity_governance%e2%80%93stakeholders_and_normative_intentions_towards_integration_2020.pdf
book article
5
book article EST
/
book article ENG
Preface
Bellatreche, Ladjel
;
Chernishev, George
;
Corral, Antonio
;
Ouchani, Samir
;
Vain, Jüri
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
/
p. v-vii
https://link.springer.com/content/pdf/bfm:978-3-030-87657-9/1?pdf=chapter%20toc
Article collection metrics at Scopus
Article at Scopus
book article EST
/
book article ENG
6
book article
The becoming of cyber-military capabilities
Salminen, Mikko
;
Kerttunen, Mika
Routledge handbook of international cybersecurity
2020
/
p. 94-107
https://www.ester.ee/record=b5308475*est
book article
7
book article
Towards a Cyber Maastricht : two steps forward, one step back
Kasper, Agnes
;
Vernygora, Vlad Alex
The future of the European Union : demisting the debate
2020
/
p. 186-210
https://www.um.edu.mt/library/oar/handle/123456789/52310
https://www.um.edu.mt/library/oar/bitstream/123456789/52310/1/Towards_a_%e2%80%98Cyber_Maastricht%e2%80%99_two_steps_forward_one_step_back_2020.pdf
book article
Number of records 7, displaying
1 - 7
keyword
176
1.
computer security
2.
ad-hoc sensor networks security
3.
Automatic Security Verification
4.
Blockchain security
5.
cache security
6.
communication system security
7.
comprehensive system of economic security
8.
cooperative security dilemma
9.
cyber security
10.
cyber security education
11.
cyber security exercises
12.
cyber security strategies
13.
cyber-security
14.
data security
15.
development of security cameras
16.
drinking water security
17.
economic security
18.
economic security of enterprise
19.
emotional security
20.
energy security
21.
energy security indicator
22.
Estonian information security standard
23.
graded security
24.
hardware security
25.
hardware security primitive
26.
human security
27.
information security
28.
internal security
29.
international security
30.
investment and innovation security
31.
IPv6 security
32.
IT security
33.
IT security management
34.
job security
35.
long-term security
36.
metadata model for security measures
37.
Middle Eastern security
38.
Mobile security
39.
national cyber security strategy
40.
national security
41.
NATO. Science for Peace and Security Program
42.
network security
43.
network security monitoring
44.
OSCE (Organization for Security and Co-operation in Europe)
45.
passenger’s security
46.
policy-based routing security
47.
political and security cultures
48.
post-quantum security
49.
power system security
50.
quantitative security
51.
regional security
52.
RISC-V Security Verification
53.
security
54.
security adaptation
55.
security analysis
56.
security and justice (AFSJ)
57.
security and privacy
58.
security and privacy in smart grids
59.
Security Assertion Mining
60.
security closure
61.
Security Coverage
62.
security dataset
63.
security dilemma
64.
Security evaluation
65.
security evaluation instruments
66.
security log analysis
67.
security management
68.
security model
69.
security monitoring
70.
security notion
71.
security objectives
72.
security of data
73.
security of supply
74.
security operation center
75.
security operations center
76.
security patterns
77.
security policy
78.
security problem definition
79.
security proof
80.
security protocols
81.
security requirements
82.
security requirements engineering
83.
security risk assessment
84.
security risk management
85.
security strategies
86.
security systems for military objects
87.
security testing
88.
security training
89.
security verification
90.
security-by-design
91.
social security planning
92.
societal security
93.
system of economic security
94.
system security
95.
terrorism security
96.
transmission System Security
97.
voting privacy and security
98.
computer
99.
computer aided design
100.
computer aided diagnosis
101.
computer aided diagnostics
102.
computer aided instruction
103.
computer aided language translation
104.
computer aided manufacturing
105.
computer aided testing
106.
computer algebra
107.
computer algebra system
108.
computer and education
109.
computer anxiety
110.
computer architecture
111.
computer assisted language learning
112.
computer based learning
113.
computer circuits
114.
computer control
115.
Computer crime
116.
computer education
117.
computer engineering
118.
computer engineerng
119.
computer game
120.
computer graphics
121.
computer hardware
122.
computer integrated manufacturing
123.
computer network management
124.
computer network operations
125.
computer networks
126.
computer pipelines
127.
computer programming
128.
computer programs
129.
computer science
130.
computer science basics
131.
computer science education
132.
computer simulation
133.
computer simulation environments
134.
computer simulations
135.
computer software
136.
computer softwaregraph theory
137.
computer systems
138.
Computer systems organization
139.
computer terminals
140.
computer vision
141.
computer workers
142.
computer-aided anthropometry
143.
computer-aided architectural design (CAAD)
144.
computer‐aided assessment
145.
computer-aided design
146.
computer-aided detection
147.
computer‐aided detection
148.
computer-aided diagnosis
149.
computer-aided drawing (CAD)
150.
computer-aided engineering
151.
computer-aided teaching
152.
Computer-Aided Tuning
153.
computer-aided tuning (CAT)
154.
computer-assisted language learning (CALL)
155.
computer-oriented technologies
156.
computer-supported decision-making
157.
computer-use
158.
control engineering computer applications
159.
distributed computer systems
160.
education in computer engineering
161.
fifth generation computer
162.
gateways (computer networks)
163.
high-performance computer systems
164.
human computer interaction
165.
human computer interaction (HCI)
166.
human-computer interaction
167.
Human-Computer Interaction (HCI)
168.
human-computer trust
169.
interactive computer graphics
170.
laptop computer
171.
logic in computer science
172.
single board computer
173.
single-board computer
174.
structure computer analysis
175.
ubiquitous computer technology
176.
Web and computer-based learning
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Computer Systems
4.
Estonian Summer School on Computer and Systems Science, 2023
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT