Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
security problem definition (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/130)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Towards a healthcare cybersecurity certification scheme
Hovhannisyan, Kristine
;
Bogacki, Piotr
;
Colabuono, Consuelo Assunta
;
Lofu, Domenico
;
Marabello, Maria Vittoria
;
Maxwell, Brady Eugen
2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
2021
/
p. 1-9
https://doi.org/10.1109/CyberSA52016.2021.9478255
book article
Number of records 1, displaying
1 - 1
keyword
128
1.
security problem definition
2.
cost function definition
3.
definition
4.
legal definition
5.
market definition
6.
project definition
7.
REHVA nZEB technical definition
8.
strategy definition
9.
Urban area definition
10.
boundary problem
11.
boundary value problem
12.
Calderon problem
13.
Calderón problem
14.
decoration problem
15.
elastica problem
16.
ethical problem
17.
free rider problem
18.
initial solution to the linear programming problem
19.
inventory routing problem
20.
inventory routing problem (IRP)
21.
inverse conductivity problem
22.
inverse problem
23.
inverse problem theory/applications
24.
inverse shape problem
25.
inverse source problem
26.
last mile problem
27.
matrix nearness problem
28.
model matching problem
29.
multicriteria decisionmaking problem
30.
non-local Riemann-Hilbert problem
31.
one more discrete logarithm problem
32.
overheating problem
33.
plane stress problem
34.
problem solving
35.
problem-based learning
36.
Problem-based learning (PBL)
37.
problem-oriented languages
38.
problem-oriented programming languages
39.
realisation problem
40.
realization problem
41.
the inverse problem
42.
the problem of elimination
43.
theory of inventive problem solving (TRIZ)
44.
traveling salesman problem
45.
ad-hoc sensor networks security
46.
Blockchain security
47.
cache security
48.
communication system security
49.
comprehensive system of economic security
50.
computer security
51.
cooperative security dilemma
52.
cyber security
53.
cyber security education
54.
cyber security exercises
55.
cyber security strategies
56.
cyber-security
57.
data security
58.
development of security cameras
59.
drinking water security
60.
economic security
61.
economic security of enterprise
62.
emotional security
63.
energy security
64.
energy security indicator
65.
graded security
66.
hardware security
67.
hardware security primitive
68.
human security
69.
information security
70.
internal security
71.
international security
72.
investment and innovation security
73.
IPv6 security
74.
IT security
75.
job security
76.
long-term security
77.
metadata model for security measures
78.
Middle Eastern security
79.
Mobile security
80.
national cyber security strategy
81.
national security
82.
NATO. Science for Peace and Security Program
83.
network security
84.
network security monitoring
85.
OSCE (Organization for Security and Co-operation in Europe)
86.
passenger’s security
87.
policy-based routing security
88.
political and security cultures
89.
post-quantum security
90.
power system security
91.
quantitative security
92.
regional security
93.
security
94.
security and privacy
95.
security and privacy in smart grids
96.
security closure
97.
Security Coverage
98.
security dataset
99.
security dilemma
100.
Security evaluation
101.
security log analysis
102.
security management
103.
security model
104.
security monitoring
105.
security notion
106.
security objectives
107.
security of data
108.
security of supply
109.
security operation center
110.
security patterns
111.
security proof
112.
security protocols
113.
security requirements
114.
security requirements engineering
115.
security risk assessment
116.
security risk management
117.
security strategies
118.
security systems for military objects
119.
security testing
120.
security training
121.
security verification
122.
social security planning
123.
societal security
124.
system of economic security
125.
system security
126.
terrorism security
127.
transmission System Security
128.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT