Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
security problem definition (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/168)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Towards a healthcare cybersecurity certification scheme
Hovhannisyan, Kristine
;
Bogacki, Piotr
;
Colabuono, Consuelo Assunta
;
Lofu, Domenico
;
Marabello, Maria Vittoria
;
Maxwell, Brady Eugen
2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
2021
/
p. 1-9
https://doi.org/10.1109/CyberSA52016.2021.9478255
book article
Number of records 1, displaying
1 - 1
keyword
166
1.
security problem definition
2.
cost function definition
3.
definition
4.
legal definition
5.
market definition
6.
project definition
7.
REHVA nZEB technical definition
8.
strategy definition
9.
Urban area definition
10.
boundary problem
11.
boundary value problem
12.
Calderon problem
13.
Calderón problem
14.
class imbalance problem
15.
decoration problem
16.
elastica problem
17.
ethical problem
18.
finite basis problem
19.
free rider problem
20.
initial solution to the linear programming problem
21.
inventory routing problem
22.
inventory routing problem (IRP)
23.
inverse conductivity problem
24.
inverse problem
25.
inverse problem theory/applications
26.
inverse shape problem
27.
inverse source problem
28.
last mile problem
29.
matrix nearness problem
30.
model matching problem
31.
multicriteria decisionmaking problem
32.
non-local Riemann-Hilbert problem
33.
one more discrete logarithm problem
34.
overheating problem
35.
plane stress problem
36.
problem solving
37.
problem-based learning
38.
Problem-based learning (PBL)
39.
problem-oriented languages
40.
problem-oriented programming languages
41.
realisation problem
42.
realization problem
43.
SIS problem, learning with errors
44.
the inverse problem
45.
the problem of elimination
46.
theory of inventive problem solving (TRIZ)
47.
traveling salesman problem
48.
ad-hoc sensor networks security
49.
Automatic Security Verification
50.
Blockchain security
51.
cache security
52.
communication system security
53.
comprehensive system of economic security
54.
computer security
55.
cooperative security dilemma
56.
cyber security
57.
cyber security education
58.
cyber security exercises
59.
cyber security monitoring
60.
cyber security strategies
61.
cyber-security
62.
data and information security
63.
data security
64.
development of security cameras
65.
digital security practices
66.
drinking water security
67.
economic security
68.
economic security of enterprise
69.
emotional security
70.
energy security
71.
energy security indicator
72.
Estonian information security standard
73.
graded security
74.
hardware security
75.
hardware security primitive
76.
high level of security
77.
Homeland security
78.
human security
79.
information security
80.
information security and privacy
81.
initial level of security
82.
internal security
83.
international security
84.
investment and innovation security
85.
IPv6 security
86.
IT security
87.
IT security management
88.
job security
89.
long-term security
90.
maritime cyber security
91.
maritime cyber security operations centers
92.
Maritime Security Operations Center (M-SOC)
93.
medium level of security
94.
metadata model for security measures
95.
Middle Eastern security
96.
Mobile security
97.
national cyber security strategy
98.
national security
99.
NATO. Science for Peace and Security Program
100.
network security
101.
network security monitoring
102.
OSCE (Organization for Security and Co-operation in Europe)
103.
passenger’s security
104.
policy-based routing security
105.
political and security cultures
106.
post-quantum security
107.
power system security
108.
quantitative security
109.
regional security
110.
RISC-V Security Verification
111.
Safety and Security in Sea Transportation
112.
safety and security testing
113.
security
114.
security adaptation
115.
security alert prioritization
116.
security analysis
117.
security and justice (AFSJ)
118.
Security and political science
119.
security and privacy
120.
security and privacy in smart grids
121.
Security Assertion Mining
122.
security closure
123.
Security Coverage
124.
security dataset
125.
security dilemma
126.
Security evaluation
127.
security evaluation instruments
128.
Security limitations
129.
security log analysis
130.
security management
131.
security model
132.
security monitoring
133.
security notion
134.
security objectives
135.
security of data
136.
security of supply
137.
security operation center
138.
security operations center
139.
security patterns
140.
security policy
141.
security proof
142.
security protocols
143.
security requirements
144.
security requirements engineering
145.
security research
146.
security risk assessment
147.
security risk management
148.
security risks
149.
security science and technology
150.
security strategies
151.
security systems for military objects
152.
security testing
153.
security training
154.
security verification
155.
security-by-design
156.
social security planning
157.
societal security
158.
software security
159.
software security level
160.
software security subcharacteristics
161.
sufficient level of security
162.
system of economic security
163.
system security
164.
terrorism security
165.
transmission System Security
166.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT