Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/210)
Export
export all inquiry results
(5)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
2
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
3
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
4
journal article
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
journal article
5
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
207
1.
information security
2.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security strategies
15.
cyber-security
16.
data security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
graded security
25.
hardware security
26.
hardware security primitive
27.
human security
28.
internal security
29.
international security
30.
investment and innovation security
31.
IPv6 security
32.
IT security
33.
IT security management
34.
job security
35.
long-term security
36.
metadata model for security measures
37.
Middle Eastern security
38.
Mobile security
39.
national cyber security strategy
40.
national security
41.
NATO. Science for Peace and Security Program
42.
network security
43.
network security monitoring
44.
OSCE (Organization for Security and Co-operation in Europe)
45.
passenger’s security
46.
policy-based routing security
47.
political and security cultures
48.
post-quantum security
49.
power system security
50.
quantitative security
51.
regional security
52.
RISC-V Security Verification
53.
security
54.
security and privacy
55.
security and privacy in smart grids
56.
Security Assertion Mining
57.
security closure
58.
Security Coverage
59.
security dataset
60.
security dilemma
61.
Security evaluation
62.
security log analysis
63.
security management
64.
security model
65.
security monitoring
66.
security notion
67.
security objectives
68.
security of data
69.
security of supply
70.
security operation center
71.
security patterns
72.
security problem definition
73.
security proof
74.
security protocols
75.
security requirements
76.
security requirements engineering
77.
security risk assessment
78.
security risk management
79.
security strategies
80.
security systems for military objects
81.
security testing
82.
security training
83.
security verification
84.
social security planning
85.
societal security
86.
system of economic security
87.
system security
88.
terrorism security
89.
transmission System Security
90.
voting privacy and security
91.
access to information
92.
age of information
93.
banking information
94.
building information modelling
95.
building information modeling
96.
Building Information Modeling (BIM)
97.
building information modelling
98.
Building Information Modelling (BIM)
99.
Building Information Modelling (BIM) adoption
100.
business information technology
101.
city information modelling (CIM)
102.
communication channels (information theory)
103.
Community Statistics on Information Society (CSIS)
104.
court information system
105.
critical information infrastructure
106.
Data-information-knowledgewisdom (DIKW)
107.
discrete information bottle-neck
108.
dissemination of information
109.
enterprise information systems
110.
Estonian National Health Information System
111.
Estonian nationwide Health Information System (EHIS)
112.
evolutionary information systems
113.
financial information
114.
general theory of information transfer
115.
Geographic Information System (GIS)
116.
Geographic Information Systems (GIS)
117.
geographical information system
118.
health information exchange
119.
health information systems
120.
Healthcare information systems
121.
high-performance computing systems, Information processing
122.
HL7 Version 3: Reference Information Model (RIM)
123.
ICT (information and communication technology)
124.
information
125.
information and communication technologies
126.
Information and communication technologies (ICT) digitalisation
127.
Information and Communication Technologies (ICT) laws
128.
Information and Communication Technologies (ICTs)
129.
Information and Communication Technologies for Development
130.
information and communication technology
131.
information and communication technology (ICT)
132.
information and communications technology
133.
information architecture
134.
information asymmetry
135.
information commons
136.
information communication technology
137.
information content
138.
information control
139.
information dissemination
140.
information economy
141.
information entropy
142.
information exchange
143.
information extraction
144.
information flow control
145.
information fusion
146.
information governance
147.
information integration
148.
information literacy
149.
information literacy cooperation
150.
information logistics
151.
information management
152.
information measures
153.
information model
154.
information model-based urban planning
155.
information polity
156.
information potential
157.
information processing
158.
information processing system
159.
information rate
160.
information realities
161.
information retrieval
162.
information revolution
163.
information seeking behaviour
164.
information sharing
165.
information society
166.
Information sufficiency
167.
information system
168.
Information System Authority (RIA)
169.
information systems
170.
information systems development
171.
Information Systems research
172.
information technologies
173.
Information technology
174.
information technology (IT)
175.
information theory
176.
information to individual consumers
177.
information tool
178.
information value
179.
information warfare
180.
information visualization
181.
Information-seeking activity
182.
intelligent information technology
183.
interoperability and evolutionary criteria of information systems
184.
laboratory information management system (LIMS)
185.
laboratory information management systems
186.
LIMS (laboratory information management systems)
187.
medical information
188.
Medical information policy
189.
middleware (for subscription and distribution of situational information)
190.
mobile information system
191.
multilingual information retrieval
192.
multimodal information
193.
open architecture for information exchange
194.
perception of visual information
195.
performance information
196.
performance information use
197.
philosophy of information
198.
process modeling and information systems within the extended enterprise
199.
quality evaluation of scientific information
200.
real time information
201.
real-time information
202.
Reaxys Chemistry database information
203.
scientific information
204.
SIS II (Schengen Information System II)
205.
traffic information system (TIS)
206.
website information
207.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ subject term
1
1.
Building Information Modeling
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT