Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security patterns (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/163)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Security requirements elicitation from airline turnaround processes
Matulevičius, Raimundas
;
Norta, Alexander
;
Samarütel, Silver
Business & information systems engineering : BISE ; the international journal of wirtschaftsinformatik
2018
/
p. 3-20 : ill
https://doi.org/10.1007/s12599-018-0518-4
Journal metrics at Scopus
Article at Scopus
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
161
1.
security patterns
2.
abstract syntax patterns
3.
airflow patterns
4.
analysis patterns
5.
archetype patterns
6.
archetypes and archetype patterns
7.
archetypes and archetype patterns based development
8.
budgeting patterns
9.
business archetypes and archetype patterns
10.
consumer load patterns
11.
Damage patterns
12.
dark patterns
13.
demand patterns
14.
design patterns
15.
dietary patterns
16.
dive patterns
17.
dolphin patterns
18.
flow patterns
19.
human movement patterns
20.
identification patterns
21.
interaction patterns
22.
layout patterns
23.
Leakage Patterns
24.
mining line patterns from event logs
25.
mining patterns from event logs
26.
model-based patterns
27.
moving patterns
28.
patterns
29.
polysemy patterns
30.
public behavior patterns
31.
religious patterns
32.
river flood patterns
33.
sequential patterns
34.
spatial patterns
35.
task knowledge patterns
36.
test patterns
37.
travel patterns
38.
trends and patterns
39.
trigger-response patterns
40.
urban patterns
41.
user interface patterns
42.
3D surface patterns
43.
ad-hoc sensor networks security
44.
Automatic Security Verification
45.
Blockchain security
46.
cache security
47.
communication system security
48.
comprehensive system of economic security
49.
computer security
50.
cooperative security dilemma
51.
cyber security
52.
cyber security education
53.
cyber security exercises
54.
cyber security monitoring
55.
cyber security strategies
56.
cyber-security
57.
data and information security
58.
data security
59.
development of security cameras
60.
digital security practices
61.
drinking water security
62.
economic security
63.
economic security of enterprise
64.
emotional security
65.
energy security
66.
energy security indicator
67.
Estonian information security standard
68.
graded security
69.
hardware security
70.
hardware security primitive
71.
high level of security
72.
Homeland security
73.
human security
74.
information security
75.
information security and privacy
76.
initial level of security
77.
internal security
78.
international security
79.
investment and innovation security
80.
IPv6 security
81.
IT security
82.
IT security management
83.
job security
84.
long-term security
85.
maritime cyber security
86.
maritime cyber security operations centers
87.
Maritime Security Operations Center (M-SOC)
88.
medium level of security
89.
metadata model for security measures
90.
Middle Eastern security
91.
Mobile security
92.
national cyber security strategy
93.
national security
94.
NATO. Science for Peace and Security Program
95.
network security
96.
network security monitoring
97.
OSCE (Organization for Security and Co-operation in Europe)
98.
passenger’s security
99.
policy-based routing security
100.
political and security cultures
101.
post-quantum security
102.
power system security
103.
quantitative security
104.
regional security
105.
RISC-V Security Verification
106.
Safety and Security in Sea Transportation
107.
safety and security testing
108.
security
109.
security adaptation
110.
security alert prioritization
111.
security analysis
112.
security and justice (AFSJ)
113.
Security and political science
114.
security and privacy
115.
security and privacy in smart grids
116.
Security Assertion Mining
117.
security closure
118.
Security Coverage
119.
security dataset
120.
security dilemma
121.
Security evaluation
122.
security evaluation instruments
123.
Security limitations
124.
security log analysis
125.
security management
126.
security model
127.
security monitoring
128.
security notion
129.
security objectives
130.
security of data
131.
security of supply
132.
security operation center
133.
security operations center
134.
security policy
135.
security problem definition
136.
security proof
137.
security protocols
138.
security requirements
139.
security requirements engineering
140.
security research
141.
security risk assessment
142.
security risk management
143.
security risks
144.
security science and technology
145.
security strategies
146.
security systems for military objects
147.
security testing
148.
security training
149.
security verification
150.
security-by-design
151.
social security planning
152.
societal security
153.
software security
154.
software security level
155.
software security subcharacteristics
156.
sufficient level of security
157.
system of economic security
158.
system security
159.
terrorism security
160.
transmission System Security
161.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT