Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
computer security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
7
Look more..
(3/196)
Export
export all inquiry results
(7)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
Are the current system engineering practices sufficient to meet cyber crime?
Buldas, Ahto
;
Saarepera, Märt
Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017 : held as part of HCI International 2017, Vancouver, BC, Canada, July 9–14, 2017 : proceedings
2017
/
p. 451-463
https://doi.org/10.1007/978-3-319-58460-7_31
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
book article
EU cybersecurity governance – stakeholders and normative intentions towards integration
Kasper, Agnes
The future of the European Union : demisting the debate
2020
/
p. 166−185
https://www.um.edu.mt/library/oar/handle/123456789/52308
https://www.um.edu.mt/library/oar/bitstream/123456789/52308/1/EU_cybersecurity_governance%e2%80%93stakeholders_and_normative_intentions_towards_integration_2020.pdf
book article
5
book article EST
/
book article ENG
Preface
Bellatreche, Ladjel
;
Chernishev, George
;
Corral, Antonio
;
Ouchani, Samir
;
Vain, Jüri
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
/
p. v-vii
https://link.springer.com/content/pdf/bfm:978-3-030-87657-9/1?pdf=chapter%20toc
Article collection metrics at Scopus
Article at Scopus
book article EST
/
book article ENG
6
book article
The becoming of cyber-military capabilities
Salminen, Mikko
;
Kerttunen, Mika
Routledge handbook of international cybersecurity
2020
/
p. 94-107
https://www.ester.ee/record=b5308475*est
book article
7
book article
Towards a Cyber Maastricht : two steps forward, one step back
Kasper, Agnes
;
Vernygora, Vlad Alex
The future of the European Union : demisting the debate
2020
/
p. 186-210
https://www.um.edu.mt/library/oar/handle/123456789/52310
https://www.um.edu.mt/library/oar/bitstream/123456789/52310/1/Towards_a_%e2%80%98Cyber_Maastricht%e2%80%99_two_steps_forward_one_step_back_2020.pdf
book article
Number of records 7, displaying
1 - 7
keyword
191
1.
computer security
2.
ad-hoc sensor networks security
3.
Automatic Security Verification
4.
Blockchain security
5.
cache security
6.
communication system security
7.
comprehensive system of economic security
8.
cooperative security dilemma
9.
cyber security
10.
cyber security education
11.
cyber security exercises
12.
cyber security monitoring
13.
cyber security strategies
14.
cyber-security
15.
data security
16.
development of security cameras
17.
drinking water security
18.
economic security
19.
economic security of enterprise
20.
emotional security
21.
energy security
22.
energy security indicator
23.
Estonian information security standard
24.
graded security
25.
hardware security
26.
hardware security primitive
27.
human security
28.
information security
29.
information security and privacy
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
metadata model for security measures
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
Security and political science
62.
security and privacy
63.
security and privacy in smart grids
64.
Security Assertion Mining
65.
security closure
66.
Security Coverage
67.
security dataset
68.
security dilemma
69.
Security evaluation
70.
security evaluation instruments
71.
Security limitations
72.
security log analysis
73.
security management
74.
security model
75.
security monitoring
76.
security notion
77.
security objectives
78.
security of data
79.
security of supply
80.
security operation center
81.
security operations center
82.
security patterns
83.
security policy
84.
security problem definition
85.
security proof
86.
security protocols
87.
security requirements
88.
security requirements engineering
89.
security risk assessment
90.
security risk management
91.
security risks
92.
security strategies
93.
security systems for military objects
94.
security testing
95.
security training
96.
security verification
97.
security-by-design
98.
social security planning
99.
societal security
100.
system of economic security
101.
system security
102.
terrorism security
103.
transmission System Security
104.
voting privacy and security
105.
computer
106.
computer aided design
107.
computer aided diagnosis
108.
computer aided diagnostics
109.
computer aided instruction
110.
computer aided language translation
111.
computer aided manufacturing
112.
computer aided methods
113.
computer aided software engineering
114.
computer aided testing
115.
computer algebra
116.
computer algebra system
117.
computer and education
118.
computer anxiety
119.
computer architecture
120.
computer assisted language learning
121.
computer based learning
122.
computer circuits
123.
computer control
124.
Computer crime
125.
computer education
126.
computer engineering
127.
computer engineerng
128.
computer game
129.
computer graphics
130.
computer hardware
131.
computer integrated manufacturing
132.
computer network management
133.
computer network operations
134.
computer networks
135.
computer pipelines
136.
computer programming
137.
computer programming languages
138.
computer programs
139.
computer science
140.
computer science basics
141.
computer science education
142.
computer simulation
143.
computer simulation environments
144.
computer simulations
145.
computer software
146.
Computer software and hardware
147.
computer softwaregraph theory
148.
computer systems
149.
Computer systems organization
150.
computer terminals
151.
computer vision
152.
computer vision-based methods
153.
computer workers
154.
computer-aided anthropometry
155.
computer-aided architectural design (CAAD)
156.
computer‐aided assessment
157.
computer-aided design
158.
computer-aided design (CAD)
159.
computer-aided detection
160.
computer‐aided detection
161.
computer-aided diagnosis
162.
computer-aided drawing (CAD)
163.
computer-aided engineering
164.
computer-aided teaching
165.
Computer-Aided Tuning
166.
computer-aided tuning (CAT)
167.
computer-assisted language learning (CALL)
168.
computer-oriented technologies
169.
computer-supported decision-making
170.
computer-use
171.
computer-workers
172.
control engineering computer applications
173.
distributed computer systems
174.
education in computer engineering
175.
fifth generation computer
176.
gateways (computer networks)
177.
high-performance computer systems
178.
human computer interaction
179.
human computer interaction (HCI)
180.
human-computer interaction
181.
human–computer interaction
182.
Human-Computer Interaction (HCI)
183.
human-computer trust
184.
interactive computer graphics
185.
laptop computer
186.
logic in computer science
187.
single board computer
188.
single-board computer
189.
structure computer analysis
190.
ubiquitous computer technology
191.
Web and computer-based learning
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Computer Systems
4.
Estonian Summer School on Computer and Systems Science, 2023
TalTech department
1
1.
Department of Computer Systems
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT