Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security monitoring (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/240)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
How to build a SOC on a budget
Vaarandi, Risto
;
Mäses, Sten
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
2022
/
p. 171-177 : ill
https://doi.org/10.1109/CSR54599.2022.9850281
book article
Number of records 1, displaying
1 - 1
keyword
233
1.
cyber security monitoring
2.
network security monitoring
3.
security monitoring
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
high level of security
32.
Homeland security
33.
human security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
maritime cyber security
46.
maritime cyber security operations centers
47.
Maritime Security Operations Center (M-SOC)
48.
medium level of security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
Safety and Security in Sea Transportation
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion Mining
76.
security closure
77.
Security Coverage
78.
security dataset
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security limitations
83.
security log analysis
84.
security management
85.
security model
86.
security notion
87.
security objectives
88.
security of data
89.
security of supply
90.
security operation center
91.
security operations center
92.
security patterns
93.
security policy
94.
security problem definition
95.
security proof
96.
security protocols
97.
security requirements
98.
security requirements engineering
99.
security research
100.
security risk assessment
101.
security risk management
102.
security risks
103.
security science and technology
104.
security strategies
105.
security systems for military objects
106.
security testing
107.
security training
108.
security verification
109.
security-by-design
110.
social security planning
111.
societal security
112.
software security
113.
software security level
114.
software security subcharacteristics
115.
sufficient level of security
116.
system of economic security
117.
system security
118.
terrorism security
119.
transmission System Security
120.
voting privacy and security
121.
ambulatory blood pressure monitoring
122.
automated decision and monitoring mechanisms
123.
Baltic-wide HELCOM COMBINE monitoring program
124.
bi-directional fault monitoring devices
125.
biological monitoring
126.
biomedical monitoring
127.
biosignal monitoring
128.
cardiac monitoring
129.
CO2 monitoring
130.
coastal monitoring
131.
condition monitoring
132.
condition monitoring system
133.
continuous monitoring
134.
Copernicus Marine Environment Monitoring Service
135.
corporate performance monitoring system
136.
corrosion monitoring
137.
data-driven condition monitoring
138.
deformation monitoring
139.
diagnosis and performance monitoring
140.
Distributed flow monitoring
141.
distributed monitoring
142.
distributed online monitoring
143.
disturbance monitoring
144.
drone-based traffic monitoring
145.
drug monitoring
146.
e-monitoring
147.
Environmental compliance monitoring
148.
environmental monitoring
149.
fault monitoring
150.
field monitoring
151.
fish monitoring
152.
GHB monitoring
153.
groundwater monitoring
154.
haemodialysis monitoring
155.
health monitoring
156.
healthcare monitoring
157.
hemodialysis monitoring
158.
home blood pressure monitoring
159.
home monitoring
160.
industrial monitoring
161.
infrastructure monitoring
162.
in-situ monitoring
163.
integrated hemodynamic monitoring
164.
interactive monitoring
165.
IoT-based monitoring
166.
laboratory monitoring
167.
landfill monitoring
168.
load monitoring
169.
long term monitoring
170.
long-term monitoring
171.
machine condition monitoring
172.
machinery monitoring
173.
Magnetic induction monitoring
174.
marine microplastic monitoring
175.
marine monitoring
176.
monitoring
177.
monitoring and application design
178.
monitoring and detection
179.
monitoring and prognosis
180.
monitoring deformations
181.
monitoring program
182.
monitoring RIS3 observatory
183.
monitoring system
184.
monitoring the health patients
185.
NetFlow based network monitoring
186.
network monitoring
187.
Non-intrusive load monitoring
188.
non-intrusive load monitoring (NILM)
189.
ocean monitoring
190.
online monitoring
191.
on-line monitoring
192.
optical monitoring
193.
passive acoustic monitoring
194.
patient monitoring
195.
performance monitoring
196.
periodic monitoring
197.
pollen monitoring
198.
power quality monitoring
199.
PQM (Power Quality Monitoring)
200.
process monitoring
201.
production monitoring
202.
production monitoring system
203.
production monitoring system (PLM)
204.
production monitoring system (PMS)
205.
production monitoring systems (PMS)
206.
project-monitoring
207.
quality monitoring
208.
real time monitoring process
209.
real-time collision monitoring
210.
real-time monitoring
211.
remote monitoring
212.
remote patient monitoring
213.
respiratory monitoring
214.
RIS3 evaluation and monitoring
215.
road surface condition monitoring
216.
sea monitoring
217.
sensor respiratory monitoring
218.
smart materials with structural health monitoring capabilities
219.
SoC health monitoring
220.
stormwater monitoring
221.
structural health monitoring
222.
surface water monitoring
223.
susceptibility monitoring
224.
system monitoring
225.
terms—production environment monitoring
226.
the accuracy of monitoring in analysis of impact impulses
227.
The Baltic Monitoring and Forecasting Centre (BAL MFC)
228.
traffic behavior monitoring
229.
treatment monitoring
230.
water pollution monitoring
231.
water quality monitoring
232.
wearable health monitoring
233.
wide area monitoring
subject term
7
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
4.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
5.
Baltic Monitoring and Forecasting Center (BALMFC)
6.
Copernicus Marine Environment Monitoring Service (CMEMS)
7.
MyOcean Baltic Sea Monitoring and Forecasting Centre
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT