Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security operation center (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/166)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
How to build a SOC on a budget
Vaarandi, Risto
;
Mäses, Sten
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
2022
/
p. 171-177 : ill
https://doi.org/10.1109/CSR54599.2022.9850281
book article
Number of records 1, displaying
1 - 1
keyword
159
1.
security operation center
2.
Maritime Security Operations Center (M-SOC)
3.
security operations center
4.
maritime cyber security operations centers
5.
OSCE (Organization for Security and Co-operation in Europe)
6.
autoservice center
7.
center-tapped coupled inductor
8.
data center
9.
data center (DC)
10.
data center applications
11.
daycare center
12.
Municipal Operations Center
13.
Non-emergency Contact Center
14.
shared service center
15.
shared service center (SSC)
16.
underwater data center
17.
urban learning center
18.
alternate operation
19.
boiler transient operation
20.
buckboost operation
21.
buck–boost operation
22.
co-operation
23.
co-operation between member states
24.
cyber operation
25.
cyber operation officer
26.
dynamic operation of heating systems
27.
fault tolerant operation
28.
islanded operation
29.
judicial co-operation
30.
maintenance and efficient operation
31.
morphological operation
32.
operation
33.
operation and maintenance
34.
operation costs
35.
operation management
36.
optimal operation strategy
37.
pick-and-place operation
38.
power system operation
39.
protection non operation
40.
regional co-operation
41.
remote operation of vehicles
42.
safe operation
43.
transmission system operation
44.
wide voltage range operation
45.
ad-hoc sensor networks security
46.
Automatic Security Verification
47.
Blockchain security
48.
cache security
49.
communication system security
50.
comprehensive system of economic security
51.
computer security
52.
cooperative security dilemma
53.
cyber security
54.
cyber security education
55.
cyber security exercises
56.
cyber security monitoring
57.
cyber security strategies
58.
cyber-security
59.
data and information security
60.
data security
61.
development of security cameras
62.
digital security practices
63.
drinking water security
64.
economic security
65.
economic security of enterprise
66.
emotional security
67.
energy security
68.
energy security indicator
69.
Estonian information security standard
70.
graded security
71.
hardware security
72.
hardware security primitive
73.
high level of security
74.
Homeland security
75.
human security
76.
information security
77.
information security and privacy
78.
initial level of security
79.
internal security
80.
international security
81.
investment and innovation security
82.
IPv6 security
83.
IT security
84.
IT security management
85.
job security
86.
long-term security
87.
maritime cyber security
88.
medium level of security
89.
metadata model for security measures
90.
Middle Eastern security
91.
Mobile security
92.
national cyber security strategy
93.
national security
94.
NATO. Science for Peace and Security Program
95.
network security
96.
network security monitoring
97.
passenger’s security
98.
policy-based routing security
99.
political and security cultures
100.
post-quantum security
101.
power system security
102.
quantitative security
103.
regional security
104.
RISC-V Security Verification
105.
Safety and Security in Sea Transportation
106.
safety and security testing
107.
security
108.
security adaptation
109.
security alert prioritization
110.
security analysis
111.
security and justice (AFSJ)
112.
Security and political science
113.
security and privacy
114.
security and privacy in smart grids
115.
Security Assertion Mining
116.
security closure
117.
Security Coverage
118.
security dataset
119.
security dilemma
120.
Security evaluation
121.
security evaluation instruments
122.
Security limitations
123.
security log analysis
124.
security management
125.
security model
126.
security monitoring
127.
security notion
128.
security objectives
129.
security of data
130.
security of supply
131.
security patterns
132.
security policy
133.
security problem definition
134.
security proof
135.
security protocols
136.
security requirements
137.
security requirements engineering
138.
security research
139.
security risk assessment
140.
security risk management
141.
security risks
142.
security science and technology
143.
security strategies
144.
security systems for military objects
145.
security testing
146.
security training
147.
security verification
148.
security-by-design
149.
social security planning
150.
societal security
151.
software security
152.
software security level
153.
software security subcharacteristics
154.
sufficient level of security
155.
system of economic security
156.
system security
157.
terrorism security
158.
transmission System Security
159.
voting privacy and security
subject term
7
1.
Baltic Monitoring and Forecasting Center (BALMFC)
2.
Estonian Center for Safe and Trustworthy Artificial Intelligence (ECSTAI)
3.
FinEst Center for Smart Cities
4.
The Center for European Integration Studies
5.
UNDP Urban Learning Center
6.
National Computer Security Incident Response Teams (N-CSIRTs)
7.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT