Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
emotional security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/117)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
A systematic approach to define requirements and engineer the ontology for semantically merging data sets for personal-Centric healthcare systems
Kormiltsõn, Aleksandr
CAiSE 2018 Doctoral Consortium
2018
/
p. 91 - 99
https://ceur-ws.org/Vol-2114/paper11.pdf
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
115
1.
emotional security
2.
emotional and physiological states
3.
emotional contagion
4.
emotional context
5.
emotional coping
6.
emotional exhaustion
7.
emotional goals
8.
Emotional Intelligence (EI)
9.
emotional labour
10.
Emotional, affective and physiological states, arousal and valence
11.
human emotional and physiological states
12.
ad-hoc sensor networks security
13.
Automatic Security Verification
14.
Blockchain security
15.
cache security
16.
communication system security
17.
comprehensive system of economic security
18.
computer security
19.
cooperative security dilemma
20.
cyber security
21.
cyber security education
22.
cyber security exercises
23.
cyber security monitoring
24.
cyber security strategies
25.
cyber-security
26.
data security
27.
development of security cameras
28.
digital security practices
29.
drinking water security
30.
economic security
31.
economic security of enterprise
32.
energy security
33.
energy security indicator
34.
Estonian information security standard
35.
graded security
36.
hardware security
37.
hardware security primitive
38.
human security
39.
information security
40.
information security and privacy
41.
internal security
42.
international security
43.
investment and innovation security
44.
IPv6 security
45.
IT security
46.
IT security management
47.
job security
48.
long-term security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion Mining
76.
security closure
77.
Security Coverage
78.
security dataset
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security limitations
83.
security log analysis
84.
security management
85.
security model
86.
security monitoring
87.
security notion
88.
security objectives
89.
security of data
90.
security of supply
91.
security operation center
92.
security operations center
93.
security patterns
94.
security policy
95.
security problem definition
96.
security proof
97.
security protocols
98.
security requirements
99.
security requirements engineering
100.
security risk assessment
101.
security risk management
102.
security risks
103.
security strategies
104.
security systems for military objects
105.
security testing
106.
security training
107.
security verification
108.
security-by-design
109.
social security planning
110.
societal security
111.
system of economic security
112.
system security
113.
terrorism security
114.
transmission System Security
115.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT