Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
45
Look more..
(2/93)
Export
export all inquiry results
(45)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Ahlswede, R. Ahlswede, A. (ed.); Althöfer, I. (ed.); Deppe, C. (ed.); Tamm, Ulrich (ed.). Identification and other probabilistic models. Rudolf Ahlswede’s lectures on information theory 6. Edited by Alexander Ahlswede, Ingo Althöfer, Christian Deppe and Ulrich Tamm : [review]
Henno, Jaak
Zentralblatt MATH
2021
/
1 p
https://zbmath.org/?q=an%3A7349483
journal article
2
book article
An enhanced lightweight authentication scheme for secure access to cloud data
Hammami, Hamza
;
Obaidat, Mohammad S.
;
Ben Yahia, Sadok
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 2020
2020
/
p. 110-117
https://doi.org/10.5220/0009824301100117
book article
3
book article EST
/
book article ENG
Assessment of aviation security risk management for airline turnaround processes
Matulevičius, Raimundas
;
Norta, Alexander
;
Udokwu, Chibuzor
;
Nõukas, Rein
Transactions on large-scale data- and knowledge-centered systems XXXVI : special issue on data and security engineering
2017
/
p. 109-141 : ill
https://doi.org/10.1007/978-3-662-56266-6_6
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
4
journal article EST
/
journal article ENG
Between sustainability, social cohesion and security regional development in Northeastern Estonia
Prause, Gunnar Klaus
;
Tuisk, Tarmo
;
Olaniyi, Eunice Omolola
Entrepreneurship and sustainability issues
2019
/
p. 1235-1254
https://doi.org/10.9770/jesi.2019.6.3(13)
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
Blockchain-based medical decision support system
Hovorushchenko, Tetiana
;
Hnatchuk, Yelyzaveta
;
Osyadlyi, Vitaliy
;
Kapustian, Mariia
;
Boyarchuk, Artem
Journal of cyber security and mobility
2023
/
p. 253-274 : ill
https://doi.org/10.13052/jcsm2245-1439.123.1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
6
journal article
Chia, N-H.; Chung, K-M.; Yamakawa, T. A black-box approach to post-quantum zero-knowledge in constant rounds : [review]
Henno, Jaak
zbMATH Open
2022
/
1 p.
https://zbmath.org/1486.94089
journal article
7
journal article
A comprehensive survey on revolutionizing connectivity through artificial intelligence-enabled digital twin network in 6G
Sheraz, Muhammad
;
Chuah, Teong Chee
;
Lee, Ying Loong
;
Alam, Muhammad Mahtab
;
Al-Habashna, Ala'a
;
Han, Zhu
IEEE Access
2024
/
p. 49184-49215
https://doi.org/10.1109/ACCESS.2024.3384272
journal article
8
journal article
Current problems related to energy policy and law in European Union
Kerikmäe, Tanel
;
Dutt, Pawan Kumar
L'Europe unie = United Europe
2013
/
p. 112-120 : ill
journal article
9
journal article EST
/
journal article ENG
DADS : decentralized attestation for device swarms
Wedaj, Samuel
;
Paul, Kolin
;
Ribeiro, Vinay J.
ACM Transactions on Privacy and Security
2019
/
Art. 19
https://doi.org/10.1145/3325822
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
10
book article
Design and verification of secure cache wrapper against access-driven side-channel attacks
Niazmand, Behrad
;
Azad, Siavoosh Payandeh
;
Jervan, Gert
;
Sepulveda, Johanna
Euromicro Conference on Digital System Design : DSD 2019 : 28 - 30 August 2019 Kallithea, Chalkidiki, Greece : proceedings
2019
/
p. 672-676 : ill
https://doi.org/10.1109/DSD.2019.00108
book article
11
journal article EST
/
journal article ENG
DoS attack detection and path collision localization in NoC-based MPSoC architectures
Chaves Arroyave, Cesar Giovanni
;
Azad, Siavoosh Payandeh
;
Hollstein, Thomas
;
Sepulveda, Johanna
Journal of low power electronics and applications
2019
/
art. 7, 20 p. : ill
https://doi.org/10.3390/jlpea9010007
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
Bandwidth Reduction DoS attacks in Multi-Tenant NoC-based MPSoCs : detection and avoidance strategies = Ribalaiuse vähendamise DoS-rünnakud mitme rentnikuga NoC-põhiste MPSoC-de puhul : tuvastamise ja vältimise strateegiad
12
book article EST
/
book article ENG
Dynamic and distributed security management for NoC Based MPSoCs
Azad, Siavoosh Payandeh
;
Jervan, Gert
;
Sepulveda, Johanna
Computational Science - ICCS 2019 : 19th International Conference, Faro, Portugal, June 12-14, 2019 : Proceedings, Part II
2019
/
p. 649–662 : ill
https://doi.org/10.1007/978-3-030-22741-8_4
Conference proceeding at Scopus
Article at Scopus
Conference proceeding at WOS
Article at WOS
book article EST
/
book article ENG
13
journal article EST
/
journal article ENG
An efficient authentication and key agreement scheme for secure smart grid communication services
Hammami, Hamza
;
Obaidat, Mohammad S.
;
Ben Yahia, Sadok
International journal of communication systems
2020
/
art. e4558, p. 1−13
https://doi.org/10.1002/dac.4558
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
14
journal article
Europe's refugee crisis in 2015 and security threats from the Baltic perspective
Veebel, Viljar
;
Markus, Raul
Journal of politics and law
2015
/
p. 254-262 : ill
http://dx.doi.org/10.5539/jpl.v8n4p254
journal article
15
book article EST
/
book article ENG
Framework for peer-to-peer data sharing over Web browsers
Pattanaik, Vishwajeet
;
Sharvadze, Ioane
;
Draheim, Dirk
Future Data and Security Engineering : 6th International Conference, FDSE 2019Nha Trang City, Vietnam, November 27–29, 2019 : proceedings
2019
/
p. 207-225 : ill
https://doi.org/10.1007/978-3-030-35653-8_14
Conference proceeding at Scopus
Article at Scopus
Conference proceeding at WOS
Article at WOS
book article EST
/
book article ENG
Seotud publikatsioonid
1
Robust Web annotations in support of knowledge co-creation = Töökindlad veebiannotatsioonid teadmiste ühisloome toetamiseks
16
book article
The governance of safety and security risks in connected healthcare
Skierka-Canton, Isabel
Living in the Internet of Things : Cybersecurity of the IoT - 2018, London
2018
/
12 p
https://doi.org/10.1049/cp.2018.0002
book article
Seotud publikatsioonid
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
17
book article
IaaS platforms : how secure are they?
Astrova, Irina
;
Koschel, Arne
;
Henke, Mats Lennart
IEEE 30th International Conference on Advanced Information Networking and Applications Workshops : WAINA 2016 : 23-25 March 2016, Crans-Montana, Switzerland : proceedings
2016
/
p. 843-848 : ill
https://doi.org/10.1109/WAINA.2016.22
book article
18
journal article
Ideological networks and security in the two-speed world - Venia Legendi [Electronic resource]
Erne, Jaanika
SSRN working paper series
2013
/
[26] p
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2285465
journal article
19
book article
The impact of perceived security on intention to use E-learning among students
Farooq, Ali
;
Ahmad, Farhan
;
Khadam, Nyla
;
Lorenz, Birgy
;
Isoaho, Jouni
Proceedings IEEE 20th International Conference on Advanced Learning Technologies, ICALT 2020 : 6–9 July 2020, Online
2020
/
p. 360-364
https://doi.org/10.1109/ICALT49669.2020.00115
book article
20
book article
Improving the technical functionality of children's tracking watches
Jennings, Luke
;
Singh, Inderbir
;
Sorell, Matthew
;
Hovhannisyan, Kristine
Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018
2018
/
p. 57-59
https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
book article
21
book article
Latch-Based logic locking
Sweeney, J.
;
Mohammed Zackriya, V.
;
Pagliarini, Samuel Nascimento
;
Pileggi, Larry
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020
2020
/
p. 132−141 : ill
https://doi.org/10.1109/HOST45689.2020.9300256
book article
22
book article
Latest trends in hardware security and privacy
Di Natale, Giorgio
;
Regazzoni, Francesco
;
Albanese, Vincent
;
Lhermet, Frank
;
Loisel, Yann
;
Sensaoui, Abderrahmane
;
Pagliarini, Samuel Nascimento
33rd IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) : ESA-ESRIN, Italy (On-line Virtual Event),October 19–21, 2020
2020
/
4 p. : ill
https://doi.org/10.1109/DFT50435.2020.9250816
book article
23
journal article EST
/
journal article ENG
A lightweight anonymous authentication scheme for secure cloud computing services
Hammami, Hamza
;
Ben Yahia, Sadok
;
Obaidat, Mohammad S.
The Journal of Supercomputing
2021
/
p. 1693-1713
https://doi.org/10.1007/s11227-020-03313-y
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
24
journal article
Limited statehood and its security implications on the fragmentation political order in the Middle East and North Africa
Polese, Abel
;
Hanau Santini, Ruth
Small wars & insurgencies
2018
/
p. 379-390
https://www.tandfonline.com/doi/full/10.1080/09592318.2018.1456815#
journal article
25
journal article EST
/
journal article ENG
Machine learning meets communication networks : current trends and future challenges
Ahmad, Ijaz
;
Shahabuddin, Shariar
;
Malik, Hassan
;
Leppänen, Teemu
;
Loven, Lauri
;
Anttonen, Antti
;
Sodhro, Ali Hassan
;
Alam, Muhammad Mahtab
;
Juntti, Markku
;
Yla-Jääski, Antti
IEEE Access
2020
/
art. 9274307, p. 223418-223460
https://doi.org/10.1109/ACCESS.2020.3041765
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 45, displaying
1 - 25
previous
1
2
next
keyword
91
1.
ad-hoc sensor networks security
2.
Automatic Security Verification
3.
Blockchain security
4.
cache security
5.
communication system security
6.
comprehensive system of economic security
7.
computer security
8.
cooperative security dilemma
9.
cyber security
10.
cyber security education
11.
cyber security exercises
12.
cyber security strategies
13.
cyber-security
14.
data security
15.
development of security cameras
16.
drinking water security
17.
economic security
18.
economic security of enterprise
19.
emotional security
20.
energy security
21.
energy security indicator
22.
graded security
23.
hardware security
24.
hardware security primitive
25.
human security
26.
information security
27.
internal security
28.
international security
29.
investment and innovation security
30.
IPv6 security
31.
IT security
32.
IT security management
33.
job security
34.
long-term security
35.
metadata model for security measures
36.
Middle Eastern security
37.
Mobile security
38.
national cyber security strategy
39.
national security
40.
NATO. Science for Peace and Security Program
41.
network security
42.
network security monitoring
43.
OSCE (Organization for Security and Co-operation in Europe)
44.
passenger’s security
45.
policy-based routing security
46.
political and security cultures
47.
post-quantum security
48.
power system security
49.
quantitative security
50.
regional security
51.
RISC-V Security Verification
52.
security
53.
security and privacy
54.
security and privacy in smart grids
55.
Security Assertion Mining
56.
security closure
57.
Security Coverage
58.
security dataset
59.
security dilemma
60.
Security evaluation
61.
security log analysis
62.
security management
63.
security model
64.
security monitoring
65.
security notion
66.
security objectives
67.
security of data
68.
security of supply
69.
security operation center
70.
security patterns
71.
security problem definition
72.
security proof
73.
security protocols
74.
security requirements
75.
security requirements engineering
76.
security risk assessment
77.
security risk management
78.
security strategies
79.
security systems for military objects
80.
security testing
81.
security training
82.
security verification
83.
social security planning
84.
societal security
85.
system of economic security
86.
system security
87.
terrorism security
88.
transmission System Security
89.
voting privacy and security
90.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
91.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT