Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security evaluation instruments (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/217)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Create your own MUSE : a method for updating security level evaluation instruments
Seeba, Mari
;
Affia, Abasi-amefon Obot
;
Mäses, Sten
;
Matulevičius, Raimundas
Computer Standards and Interface
2024
/
art. 103776
https://doi.org/10.1016/j.csi.2023.103776
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
214
1.
security evaluation instruments
2.
Security evaluation
3.
coordination instruments
4.
debt instruments
5.
decision support instruments
6.
embedded instruments
7.
financial instruments
8.
innovative financial instruments
9.
instruments
10.
interchangeable virtual instruments
11.
musical instruments
12.
optics/refraction/instruments
13.
organizational learning measurement instruments
14.
policy instruments
15.
spread and development of new policy instruments (environmental taxes and charges system)
16.
string instruments
17.
types of measuring instruments
18.
ad-hoc sensor networks security
19.
Automatic Security Verification
20.
Blockchain security
21.
cache security
22.
communication system security
23.
comprehensive system of economic security
24.
computer security
25.
cooperative security dilemma
26.
cyber security
27.
cyber security education
28.
cyber security exercises
29.
cyber security monitoring
30.
cyber security strategies
31.
cyber-security
32.
data and information security
33.
data security
34.
development of security cameras
35.
digital security practices
36.
drinking water security
37.
economic security
38.
economic security of enterprise
39.
emotional security
40.
energy security
41.
energy security indicator
42.
Estonian information security standard
43.
graded security
44.
hardware security
45.
hardware security primitive
46.
high level of security
47.
Homeland security
48.
human security
49.
information security
50.
information security and privacy
51.
initial level of security
52.
internal security
53.
international security
54.
investment and innovation security
55.
IPv6 security
56.
IT security
57.
IT security management
58.
job security
59.
long-term security
60.
maritime cyber security
61.
maritime cyber security operations centers
62.
Maritime Security Operations Center (M-SOC)
63.
medium level of security
64.
metadata model for security measures
65.
Middle Eastern security
66.
Mobile security
67.
national cyber security strategy
68.
national security
69.
NATO. Science for Peace and Security Program
70.
network security
71.
network security monitoring
72.
OSCE (Organization for Security and Co-operation in Europe)
73.
passenger’s security
74.
policy-based routing security
75.
political and security cultures
76.
post-quantum security
77.
power system security
78.
quantitative security
79.
regional security
80.
RISC-V Security Verification
81.
Safety and Security in Sea Transportation
82.
safety and security testing
83.
security
84.
security adaptation
85.
security alert prioritization
86.
security analysis
87.
security and justice (AFSJ)
88.
Security and political science
89.
security and privacy
90.
security and privacy in smart grids
91.
Security Assertion Mining
92.
security closure
93.
Security Coverage
94.
security dataset
95.
security dilemma
96.
Security limitations
97.
security log analysis
98.
security management
99.
security model
100.
security monitoring
101.
security notion
102.
security objectives
103.
security of data
104.
security of supply
105.
security operation center
106.
security operations center
107.
security patterns
108.
security policy
109.
security problem definition
110.
security proof
111.
security protocols
112.
security requirements
113.
security requirements engineering
114.
security research
115.
security risk assessment
116.
security risk management
117.
security risks
118.
security science and technology
119.
security strategies
120.
security systems for military objects
121.
security testing
122.
security training
123.
security verification
124.
security-by-design
125.
social security planning
126.
societal security
127.
software security
128.
software security level
129.
software security subcharacteristics
130.
sufficient level of security
131.
system of economic security
132.
system security
133.
terrorism security
134.
transmission System Security
135.
voting privacy and security
136.
accuracy evaluation
137.
answer evaluation
138.
Automated Bonding Evaluation System
139.
automatic evaluation
140.
binding evaluation
141.
clinical evaluation
142.
cohesion policy evaluation
143.
comprehensive evaluation
144.
compression method evaluation
145.
critical evaluation
146.
decision-making trial and evaluation laboratory
147.
descriptive sensory evaluation
148.
design evaluation
149.
empirical evaluation
150.
Energy-based evaluation
151.
enhanced economy evaluation
152.
environmental evaluation
153.
environmental hazard evaluation
154.
ethical evaluation
155.
evaluation
156.
evaluation framework
157.
evaluation metrics
158.
evaluation of companies
159.
Evaluation of Explainability
160.
evaluation of explainable AI intrusion detection
161.
evaluation of the results of environmental innovations
162.
experimental evaluation
163.
feasibility evaluation
164.
financial evaluation
165.
function evaluation
166.
hazard evaluation
167.
Integrated hedonic-utilitarian evaluation
168.
investment effectiveness evaluation
169.
investment evaluation
170.
investments profitability evaluation
171.
life cycle evaluation
172.
meta-evaluation
173.
microstructure evaluation
174.
model evaluation
175.
multi-criteria evaluation
176.
non destructive evaluation
177.
non-destructive evaluation
178.
numerical evaluation of the order of convergence
179.
Organizational performance evaluation
180.
parameter evaluation
181.
performance evaluation
182.
performance evaluation and comparison
183.
petroleum reservoir evaluation
184.
Platform Evaluation
185.
point of evaluation
186.
policy evaluation
187.
process evaluation
188.
production performance evaluation system
189.
qualitative evaluation
190.
quality evaluation of scientific information
191.
reliability evaluation
192.
RIS3 evaluation and monitoring
193.
risk evaluation model
194.
risk evaluation model development
195.
self-evaluation
196.
sensory evaluation
197.
shelter design evaluation
198.
Software engineering methodology evaluation
199.
source rock evaluation
200.
student evaluation
201.
students' evaluation and feedback
202.
system evaluation
203.
system-level evaluation
204.
tender evaluation model
205.
test and evaluation platform
206.
total evaluation of complexity
207.
total evaluation of performance
208.
trajectory evaluation
209.
ultrasonic nondestructive evaluation
210.
urban environmental evaluation
211.
user evaluation
212.
web usability evaluation
213.
visualization design and evaluation methods
214.
“Evaluation-hesitance”
subject term
3
1.
Laser Diagnostic Instruments
2.
National Computer Security Incident Response Teams (N-CSIRTs)
3.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT