Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security risks (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/143)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Preventing data-security breaches and patient-safety risks in cross-blockchain e-healthcare systems
Kormiltsõn, Aleksandr
;
Norta, Alex
;
Nisar, Sanam
;
Dwivedi, Vimal
Management of Digital EcoSystems : 15th International Conference, MEDES 2023, Heraklion, Crete, Greece, May 5–7, 2023, Revised Selected Papers
2024
/
p. 41-54
https://doi.org/10.1007/978-3-031-51643-6_4
Conference proceedings at scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
141
1.
security risks
2.
risks knowledge risks
3.
cyber-risks
4.
digitalization risks
5.
environmental risks
6.
ESG risks
7.
geopolitical risks
8.
health risks
9.
identifying risks
10.
knowledge risks
11.
knowledge risks in health-care organizations
12.
market risks
13.
Occupational health risks
14.
off-balance-sheet risks
15.
operational risks
16.
perceived cyber risks and threats
17.
ranked risks
18.
risks
19.
socio-economic risks
20.
systemic risks
21.
Transition risks
22.
uncertain risks
23.
ad-hoc sensor networks security
24.
Automatic Security Verification
25.
Blockchain security
26.
cache security
27.
communication system security
28.
comprehensive system of economic security
29.
computer security
30.
cooperative security dilemma
31.
cyber security
32.
cyber security education
33.
cyber security exercises
34.
cyber security monitoring
35.
cyber security strategies
36.
cyber-security
37.
data and information security
38.
data security
39.
development of security cameras
40.
digital security practices
41.
drinking water security
42.
economic security
43.
economic security of enterprise
44.
emotional security
45.
energy security
46.
energy security indicator
47.
Estonian information security standard
48.
graded security
49.
hardware security
50.
hardware security primitive
51.
high level of security
52.
Homeland security
53.
human security
54.
information security
55.
information security and privacy
56.
initial level of security
57.
internal security
58.
international security
59.
investment and innovation security
60.
IPv6 security
61.
IT security
62.
IT security management
63.
job security
64.
long-term security
65.
maritime cyber security
66.
maritime cyber security operations centers
67.
Maritime Security Operations Center (M-SOC)
68.
medium level of security
69.
metadata model for security measures
70.
Middle Eastern security
71.
Mobile security
72.
national cyber security strategy
73.
national security
74.
NATO. Science for Peace and Security Program
75.
network security
76.
network security monitoring
77.
OSCE (Organization for Security and Co-operation in Europe)
78.
passenger’s security
79.
policy-based routing security
80.
political and security cultures
81.
post-quantum security
82.
power system security
83.
quantitative security
84.
regional security
85.
RISC-V Security Verification
86.
Safety and Security in Sea Transportation
87.
safety and security testing
88.
security
89.
security adaptation
90.
security alert prioritization
91.
security analysis
92.
security and justice (AFSJ)
93.
Security and political science
94.
security and privacy
95.
security and privacy in smart grids
96.
Security Assertion Mining
97.
security closure
98.
Security Coverage
99.
security dataset
100.
security dilemma
101.
Security evaluation
102.
security evaluation instruments
103.
Security limitations
104.
security log analysis
105.
security management
106.
security model
107.
security monitoring
108.
security notion
109.
security objectives
110.
security of data
111.
security of supply
112.
security operation center
113.
security operations center
114.
security patterns
115.
security policy
116.
security problem definition
117.
security proof
118.
security protocols
119.
security requirements
120.
security requirements engineering
121.
security research
122.
security risk assessment
123.
security risk management
124.
security science and technology
125.
security strategies
126.
security systems for military objects
127.
security testing
128.
security training
129.
security verification
130.
security-by-design
131.
social security planning
132.
societal security
133.
software security
134.
software security level
135.
software security subcharacteristics
136.
sufficient level of security
137.
system of economic security
138.
system security
139.
terrorism security
140.
transmission System Security
141.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT