Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
initial level of security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/276)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Method for determining the security level of software
Hovorushchenko, Tetiana
;
Voichur, Yurii
;
Medzatyi, Dmytro
;
Boyarchuk, Artem
;
Hnatchuk, Alina
IntelITSIS 2024 : 5th International Workshop on Intelligent Information Technologies and Systems of Information Security, March 28, 2024 : proceedings
2024
/
p. 72-85 : ill
https://ceur-ws.org/Vol-3675/
Article at Scopus
book article
Number of records 1, displaying
1 - 1
keyword
274
1.
initial level of security
2.
high level of security
3.
medium level of security
4.
software security level
5.
sufficient level of security
6.
logic level and high level BDDs
7.
initial commitment
8.
initial conditions
9.
initial data
10.
initial data for AI
11.
initial data model
12.
initial moisture content
13.
initial planning or design stage
14.
initial settings
15.
initial solution to the linear programming problem
16.
Initial state
17.
method of initial parameters
18.
method of initial parameters in differential form
19.
ad-hoc sensor networks security
20.
Automatic Security Verification
21.
Blockchain security
22.
cache security
23.
communication system security
24.
comprehensive system of economic security
25.
computer security
26.
cooperative security dilemma
27.
cyber security
28.
cyber security education
29.
cyber security exercises
30.
cyber security monitoring
31.
cyber security strategies
32.
cyber-security
33.
data and information security
34.
data security
35.
development of security cameras
36.
digital security practices
37.
drinking water security
38.
economic security
39.
economic security of enterprise
40.
emotional security
41.
energy security
42.
energy security indicator
43.
Estonian information security standard
44.
graded security
45.
hardware security
46.
hardware security primitive
47.
Homeland security
48.
human security
49.
information security
50.
information security and privacy
51.
internal security
52.
international security
53.
investment and innovation security
54.
IPv6 security
55.
IT security
56.
IT security management
57.
job security
58.
long-term security
59.
maritime cyber security
60.
maritime cyber security operations centers
61.
Maritime Security Operations Center (M-SOC)
62.
metadata model for security measures
63.
Middle Eastern security
64.
Mobile security
65.
national cyber security strategy
66.
national security
67.
NATO. Science for Peace and Security Program
68.
network security
69.
network security monitoring
70.
OSCE (Organization for Security and Co-operation in Europe)
71.
passenger’s security
72.
policy-based routing security
73.
political and security cultures
74.
post-quantum security
75.
power system security
76.
quantitative security
77.
regional security
78.
RISC-V Security Verification
79.
Safety and Security in Sea Transportation
80.
safety and security testing
81.
security
82.
security adaptation
83.
security alert prioritization
84.
security analysis
85.
security and justice (AFSJ)
86.
Security and political science
87.
security and privacy
88.
security and privacy in smart grids
89.
Security Assertion Mining
90.
security closure
91.
Security Coverage
92.
security dataset
93.
security dilemma
94.
Security evaluation
95.
security evaluation instruments
96.
Security limitations
97.
security log analysis
98.
security management
99.
security model
100.
security monitoring
101.
security notion
102.
security objectives
103.
security of data
104.
security of supply
105.
security operation center
106.
security operations center
107.
security patterns
108.
security policy
109.
security problem definition
110.
security proof
111.
security protocols
112.
security requirements
113.
security requirements engineering
114.
security risk assessment
115.
security risk management
116.
security risks
117.
security science and technology
118.
security strategies
119.
security systems for military objects
120.
security testing
121.
security training
122.
security verification
123.
security-by-design
124.
social security planning
125.
societal security
126.
software security
127.
software security subcharacteristics
128.
system of economic security
129.
system security
130.
terrorism security
131.
transmission System Security
132.
voting privacy and security
133.
absolute sea level
134.
airport level of service
135.
arousal level
136.
assurance level
137.
behaviour level test generation
138.
bi-level optimization
139.
CO2 level in classrooms
140.
CO2 level in classrooms and kindergartens
141.
confidence level
142.
country-level logistics
143.
Cross-level Modeling of Faults in Digital Systems
144.
customer compatibility level
145.
deep level
146.
deep level traps
147.
determination of the CO2 level
148.
determining the level of creatine
149.
digitalisation level
150.
distribution-level phasor measurement units (D-PMUs)
151.
education level
152.
exposure level
153.
extreme penetration level of non synchronous generation
154.
extreme sea-level prediction
155.
extreme water level
156.
gate-level analysis
157.
gate-level circuit abstraction
158.
gate-level netlist
159.
graduate level
160.
Hierarchical Multi-level Test Generation
161.
hierarchical two-level analysis
162.
high level DD (HLDD)
163.
high level synthesis
164.
high-level control fault model
165.
high-level control faults
166.
high-level decision diagram
167.
high-level decision diagrams
168.
high-level decision diagrams (HLDD) synthesis
169.
High-level Decision Diagrams for Modeling Digital Systems
170.
high-level expert group on AI
171.
high-level fault coverage
172.
high-level fault model
173.
high-level fault simulation
174.
high-level functional fault model
175.
high-level synthesis
176.
High-Level Synthesis (HLS)
177.
high-level synthesis for test
178.
high-level test data generation
179.
improvement of safety level at enterprises
180.
improvement of safety level at SMEs
181.
lake level
182.
level control
183.
level crossing
184.
level ice
185.
Level of paranoia
186.
level set
187.
level(s) methodology
188.
level-crossing ADC
189.
level-crossing analog-to-digital converters
190.
level-crossing analogue-to-digital converters (ADC)
191.
logic level
192.
lower trophic level models
193.
low-level control system transportation
194.
low-level fault redundancy
195.
low-level radiation
196.
Low-level RF EMF
197.
macro-level industry influences
198.
mean sea level
199.
module level power electronics (MLPE)
200.
module-level power electronics (MLPE)
201.
multi-level governance
202.
multi-level inverter
203.
multi-level leadership
204.
multi-level modeling
205.
multi-level perspective
206.
multi-level perspective of sustainability transitions
207.
multi-level selection and processing environment
208.
noise level
209.
operational level (OL)
210.
Price level
211.
Process/Product Sigma Performance Level (PSPL)
212.
PV module level power electronics
213.
register transfer and gate level simulation
214.
Register Transfer Level - RTL
215.
register transfer level modeling decision diagams
216.
register-transfer level
217.
relative sea level
218.
relative sea level changes
219.
relative sea-level change
220.
RH level
221.
school-level policies
222.
sea level
223.
sea level forecasting
224.
sea level prediction
225.
sea level rise
226.
sea level series
227.
sea level trend
228.
sea level: variations and mean
229.
sea-level
230.
sea-level changes
231.
sea-level equation
232.
Sea-level indicator
233.
sea-level prediction
234.
sea-level rise
235.
sea-level trend
236.
service-level agreements
237.
seven-level multilevel
238.
Sigma performance level
239.
skin conductance level
240.
software level TMR
241.
steel-level bureaucracy
242.
strategic level decision makers
243.
system level
244.
system level hazards
245.
system level simulation
246.
system level test
247.
system planning level
248.
system-level analysis
249.
system-level evaluation
250.
task-level uninterrupted presence
251.
three-level
252.
three-level converter
253.
three-level inverter
254.
three-level neutral-point-clamped inverter
255.
three-level NPC inverter
256.
three-level T-type
257.
three-level T-type inverter
258.
three-level T-type quasi-impedance-source inverter (3L-T-type qZSI)
259.
three-level voltage inverter
260.
Tool Confidence Level
261.
top-level domain
262.
transaction-level modeling
263.
treatment level
264.
two-level inverter
265.
undergraduate level
266.
university level informatics education
267.
water level
268.
water level fluctuation
269.
water level measurements
270.
water level reconstruction
271.
water-level changes
272.
voltage level
273.
voltage level optimisation
274.
3-level T-type inverter
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT