Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
medium level of security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/299)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Method for determining the security level of software
Hovorushchenko, Tetiana
;
Voichur, Yurii
;
Medzatyi, Dmytro
;
Boyarchuk, Artem
;
Hnatchuk, Alina
IntelITSIS 2024 : 5th International Workshop on Intelligent Information Technologies and Systems of Information Security, March 28, 2024 : proceedings
2024
/
p. 72-85 : ill
https://ceur-ws.org/Vol-3675/
Article at Scopus
book article
Number of records 1, displaying
1 - 1
keyword
297
1.
medium level of security
2.
high level of security
3.
initial level of security
4.
software security level
5.
sufficient level of security
6.
logic level and high level BDDs
7.
ceramic filter medium
8.
defined medium
9.
defined rich medium
10.
dual-phase medium-entropy alloy
11.
effective medium
12.
implementation of IFRS for small and medium-sized entities (SMEs)
13.
inhomogeneous medium
14.
medium access control
15.
medium access control (MAC)
16.
medium alkalinity
17.
medium density fibreboard (MDF) cracking
18.
medium optimization
19.
medium with damages
20.
medium with microstructure
21.
medium voltage
22.
medium voltage insulator
23.
medium voltage overhead lines
24.
medium voltage power cables
25.
microstructured medium
26.
safety activities at small and medium-sized enterprises
27.
safety in small and medium-sized enterprises
28.
small and medium enterprises
29.
small and medium enterprises (SME)
30.
small and medium sized enterprises (SMEs)
31.
small and medium-sized enterprise
32.
small and medium-sized enterprise (sme)
33.
small and medium-sized enterprises
34.
small- and medium-sized enterprises
35.
small and medium-sized enterprises (SME)
36.
Small and Medium-sized Enterprises (SMEs)
37.
small and medium-sized ports
38.
small and medium-sized seaports
39.
Small to medium-sized enterprises
40.
SMEs (small and medium size companies)
41.
two-phase medium
42.
ad-hoc sensor networks security
43.
Automatic Security Verification
44.
Blockchain security
45.
cache security
46.
communication system security
47.
comprehensive system of economic security
48.
computer security
49.
cooperative security dilemma
50.
cyber security
51.
cyber security education
52.
cyber security exercises
53.
cyber security monitoring
54.
cyber security strategies
55.
cyber-security
56.
data and information security
57.
data security
58.
development of security cameras
59.
digital security practices
60.
drinking water security
61.
economic security
62.
economic security of enterprise
63.
emotional security
64.
energy security
65.
energy security indicator
66.
Estonian information security standard
67.
graded security
68.
hardware security
69.
hardware security primitive
70.
Homeland security
71.
human security
72.
information security
73.
information security and privacy
74.
internal security
75.
international security
76.
investment and innovation security
77.
IPv6 security
78.
IT security
79.
IT security management
80.
job security
81.
long-term security
82.
maritime cyber security
83.
maritime cyber security operations centers
84.
Maritime Security Operations Center (M-SOC)
85.
metadata model for security measures
86.
Middle Eastern security
87.
Mobile security
88.
national cyber security strategy
89.
national security
90.
NATO. Science for Peace and Security Program
91.
network security
92.
network security monitoring
93.
OSCE (Organization for Security and Co-operation in Europe)
94.
passenger’s security
95.
policy-based routing security
96.
political and security cultures
97.
post-quantum security
98.
power system security
99.
quantitative security
100.
regional security
101.
RISC-V Security Verification
102.
Safety and Security in Sea Transportation
103.
safety and security testing
104.
security
105.
security adaptation
106.
security alert prioritization
107.
security analysis
108.
security and justice (AFSJ)
109.
Security and political science
110.
security and privacy
111.
security and privacy in smart grids
112.
Security Assertion Mining
113.
security closure
114.
Security Coverage
115.
security dataset
116.
security dilemma
117.
Security evaluation
118.
security evaluation instruments
119.
Security limitations
120.
security log analysis
121.
security management
122.
security model
123.
security monitoring
124.
security notion
125.
security objectives
126.
security of data
127.
security of supply
128.
security operation center
129.
security operations center
130.
security patterns
131.
security policy
132.
security problem definition
133.
security proof
134.
security protocols
135.
security requirements
136.
security requirements engineering
137.
security risk assessment
138.
security risk management
139.
security risks
140.
security science and technology
141.
security strategies
142.
security systems for military objects
143.
security testing
144.
security training
145.
security verification
146.
security-by-design
147.
social security planning
148.
societal security
149.
software security
150.
software security subcharacteristics
151.
system of economic security
152.
system security
153.
terrorism security
154.
transmission System Security
155.
voting privacy and security
156.
absolute sea level
157.
airport level of service
158.
arousal level
159.
assurance level
160.
behaviour level test generation
161.
bi-level optimization
162.
CO2 level in classrooms
163.
CO2 level in classrooms and kindergartens
164.
confidence level
165.
country-level logistics
166.
Cross-level Modeling of Faults in Digital Systems
167.
customer compatibility level
168.
deep level
169.
deep level traps
170.
determination of the CO2 level
171.
determining the level of creatine
172.
digitalisation level
173.
distribution-level phasor measurement units (D-PMUs)
174.
education level
175.
exposure level
176.
extreme penetration level of non synchronous generation
177.
extreme sea-level prediction
178.
extreme water level
179.
gate-level analysis
180.
gate-level circuit abstraction
181.
gate-level netlist
182.
graduate level
183.
Hierarchical Multi-level Test Generation
184.
hierarchical two-level analysis
185.
high level DD (HLDD)
186.
high level synthesis
187.
high-level control fault model
188.
high-level control faults
189.
high-level decision diagram
190.
high-level decision diagrams
191.
high-level decision diagrams (HLDD) synthesis
192.
High-level Decision Diagrams for Modeling Digital Systems
193.
high-level expert group on AI
194.
high-level fault coverage
195.
high-level fault model
196.
high-level fault simulation
197.
high-level functional fault model
198.
high-level synthesis
199.
High-Level Synthesis (HLS)
200.
high-level synthesis for test
201.
high-level test data generation
202.
improvement of safety level at enterprises
203.
improvement of safety level at SMEs
204.
lake level
205.
level control
206.
level crossing
207.
level ice
208.
Level of paranoia
209.
level set
210.
level(s) methodology
211.
level-crossing ADC
212.
level-crossing analog-to-digital converters
213.
level-crossing analogue-to-digital converters (ADC)
214.
logic level
215.
lower trophic level models
216.
low-level control system transportation
217.
low-level fault redundancy
218.
low-level radiation
219.
Low-level RF EMF
220.
macro-level industry influences
221.
mean sea level
222.
module level power electronics (MLPE)
223.
module-level power electronics (MLPE)
224.
multi-level governance
225.
multi-level inverter
226.
multi-level leadership
227.
multi-level modeling
228.
multi-level perspective
229.
multi-level perspective of sustainability transitions
230.
multi-level selection and processing environment
231.
noise level
232.
operational level (OL)
233.
Price level
234.
Process/Product Sigma Performance Level (PSPL)
235.
PV module level power electronics
236.
register transfer and gate level simulation
237.
Register Transfer Level - RTL
238.
register transfer level modeling decision diagams
239.
register-transfer level
240.
relative sea level
241.
relative sea level changes
242.
relative sea-level change
243.
RH level
244.
school-level policies
245.
sea level
246.
sea level forecasting
247.
sea level prediction
248.
sea level rise
249.
sea level series
250.
sea level trend
251.
sea level: variations and mean
252.
sea-level
253.
sea-level changes
254.
sea-level equation
255.
Sea-level indicator
256.
sea-level prediction
257.
sea-level rise
258.
sea-level trend
259.
service-level agreements
260.
seven-level multilevel
261.
Sigma performance level
262.
skin conductance level
263.
software level TMR
264.
steel-level bureaucracy
265.
strategic level decision makers
266.
system level
267.
system level hazards
268.
system level simulation
269.
system level test
270.
system planning level
271.
system-level analysis
272.
system-level evaluation
273.
task-level uninterrupted presence
274.
three-level
275.
three-level converter
276.
three-level inverter
277.
three-level neutral-point-clamped inverter
278.
three-level NPC inverter
279.
three-level T-type
280.
three-level T-type inverter
281.
three-level T-type quasi-impedance-source inverter (3L-T-type qZSI)
282.
three-level voltage inverter
283.
Tool Confidence Level
284.
top-level domain
285.
transaction-level modeling
286.
treatment level
287.
two-level inverter
288.
undergraduate level
289.
university level informatics education
290.
water level
291.
water level fluctuation
292.
water level measurements
293.
water level reconstruction
294.
water-level changes
295.
voltage level
296.
voltage level optimisation
297.
3-level T-type inverter
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT