Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
sufficient level of security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/273)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Method for determining the security level of software
Hovorushchenko, Tetiana
;
Voichur, Yurii
;
Medzatyi, Dmytro
;
Boyarchuk, Artem
;
Hnatchuk, Alina
IntelITSIS 2024 : 5th International Workshop on Intelligent Information Technologies and Systems of Information Security, March 28, 2024 : proceedings
2024
/
p. 72-85 : ill
https://ceur-ws.org/Vol-3675/
Article at Scopus
book article
Number of records 1, displaying
1 - 1
keyword
271
1.
sufficient level of security
2.
high level of security
3.
initial level of security
4.
medium level of security
5.
Security Level Evaluation
6.
software security level
7.
Sufficient conditions
8.
sufficient solvability conditions
9.
logic level and high level BDDs
10.
ad-hoc sensor networks security
11.
Automatic Security Verification
12.
Blockchain security
13.
cache security
14.
cloud security
15.
communication system security
16.
comprehensive system of economic security
17.
computer security
18.
cooperative security dilemma
19.
cyber security
20.
cyber security education
21.
cyber security exercises
22.
cyber security monitoring
23.
cyber security monitoring in maritime
24.
cyber security strategies
25.
cyber-physical system security
26.
cyber-security
27.
data and information security
28.
data security
29.
development of security cameras
30.
digital security practices
31.
drinking water security
32.
economic security
33.
economic security of enterprise
34.
emotional security
35.
energy security
36.
energy security indicator
37.
Estonian information security standard
38.
graded security
39.
hardware security
40.
hardware security primitive
41.
Homeland security
42.
human security
43.
information security
44.
information security and privacy
45.
internal security
46.
international security
47.
investment and innovation security
48.
IPv6 security
49.
IT security
50.
IT security management
51.
job security
52.
long-term security
53.
maritime cyber security
54.
maritime cyber security operations centers
55.
Maritime Security Operations Center (M-SOC)
56.
metadata model for security measures
57.
Middle Eastern security
58.
Mobile security
59.
national cyber security strategy
60.
national security
61.
NATO. Science for Peace and Security Program
62.
network security
63.
network security monitoring
64.
OSCE (Organization for Security and Co-operation in Europe)
65.
passenger’s security
66.
policy-based routing security
67.
political and security cultures
68.
post-quantum security
69.
power system security
70.
quantitative security
71.
regional security
72.
RISC-V Security Verification
73.
Safety and Security in Sea Transportation
74.
safety and security testing
75.
security
76.
security adaptation
77.
security alert prioritization
78.
security analysis
79.
security and justice (AFSJ)
80.
Security and political science
81.
security and privacy
82.
security and privacy in smart grids
83.
Security Assertion
84.
Security Assertion Mining
85.
security closure
86.
Security Coverage
87.
security dataset
88.
security dilemma
89.
Security evaluation
90.
security evaluation instruments
91.
Security limitations
92.
security log analysis
93.
security management
94.
security model
95.
security monitoring
96.
security notion
97.
security objectives
98.
security of data
99.
security of supply
100.
security operation center
101.
security operations center
102.
security patterns
103.
security policy
104.
security problem definition
105.
security proof
106.
security protocols
107.
security requirements
108.
security requirements engineering
109.
security research
110.
security risk assessment
111.
security risk management
112.
security risks
113.
security science and technology
114.
security strategies
115.
security systems for military objects
116.
security testing
117.
security training
118.
security verification
119.
security-by-design
120.
social security planning
121.
societal security
122.
software security
123.
software security subcharacteristics
124.
system of economic security
125.
system security
126.
terrorism security
127.
transmission System Security
128.
voting privacy and security
129.
absolute sea level
130.
airport level of service
131.
arousal level
132.
assurance level
133.
behaviour level test generation
134.
bi-level optimization
135.
CO2 level in classrooms
136.
CO2 level in classrooms and kindergartens
137.
confidence level
138.
country-level logistics
139.
Cross-level Modeling of Faults in Digital Systems
140.
customer compatibility level
141.
deep level
142.
deep level traps
143.
determination of the CO2 level
144.
determining the level of creatine
145.
digitalisation level
146.
distribution-level phasor measurement units (D-PMUs)
147.
education level
148.
exposure level
149.
extreme penetration level of non synchronous generation
150.
extreme sea-level prediction
151.
extreme water level
152.
gate-level analysis
153.
gate-level circuit abstraction
154.
gate-level netlist
155.
graduate level
156.
Hierarchical Multi-level Test Generation
157.
hierarchical two-level analysis
158.
high level DD (HLDD)
159.
high level synthesis
160.
high-level control fault model
161.
high-level control faults
162.
high-level decision diagram
163.
high-level decision diagrams
164.
high-level decision diagrams (HLDD) synthesis
165.
High-level Decision Diagrams for Modeling Digital Systems
166.
high-level expert group on AI
167.
high-level fault coverage
168.
high-level fault model
169.
high-level fault simulation
170.
high-level functional fault model
171.
high-level synthesis
172.
High-Level Synthesis (HLS)
173.
high-level synthesis for test
174.
high-level test data generation
175.
improvement of safety level at enterprises
176.
improvement of safety level at SMEs
177.
lake level
178.
level control
179.
level crossing
180.
level ice
181.
Level of paranoia
182.
level set
183.
level(s) methodology
184.
level-crossing ADC
185.
level-crossing analog-to-digital converters
186.
level-crossing analogue-to-digital converters (ADC)
187.
logic level
188.
lower trophic level models
189.
low-level control system transportation
190.
low-level fault redundancy
191.
low-level radiation
192.
Low-level RF EMF
193.
macro-level industry influences
194.
mean sea level
195.
module level power electronics (MLPE)
196.
module-level power electronics (MLPE)
197.
multi-level governance
198.
multi-level inverter
199.
multi-level leadership
200.
multi-level modeling
201.
multi-level perspective
202.
multi-level perspective of sustainability transitions
203.
multi-level selection and processing environment
204.
noise level
205.
operational level (OL)
206.
Price level
207.
Process/Product Sigma Performance Level (PSPL)
208.
PV module level power electronics
209.
register transfer and gate level simulation
210.
Register Transfer Level - RTL
211.
register transfer level modeling decision diagams
212.
register-transfer level
213.
Register-Transfer Level (RTL)
214.
relative sea level
215.
relative sea level changes
216.
relative sea-level change
217.
RH level
218.
school-level policies
219.
sea level
220.
sea level forecasting
221.
sea level prediction
222.
sea level rise
223.
sea level series
224.
sea level trend
225.
sea level: variations and mean
226.
sea-level
227.
sea-level changes
228.
sea-level equation
229.
Sea-level indicator
230.
sea-level prediction
231.
sea-level rise
232.
sea-level trend
233.
service-level agreements
234.
seven-level multilevel
235.
Sigma performance level
236.
skin conductance level
237.
software level TMR
238.
steel-level bureaucracy
239.
strategic level decision makers
240.
system level
241.
system level hazards
242.
system level simulation
243.
system level test
244.
system planning level
245.
system-level analysis
246.
system-level evaluation
247.
task-level uninterrupted presence
248.
three-level
249.
three-level converter
250.
three-level inverter
251.
three-level neutral-point-clamped inverter
252.
three-level NPC inverter
253.
three-level T-type
254.
three-level T-type inverter
255.
three-level T-type quasi-impedance-source inverter (3L-T-type qZSI)
256.
three-level voltage inverter
257.
Tool Confidence Level
258.
top-level domain
259.
transaction-level modeling
260.
treatment level
261.
two-level inverter
262.
undergraduate level
263.
university level informatics education
264.
water level
265.
water level fluctuation
266.
water level measurements
267.
water level reconstruction
268.
water-level changes
269.
voltage level
270.
voltage level optimisation
271.
3-level T-type inverter
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT