Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
information security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
5
Vaata veel..
(3/221)
Ekspordi
ekspordi kõik päringu tulemused
(5)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
artikkel kogumikus
2
artikkel kogumikus
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
artikkel kogumikus
3
artikkel kogumikus EST
/
artikkel kogumikus ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 5, kuvan
1 - 5
võtmesõna
218
1.
Estonian information security standard
2.
information security
3.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security strategies
16.
cyber-security
17.
data security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
internal security
30.
international security
31.
investment and innovation security
32.
IPv6 security
33.
IT security
34.
IT security management
35.
job security
36.
long-term security
37.
metadata model for security measures
38.
Middle Eastern security
39.
Mobile security
40.
national cyber security strategy
41.
national security
42.
NATO. Science for Peace and Security Program
43.
network security
44.
network security monitoring
45.
OSCE (Organization for Security and Co-operation in Europe)
46.
passenger’s security
47.
policy-based routing security
48.
political and security cultures
49.
post-quantum security
50.
power system security
51.
quantitative security
52.
regional security
53.
RISC-V Security Verification
54.
security
55.
security adaptation
56.
security analysis
57.
security and justice (AFSJ)
58.
security and privacy
59.
security and privacy in smart grids
60.
Security Assertion Mining
61.
security closure
62.
Security Coverage
63.
security dataset
64.
security dilemma
65.
Security evaluation
66.
security evaluation instruments
67.
security log analysis
68.
security management
69.
security model
70.
security monitoring
71.
security notion
72.
security objectives
73.
security of data
74.
security of supply
75.
security operation center
76.
security operations center
77.
security patterns
78.
security policy
79.
security problem definition
80.
security proof
81.
security protocols
82.
security requirements
83.
security requirements engineering
84.
security risk assessment
85.
security risk management
86.
security strategies
87.
security systems for military objects
88.
security testing
89.
security training
90.
security verification
91.
security-by-design
92.
social security planning
93.
societal security
94.
system of economic security
95.
system security
96.
terrorism security
97.
transmission System Security
98.
voting privacy and security
99.
access to information
100.
age of information
101.
banking information
102.
building information modelling
103.
building information modeling
104.
Building Information Modeling (BIM)
105.
building information modelling
106.
Building Information Modelling (BIM)
107.
Building Information Modelling (BIM) adoption
108.
business information technology
109.
city information modelling (CIM)
110.
communication channels (information theory)
111.
Community Statistics on Information Society (CSIS)
112.
court information system
113.
critical information infrastructure
114.
Data-information-knowledgewisdom (DIKW)
115.
discrete information bottle-neck
116.
dissemination of information
117.
enterprise information systems
118.
Estonian National Health Information System
119.
Estonian nationwide Health Information System (EHIS)
120.
evolutionary information systems
121.
financial information
122.
general theory of information transfer
123.
Geographic Information System (GIS)
124.
Geographic Information Systems (GIS)
125.
geographical information system
126.
health information exchange
127.
health information purpose
128.
health information sharing maturity
129.
health information systems
130.
Healthcare information systems
131.
high-performance computing systems, Information processing
132.
HL7 Version 3: Reference Information Model (RIM)
133.
ICT (information and communication technology)
134.
information
135.
information and communication technologies
136.
Information and communication technologies (ICT) digitalisation
137.
Information and Communication Technologies (ICT) laws
138.
Information and Communication Technologies (ICTs)
139.
Information and Communication Technologies for Development
140.
information and communication technology
141.
information and communication technology (ICT)
142.
information and communications technology
143.
information architecture
144.
information asymmetry
145.
information commons
146.
information communication technology
147.
information content
148.
information control
149.
information dissemination
150.
information economy
151.
information entropy
152.
information exchange
153.
information extraction
154.
information flow control
155.
information fusion
156.
information governance
157.
information integration
158.
information literacy
159.
information literacy cooperation
160.
information logistics
161.
information management
162.
information measures
163.
information model
164.
information model-based urban planning
165.
information polity
166.
information potential
167.
information processing
168.
information processing system
169.
information rate
170.
information realities
171.
information retrieval
172.
information revolution
173.
information seeking behaviour
174.
information sharing
175.
information society
176.
Information sufficiency
177.
information system
178.
Information System Authority (RIA)
179.
information systems
180.
information systems development
181.
Information Systems research
182.
information technologies
183.
Information technology
184.
information technology (IT)
185.
information theory
186.
information to individual consumers
187.
information tool
188.
information value
189.
information warfare
190.
information visualization
191.
Information-seeking activity
192.
intelligent information technology
193.
interoperability and evolutionary criteria of information systems
194.
laboratory information management system (LIMS)
195.
laboratory information management systems
196.
LIMS (laboratory information management systems)
197.
medical information
198.
Medical information policy
199.
middleware (for subscription and distribution of situational information)
200.
mobile information system
201.
multilingual information retrieval
202.
multimodal information
203.
open architecture for information exchange
204.
perception of visual information
205.
performance information
206.
performance information use
207.
philosophy of information
208.
process modeling and information systems within the extended enterprise
209.
quality evaluation of scientific information
210.
real time information
211.
real-time information
212.
Reaxys Chemistry database information
213.
scientific information
214.
SIS II (Schengen Information System II)
215.
traffic information system (TIS)
216.
tree information database
217.
website information
218.
VIS (Visa Information System)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ märksõna
1
1.
Building Information Modeling
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT