Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
information security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
6
Vaata veel..
(3/258)
Ekspordi
ekspordi kõik päringu tulemused
(6)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Artificial intelligence approach to identifying propaganda techniques and objects, taking into account ethical and legal aspects
Molchanova, Maryna
;
Dutt, Pawan Kumar
Computer Systems and Information Technologies
2025
/
p. 97-103
https://doi.org/10.31891/csit-2025-2-11
https://csitjournal.khmnu.edu.ua/index.php/csit/article/view/423
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
2
artikkel kogumikus
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
artikkel kogumikus
3
artikkel kogumikus
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
artikkel kogumikus
4
artikkel kogumikus EST
/
artikkel kogumikus ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
6
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 6, kuvan
1 - 6
võtmesõna
255
1.
data and information security
2.
Estonian information security standard
3.
information security
4.
information security and privacy
5.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
cloud security
11.
communication system security
12.
comprehensive system of economic security
13.
computer security
14.
cooperative security dilemma
15.
cyber security
16.
cyber security education
17.
cyber security exercises
18.
cyber security monitoring
19.
cyber security strategies
20.
cyber-physical system security
21.
cyber-security
22.
data security
23.
development of security cameras
24.
digital security practices
25.
drinking water security
26.
economic security
27.
economic security of enterprise
28.
emotional security
29.
energy security
30.
energy security indicator
31.
graded security
32.
hardware security
33.
hardware security primitive
34.
high level of security
35.
Homeland security
36.
human security
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
maritime cyber security
47.
maritime cyber security operations centers
48.
Maritime Security Operations Center (M-SOC)
49.
medium level of security
50.
metadata model for security measures
51.
Middle Eastern security
52.
Mobile security
53.
national cyber security strategy
54.
national security
55.
NATO. Science for Peace and Security Program
56.
network security
57.
network security monitoring
58.
OSCE (Organization for Security and Co-operation in Europe)
59.
passenger’s security
60.
policy-based routing security
61.
political and security cultures
62.
post-quantum security
63.
power system security
64.
quantitative security
65.
regional security
66.
RISC-V Security Verification
67.
Safety and Security in Sea Transportation
68.
safety and security testing
69.
security
70.
security adaptation
71.
security alert prioritization
72.
security analysis
73.
security and justice (AFSJ)
74.
Security and political science
75.
security and privacy
76.
security and privacy in smart grids
77.
Security Assertion
78.
Security Assertion Mining
79.
security closure
80.
Security Coverage
81.
security dataset
82.
security dilemma
83.
Security evaluation
84.
security evaluation instruments
85.
Security Level Evaluation
86.
Security limitations
87.
security log analysis
88.
security management
89.
security model
90.
security monitoring
91.
security notion
92.
security objectives
93.
security of data
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security research
105.
security risk assessment
106.
security risk management
107.
security risks
108.
security science and technology
109.
security strategies
110.
security systems for military objects
111.
security testing
112.
security training
113.
security verification
114.
security-by-design
115.
social security planning
116.
societal security
117.
software security
118.
software security level
119.
software security subcharacteristics
120.
sufficient level of security
121.
system of economic security
122.
system security
123.
terrorism security
124.
transmission System Security
125.
voting privacy and security
126.
access to information
127.
age of information
128.
banking information
129.
building information modelling
130.
building information modeling
131.
Building Information Modeling (BIM)
132.
building information modelling
133.
Building Information Modelling (BIM)
134.
Building Information Modelling (BIM) adoption
135.
business information technology
136.
city information modelling (CIM)
137.
communication channels (information theory)
138.
Community Statistics on Information Society (CSIS)
139.
court information system
140.
critical information infrastructure
141.
Data-information-knowledgewisdom (DIKW)
142.
discrete information bottle-neck
143.
dissemination of information
144.
enterprise information systems
145.
Estonian National Health Information System
146.
estonian national health information system (ENHIS)
147.
Estonian nationwide Health Information System (EHIS)
148.
evolutionary information systems
149.
financial information
150.
general theory of information transfer
151.
Geographic Information System (GIS)
152.
geographical information system
153.
health information exchange
154.
health information purpose
155.
health information sharing maturity
156.
health information systems
157.
Healthcare information systems
158.
high-performance computing systems, Information processing
159.
HL7 Version 3: Reference Information Model (RIM)
160.
ICT (information and communication technology)
161.
information
162.
information analysis
163.
information and communication technologies
164.
Information and Communication Technologies (ICT)
165.
Information and communication technologies (ICT) digitalisation
166.
Information and Communication Technologies (ICT) laws
167.
Information and Communication Technologies (ICTs)
168.
Information and Communication Technologies for Development
169.
information and communication technology
170.
information and communication technology (ICT)
171.
information and communications technology
172.
information and consultation
173.
information architecture
174.
information asymmetry
175.
information commons
176.
information communication technology
177.
information content
178.
information control
179.
information dissemination
180.
information economy
181.
information entropy
182.
information exchange
183.
information extraction
184.
information filtering
185.
information flow control
186.
information fusion
187.
information governance
188.
information integration
189.
information literacy
190.
information literacy cooperation
191.
information logistics
192.
information management
193.
information measures
194.
information model
195.
information model-based urban planning
196.
information polity
197.
information potential
198.
information preprocessing
199.
information processing
200.
information processing system
201.
information rate
202.
information realities
203.
information retrieval
204.
information revolution
205.
information seeking behaviour
206.
information sharing
207.
information society
208.
Information sufficiency
209.
information system
210.
Information System Authority (RIA)
211.
information systems
212.
information systems development
213.
Information Systems research
214.
information technologies
215.
Information technology
216.
information technology (IT)
217.
information theory
218.
information to individual consumers
219.
information tool
220.
information use
221.
information value
222.
information war
223.
information warfare
224.
information visualization
225.
information volume
226.
Information-seeking activity
227.
intelligent information technology
228.
interoperability and evolutionary criteria of information systems
229.
laboratory information management system (LIMS)
230.
laboratory information management systems
231.
LIMS (laboratory information management systems)
232.
medical information
233.
Medical information policy
234.
middleware (for subscription and distribution of situational information)
235.
mobile information system
236.
multilingual information retrieval
237.
multimodal information
238.
open architecture for information exchange
239.
perception of visual information
240.
performance information
241.
performance information use
242.
philosophy of information
243.
process modeling and information systems within the extended enterprise
244.
provision of information to workers
245.
quality evaluation of scientific information
246.
real time information
247.
real-time information
248.
Reaxys Chemistry database information
249.
scientific information
250.
SIS II (Schengen Information System II)
251.
tactile information
252.
traffic information system (TIS)
253.
tree information database
254.
website information
255.
VIS (Visa Information System)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ märksõna
1
1.
Building Information Modeling
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT