Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
information security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
5
Vaata veel..
(3/230)
Ekspordi
ekspordi kõik päringu tulemused
(5)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
artikkel kogumikus
2
artikkel kogumikus
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
artikkel kogumikus
3
artikkel kogumikus EST
/
artikkel kogumikus ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 5, kuvan
1 - 5
võtmesõna
227
1.
Estonian information security standard
2.
information security
3.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
data security
19.
development of security cameras
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
metadata model for security measures
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
Security and political science
62.
security and privacy
63.
security and privacy in smart grids
64.
Security Assertion Mining
65.
security closure
66.
Security Coverage
67.
security dataset
68.
security dilemma
69.
Security evaluation
70.
security evaluation instruments
71.
security log analysis
72.
security management
73.
security model
74.
security monitoring
75.
security notion
76.
security objectives
77.
security of data
78.
security of supply
79.
security operation center
80.
security operations center
81.
security patterns
82.
security policy
83.
security problem definition
84.
security proof
85.
security protocols
86.
security requirements
87.
security requirements engineering
88.
security risk assessment
89.
security risk management
90.
security risks
91.
security strategies
92.
security systems for military objects
93.
security testing
94.
security training
95.
security verification
96.
security-by-design
97.
social security planning
98.
societal security
99.
system of economic security
100.
system security
101.
terrorism security
102.
transmission System Security
103.
voting privacy and security
104.
access to information
105.
age of information
106.
banking information
107.
building information modelling
108.
building information modeling
109.
Building Information Modeling (BIM)
110.
building information modelling
111.
Building Information Modelling (BIM)
112.
Building Information Modelling (BIM) adoption
113.
business information technology
114.
city information modelling (CIM)
115.
communication channels (information theory)
116.
Community Statistics on Information Society (CSIS)
117.
court information system
118.
critical information infrastructure
119.
Data-information-knowledgewisdom (DIKW)
120.
discrete information bottle-neck
121.
dissemination of information
122.
enterprise information systems
123.
Estonian National Health Information System
124.
estonian national health information system (ENHIS)
125.
Estonian nationwide Health Information System (EHIS)
126.
evolutionary information systems
127.
financial information
128.
general theory of information transfer
129.
Geographic Information System (GIS)
130.
geographical information system
131.
health information exchange
132.
health information purpose
133.
health information sharing maturity
134.
health information systems
135.
Healthcare information systems
136.
high-performance computing systems, Information processing
137.
HL7 Version 3: Reference Information Model (RIM)
138.
ICT (information and communication technology)
139.
information
140.
information analysis
141.
information and communication technologies
142.
Information and Communication Technologies (ICT)
143.
Information and communication technologies (ICT) digitalisation
144.
Information and Communication Technologies (ICT) laws
145.
Information and Communication Technologies (ICTs)
146.
Information and Communication Technologies for Development
147.
information and communication technology
148.
information and communication technology (ICT)
149.
information and communications technology
150.
information architecture
151.
information asymmetry
152.
information commons
153.
information communication technology
154.
information content
155.
information control
156.
information dissemination
157.
information economy
158.
information entropy
159.
information exchange
160.
information extraction
161.
information filtering
162.
information flow control
163.
information fusion
164.
information governance
165.
information integration
166.
information literacy
167.
information literacy cooperation
168.
information logistics
169.
information management
170.
information measures
171.
information model
172.
information model-based urban planning
173.
information polity
174.
information potential
175.
information processing
176.
information processing system
177.
information rate
178.
information realities
179.
information retrieval
180.
information revolution
181.
information seeking behaviour
182.
information sharing
183.
information society
184.
Information sufficiency
185.
information system
186.
Information System Authority (RIA)
187.
information systems
188.
information systems development
189.
Information Systems research
190.
information technologies
191.
Information technology
192.
information technology (IT)
193.
information theory
194.
information to individual consumers
195.
information tool
196.
information value
197.
information warfare
198.
information visualization
199.
information volume
200.
Information-seeking activity
201.
intelligent information technology
202.
interoperability and evolutionary criteria of information systems
203.
laboratory information management system (LIMS)
204.
laboratory information management systems
205.
LIMS (laboratory information management systems)
206.
medical information
207.
Medical information policy
208.
middleware (for subscription and distribution of situational information)
209.
mobile information system
210.
multilingual information retrieval
211.
multimodal information
212.
open architecture for information exchange
213.
perception of visual information
214.
performance information
215.
performance information use
216.
philosophy of information
217.
process modeling and information systems within the extended enterprise
218.
quality evaluation of scientific information
219.
real time information
220.
real-time information
221.
Reaxys Chemistry database information
222.
scientific information
223.
SIS II (Schengen Information System II)
224.
traffic information system (TIS)
225.
tree information database
226.
website information
227.
VIS (Visa Information System)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ märksõna
1
1.
Building Information Modeling
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT