Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
information security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
6
Vaata veel..
(3/255)
Ekspordi
ekspordi kõik päringu tulemused
(6)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Artificial intelligence approach to identifying propaganda techniques and objects, taking into account ethical and legal aspects
Molchanova, Maryna
;
Dutt, Pawan Kumar
Computer Systems and Information Technologies
2025
/
p. 97-103
https://doi.org/10.31891/csit-2025-2-11
https://csitjournal.khmnu.edu.ua/index.php/csit/article/view/423
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
2
artikkel kogumikus
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
artikkel kogumikus
3
artikkel kogumikus
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
artikkel kogumikus
4
artikkel kogumikus EST
/
artikkel kogumikus ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
6
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 6, kuvan
1 - 6
võtmesõna
252
1.
data and information security
2.
Estonian information security standard
3.
information security
4.
information security and privacy
5.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
computer security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
data security
21.
development of security cameras
22.
digital security practices
23.
drinking water security
24.
economic security
25.
economic security of enterprise
26.
emotional security
27.
energy security
28.
energy security indicator
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
initial level of security
36.
internal security
37.
international security
38.
investment and innovation security
39.
IPv6 security
40.
IT security
41.
IT security management
42.
job security
43.
long-term security
44.
maritime cyber security
45.
maritime cyber security operations centers
46.
Maritime Security Operations Center (M-SOC)
47.
medium level of security
48.
metadata model for security measures
49.
Middle Eastern security
50.
Mobile security
51.
national cyber security strategy
52.
national security
53.
NATO. Science for Peace and Security Program
54.
network security
55.
network security monitoring
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
Safety and Security in Sea Transportation
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion Mining
76.
security closure
77.
Security Coverage
78.
security dataset
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security Level Evaluation
83.
Security limitations
84.
security log analysis
85.
security management
86.
security model
87.
security monitoring
88.
security notion
89.
security objectives
90.
security of data
91.
security of supply
92.
security operation center
93.
security operations center
94.
security patterns
95.
security policy
96.
security problem definition
97.
security proof
98.
security protocols
99.
security requirements
100.
security requirements engineering
101.
security research
102.
security risk assessment
103.
security risk management
104.
security risks
105.
security science and technology
106.
security strategies
107.
security systems for military objects
108.
security testing
109.
security training
110.
security verification
111.
security-by-design
112.
social security planning
113.
societal security
114.
software security
115.
software security level
116.
software security subcharacteristics
117.
sufficient level of security
118.
system of economic security
119.
system security
120.
terrorism security
121.
transmission System Security
122.
voting privacy and security
123.
access to information
124.
age of information
125.
banking information
126.
building information modelling
127.
building information modeling
128.
Building Information Modeling (BIM)
129.
building information modelling
130.
Building Information Modelling (BIM)
131.
Building Information Modelling (BIM) adoption
132.
business information technology
133.
city information modelling (CIM)
134.
communication channels (information theory)
135.
Community Statistics on Information Society (CSIS)
136.
court information system
137.
critical information infrastructure
138.
Data-information-knowledgewisdom (DIKW)
139.
discrete information bottle-neck
140.
dissemination of information
141.
enterprise information systems
142.
Estonian National Health Information System
143.
estonian national health information system (ENHIS)
144.
Estonian nationwide Health Information System (EHIS)
145.
evolutionary information systems
146.
financial information
147.
general theory of information transfer
148.
Geographic Information System (GIS)
149.
geographical information system
150.
health information exchange
151.
health information purpose
152.
health information sharing maturity
153.
health information systems
154.
Healthcare information systems
155.
high-performance computing systems, Information processing
156.
HL7 Version 3: Reference Information Model (RIM)
157.
ICT (information and communication technology)
158.
information
159.
information analysis
160.
information and communication technologies
161.
Information and Communication Technologies (ICT)
162.
Information and communication technologies (ICT) digitalisation
163.
Information and Communication Technologies (ICT) laws
164.
Information and Communication Technologies (ICTs)
165.
Information and Communication Technologies for Development
166.
information and communication technology
167.
information and communication technology (ICT)
168.
information and communications technology
169.
information and consultation
170.
information architecture
171.
information asymmetry
172.
information commons
173.
information communication technology
174.
information content
175.
information control
176.
information dissemination
177.
information economy
178.
information entropy
179.
information exchange
180.
information extraction
181.
information filtering
182.
information flow control
183.
information fusion
184.
information governance
185.
information integration
186.
information literacy
187.
information literacy cooperation
188.
information logistics
189.
information management
190.
information measures
191.
information model
192.
information model-based urban planning
193.
information polity
194.
information potential
195.
information preprocessing
196.
information processing
197.
information processing system
198.
information rate
199.
information realities
200.
information retrieval
201.
information revolution
202.
information seeking behaviour
203.
information sharing
204.
information society
205.
Information sufficiency
206.
information system
207.
Information System Authority (RIA)
208.
information systems
209.
information systems development
210.
Information Systems research
211.
information technologies
212.
Information technology
213.
information technology (IT)
214.
information theory
215.
information to individual consumers
216.
information tool
217.
information use
218.
information value
219.
information war
220.
information warfare
221.
information visualization
222.
information volume
223.
Information-seeking activity
224.
intelligent information technology
225.
interoperability and evolutionary criteria of information systems
226.
laboratory information management system (LIMS)
227.
laboratory information management systems
228.
LIMS (laboratory information management systems)
229.
medical information
230.
Medical information policy
231.
middleware (for subscription and distribution of situational information)
232.
mobile information system
233.
multilingual information retrieval
234.
multimodal information
235.
open architecture for information exchange
236.
perception of visual information
237.
performance information
238.
performance information use
239.
philosophy of information
240.
process modeling and information systems within the extended enterprise
241.
provision of information to workers
242.
quality evaluation of scientific information
243.
real time information
244.
real-time information
245.
Reaxys Chemistry database information
246.
scientific information
247.
SIS II (Schengen Information System II)
248.
tactile information
249.
traffic information system (TIS)
250.
tree information database
251.
website information
252.
VIS (Visa Information System)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ märksõna
1
1.
Building Information Modeling
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT