Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
computer security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
7
Vaata veel..
(2/180)
Ekspordi
ekspordi kõik päringu tulemused
(7)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
Are the current system engineering practices sufficient to meet cyber crime?
Buldas, Ahto
;
Saarepera, Märt
Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017 : held as part of HCI International 2017, Vancouver, BC, Canada, July 9–14, 2017 : proceedings
2017
/
p. 451-463
https://doi.org/10.1007/978-3-319-58460-7_31
Conference proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
3
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
4
artikkel kogumikus
EU cybersecurity governance – stakeholders and normative intentions towards integration
Kasper, Agnes
The future of the European Union : demisting the debate
2020
/
p. 166−185
https://www.um.edu.mt/library/oar/handle/123456789/52308
https://www.um.edu.mt/library/oar/bitstream/123456789/52308/1/EU_cybersecurity_governance%e2%80%93stakeholders_and_normative_intentions_towards_integration_2020.pdf
artikkel kogumikus
5
artikkel kogumikus EST
/
artikkel kogumikus ENG
Preface
Bellatreche, Ladjel
;
Chernishev, George
;
Corral, Antonio
;
Ouchani, Samir
;
Vain, Jüri
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
/
p. v-vii
https://link.springer.com/content/pdf/bfm:978-3-030-87657-9/1?pdf=chapter%20toc
Article collection metrics at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
6
artikkel kogumikus
The becoming of cyber-military capabilities
Salminen, Mikko
;
Kerttunen, Mika
Routledge handbook of international cybersecurity
2020
/
p. 94-107
https://www.ester.ee/record=b5308475*est
artikkel kogumikus
7
artikkel kogumikus
Towards a Cyber Maastricht : two steps forward, one step back
Kasper, Agnes
;
Vernygora, Vlad Alex
The future of the European Union : demisting the debate
2020
/
p. 186-210
https://www.um.edu.mt/library/oar/handle/123456789/52310
https://www.um.edu.mt/library/oar/bitstream/123456789/52310/1/Towards_a_%e2%80%98Cyber_Maastricht%e2%80%99_two_steps_forward_one_step_back_2020.pdf
artikkel kogumikus
Kirjeid leitud 7, kuvan
1 - 7
võtmesõna
176
1.
computer security
2.
ad-hoc sensor networks security
3.
Automatic Security Verification
4.
Blockchain security
5.
cache security
6.
communication system security
7.
comprehensive system of economic security
8.
cooperative security dilemma
9.
cyber security
10.
cyber security education
11.
cyber security exercises
12.
cyber security strategies
13.
cyber-security
14.
data security
15.
development of security cameras
16.
drinking water security
17.
economic security
18.
economic security of enterprise
19.
emotional security
20.
energy security
21.
energy security indicator
22.
Estonian information security standard
23.
graded security
24.
hardware security
25.
hardware security primitive
26.
human security
27.
information security
28.
internal security
29.
international security
30.
investment and innovation security
31.
IPv6 security
32.
IT security
33.
IT security management
34.
job security
35.
long-term security
36.
metadata model for security measures
37.
Middle Eastern security
38.
Mobile security
39.
national cyber security strategy
40.
national security
41.
NATO. Science for Peace and Security Program
42.
network security
43.
network security monitoring
44.
OSCE (Organization for Security and Co-operation in Europe)
45.
passenger’s security
46.
policy-based routing security
47.
political and security cultures
48.
post-quantum security
49.
power system security
50.
quantitative security
51.
regional security
52.
RISC-V Security Verification
53.
security
54.
security adaptation
55.
security analysis
56.
security and justice (AFSJ)
57.
security and privacy
58.
security and privacy in smart grids
59.
Security Assertion Mining
60.
security closure
61.
Security Coverage
62.
security dataset
63.
security dilemma
64.
Security evaluation
65.
security evaluation instruments
66.
security log analysis
67.
security management
68.
security model
69.
security monitoring
70.
security notion
71.
security objectives
72.
security of data
73.
security of supply
74.
security operation center
75.
security operations center
76.
security patterns
77.
security policy
78.
security problem definition
79.
security proof
80.
security protocols
81.
security requirements
82.
security requirements engineering
83.
security risk assessment
84.
security risk management
85.
security strategies
86.
security systems for military objects
87.
security testing
88.
security training
89.
security verification
90.
security-by-design
91.
social security planning
92.
societal security
93.
system of economic security
94.
system security
95.
terrorism security
96.
transmission System Security
97.
voting privacy and security
98.
computer
99.
computer aided design
100.
computer aided diagnosis
101.
computer aided diagnostics
102.
computer aided instruction
103.
computer aided language translation
104.
computer aided manufacturing
105.
computer aided testing
106.
computer algebra
107.
computer algebra system
108.
computer and education
109.
computer anxiety
110.
computer architecture
111.
computer assisted language learning
112.
computer based learning
113.
computer circuits
114.
computer control
115.
Computer crime
116.
computer education
117.
computer engineering
118.
computer engineerng
119.
computer game
120.
computer graphics
121.
computer hardware
122.
computer integrated manufacturing
123.
computer network management
124.
computer network operations
125.
computer networks
126.
computer pipelines
127.
computer programming
128.
computer programs
129.
computer science
130.
computer science basics
131.
computer science education
132.
computer simulation
133.
computer simulation environments
134.
computer simulations
135.
computer software
136.
computer softwaregraph theory
137.
computer systems
138.
Computer systems organization
139.
computer terminals
140.
computer vision
141.
computer workers
142.
computer-aided anthropometry
143.
computer-aided architectural design (CAAD)
144.
computer‐aided assessment
145.
computer-aided design
146.
computer-aided detection
147.
computer‐aided detection
148.
computer-aided diagnosis
149.
computer-aided drawing (CAD)
150.
computer-aided engineering
151.
computer-aided teaching
152.
Computer-Aided Tuning
153.
computer-aided tuning (CAT)
154.
computer-assisted language learning (CALL)
155.
computer-oriented technologies
156.
computer-supported decision-making
157.
computer-use
158.
control engineering computer applications
159.
distributed computer systems
160.
education in computer engineering
161.
fifth generation computer
162.
gateways (computer networks)
163.
high-performance computer systems
164.
human computer interaction
165.
human computer interaction (HCI)
166.
human-computer interaction
167.
Human-Computer Interaction (HCI)
168.
human-computer trust
169.
interactive computer graphics
170.
laptop computer
171.
logic in computer science
172.
single board computer
173.
single-board computer
174.
structure computer analysis
175.
ubiquitous computer technology
176.
Web and computer-based learning
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Computer Systems
4.
Estonian Summer School on Computer and Systems Science, 2023
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT