Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security operations center (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/170)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A National Maritime Cyber Security Operations Center (M-SOC) Concept
Oruc, Aybars
;
Bauk, Sanja
;
Zhou, Jianying
Journal of Marine Science and Engineering
2026
/
art. 17
https://doi.org/10.3390/jmse14010017
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
2
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
163
1.
Maritime Security Operations Center (M-SOC)
2.
security operations center
3.
maritime cyber security operations centers
4.
Municipal Operations Center
5.
security operation center
6.
algebraic operations
7.
buck operations
8.
Clean port operations
9.
commercial operations
10.
computer network operations
11.
cyber operations
12.
cyber operations exercises
13.
cyberspace operations planning
14.
Defensive Cyber Operations
15.
digital operations
16.
energy consumption of construction operations
17.
ferry operations
18.
influence operations
19.
maritime operations
20.
microgrid operations
21.
NATO cyber operations definitions
22.
Offensive Cyber Operations
23.
operations research
24.
Port Operations
25.
port operations efficiency
26.
predictive analytics in port operations
27.
psychological operations
28.
supply chain operations reference (SCOR)
29.
supply chain operations reference (SCOR) model
30.
Sweedler operations
31.
term operations
32.
autoservice center
33.
center-tapped coupled inductor
34.
data center
35.
data center (DC)
36.
data center applications
37.
daycare center
38.
Non-emergency Contact Center
39.
shared service center
40.
shared service center (SSC)
41.
underwater data center
42.
urban learning center
43.
ad-hoc sensor networks security
44.
Automatic Security Verification
45.
Blockchain security
46.
cache security
47.
cloud security
48.
communication system security
49.
comprehensive system of economic security
50.
computer security
51.
cooperative security dilemma
52.
cyber security
53.
cyber security education
54.
cyber security exercises
55.
cyber security monitoring
56.
cyber security monitoring in maritime
57.
cyber security strategies
58.
cyber-physical system security
59.
cyber-security
60.
data and information security
61.
data security
62.
development of security cameras
63.
digital security practices
64.
drinking water security
65.
economic security
66.
economic security of enterprise
67.
emotional security
68.
energy security
69.
energy security indicator
70.
Estonian information security standard
71.
graded security
72.
hardware security
73.
hardware security primitive
74.
high level of security
75.
Homeland security
76.
human security
77.
information security
78.
information security and privacy
79.
initial level of security
80.
internal security
81.
international security
82.
investment and innovation security
83.
IPv6 security
84.
IT security
85.
IT security management
86.
job security
87.
long-term security
88.
maritime cyber security
89.
medium level of security
90.
metadata model for security measures
91.
Middle Eastern security
92.
Mobile security
93.
national cyber security strategy
94.
national security
95.
NATO. Science for Peace and Security Program
96.
network security
97.
network security monitoring
98.
OSCE (Organization for Security and Co-operation in Europe)
99.
passenger’s security
100.
policy-based routing security
101.
political and security cultures
102.
post-quantum security
103.
power system security
104.
quantitative security
105.
regional security
106.
RISC-V Security Verification
107.
Safety and Security in Sea Transportation
108.
safety and security testing
109.
security
110.
security adaptation
111.
security alert prioritization
112.
security analysis
113.
security and justice (AFSJ)
114.
Security and political science
115.
security and privacy
116.
security and privacy in smart grids
117.
Security Assertion
118.
Security Assertion Mining
119.
security closure
120.
Security Coverage
121.
security dataset
122.
security dilemma
123.
Security evaluation
124.
security evaluation instruments
125.
Security Level Evaluation
126.
Security limitations
127.
security log analysis
128.
security management
129.
security model
130.
security monitoring
131.
security notion
132.
security objectives
133.
security of data
134.
security of supply
135.
security patterns
136.
security policy
137.
security problem definition
138.
security proof
139.
security protocols
140.
security requirements
141.
security requirements engineering
142.
security research
143.
security risk assessment
144.
security risk management
145.
security risks
146.
security science and technology
147.
security strategies
148.
security systems for military objects
149.
security testing
150.
security training
151.
security verification
152.
security-by-design
153.
social security planning
154.
societal security
155.
software security
156.
software security level
157.
software security subcharacteristics
158.
sufficient level of security
159.
system of economic security
160.
system security
161.
terrorism security
162.
transmission System Security
163.
voting privacy and security
märksõna
7
1.
Baltic Monitoring and Forecasting Center (BALMFC)
2.
Estonian Center for Safe and Trustworthy Artificial Intelligence (ECSTAI)
3.
FinEst Center for Smart Cities
4.
The Center for European Integration Studies
5.
UNDP Urban Learning Center
6.
National Computer Security Incident Response Teams (N-CSIRTs)
7.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT