Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
communication system security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/174)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
172
1.
communication system security
2.
comprehensive system of economic security
3.
power system security
4.
system of economic security
5.
system security
6.
transmission System Security
7.
air-ground communication
8.
air-to-ground communication
9.
ambient backscatter communication
10.
automotive communication networks
11.
best-effort communication
12.
body-to-body communication
13.
communication
14.
communication business processes
15.
communication channels (information theory)
16.
communication delay
17.
communication delay time
18.
communication delays
19.
communication geography
20.
communication in PMS
21.
communication model
22.
communication networks
23.
communication overheads
24.
communication systems
25.
communication technology
26.
communication-time circuits
27.
communication-time processing
28.
cooperative communication
29.
crisis communication
30.
critical communication
31.
cross-border communication networks
32.
cross-cultural communication
33.
cyber team communication
34.
cyber threat communication
35.
D2D communication
36.
device-to-device (D2D) communication
37.
device-to-device communication
38.
digital communication
39.
digital scholarly communication
40.
electronic cross-communication
41.
electronic scholary communication
42.
embryo-maternal communication
43.
guaranteed-throughput communication
44.
health communication
45.
ICT (information and communication technology)
46.
indoor communication
47.
information and communication technologies
48.
Information and communication technologies (ICT) digitalisation
49.
Information and Communication Technologies (ICT) laws
50.
Information and Communication Technologies (ICTs)
51.
Information and Communication Technologies for Development
52.
information and communication technology
53.
information and communication technology (ICT)
54.
information communication technology
55.
intercellular communication
56.
intercultural communication
57.
marketing communication
58.
massive machine-type communication (mMTC)
59.
massive machinetype communication (MMTC)
60.
mobile communication
61.
network communication technologies
62.
nonverbal communication
63.
on-chip communication architectures
64.
online word-of mouth (WOM) communication
65.
online word-of-mouth communication
66.
optical communication equipment
67.
patient-physician communication
68.
personalized communication
69.
person-communication technology interface
70.
pervasive public safety communication
71.
pervasive public safety communication (PPSC)
72.
post-Shannon communication
73.
power line communication
74.
powerline communication
75.
quantum communication
76.
quantum communication chanell
77.
radio communication
78.
random communication delays
79.
real-time communication
80.
remote communication
81.
responsive communication jamming
82.
scalable communication
83.
scholarly communication
84.
service communication
85.
strategic communication
86.
ultra-reliable lowlatency communication (URLLC)
87.
use-development communication
88.
user-developer communication
89.
wireless communication
90.
visual communication
91.
VoIP communication
92.
5G mobile communication
93.
5G mobile communication systems
94.
ad-hoc sensor networks security
95.
Blockchain security
96.
cache security
97.
computer security
98.
cooperative security dilemma
99.
cyber security
100.
cyber security education
101.
cyber security exercises
102.
cyber security strategies
103.
cyber-security
104.
data security
105.
development of security cameras
106.
drinking water security
107.
economic security
108.
economic security of enterprise
109.
emotional security
110.
energy security
111.
energy security indicator
112.
graded security
113.
hardware security
114.
hardware security primitive
115.
human security
116.
information security
117.
internal security
118.
international security
119.
investment and innovation security
120.
IPv6 security
121.
IT security
122.
job security
123.
long-term security
124.
metadata model for security measures
125.
Middle Eastern security
126.
Mobile security
127.
national cyber security strategy
128.
national security
129.
NATO. Science for Peace and Security Program
130.
network security
131.
network security monitoring
132.
OSCE (Organization for Security and Co-operation in Europe)
133.
passenger’s security
134.
policy-based routing security
135.
political and security cultures
136.
post-quantum security
137.
quantitative security
138.
regional security
139.
security
140.
security and privacy
141.
security and privacy in smart grids
142.
security closure
143.
Security Coverage
144.
security dataset
145.
security dilemma
146.
Security evaluation
147.
security log analysis
148.
security management
149.
security model
150.
security monitoring
151.
security notion
152.
security objectives
153.
security of data
154.
security of supply
155.
security operation center
156.
security patterns
157.
security problem definition
158.
security proof
159.
security protocols
160.
security requirements
161.
security requirements engineering
162.
security risk assessment
163.
security risk management
164.
security strategies
165.
security systems for military objects
166.
security testing
167.
security training
168.
security verification
169.
social security planning
170.
societal security
171.
terrorism security
172.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT