Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security monitoring (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/240)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
How to build a SOC on a budget
Vaarandi, Risto
;
Mäses, Sten
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
2022
/
p. 171-177 : ill
https://doi.org/10.1109/CSR54599.2022.9850281
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
233
1.
cyber security monitoring
2.
network security monitoring
3.
security monitoring
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
high level of security
32.
Homeland security
33.
human security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
maritime cyber security
46.
maritime cyber security operations centers
47.
Maritime Security Operations Center (M-SOC)
48.
medium level of security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
Safety and Security in Sea Transportation
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion Mining
76.
security closure
77.
Security Coverage
78.
security dataset
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security limitations
83.
security log analysis
84.
security management
85.
security model
86.
security notion
87.
security objectives
88.
security of data
89.
security of supply
90.
security operation center
91.
security operations center
92.
security patterns
93.
security policy
94.
security problem definition
95.
security proof
96.
security protocols
97.
security requirements
98.
security requirements engineering
99.
security research
100.
security risk assessment
101.
security risk management
102.
security risks
103.
security science and technology
104.
security strategies
105.
security systems for military objects
106.
security testing
107.
security training
108.
security verification
109.
security-by-design
110.
social security planning
111.
societal security
112.
software security
113.
software security level
114.
software security subcharacteristics
115.
sufficient level of security
116.
system of economic security
117.
system security
118.
terrorism security
119.
transmission System Security
120.
voting privacy and security
121.
ambulatory blood pressure monitoring
122.
automated decision and monitoring mechanisms
123.
Baltic-wide HELCOM COMBINE monitoring program
124.
bi-directional fault monitoring devices
125.
biological monitoring
126.
biomedical monitoring
127.
biosignal monitoring
128.
cardiac monitoring
129.
CO2 monitoring
130.
coastal monitoring
131.
condition monitoring
132.
condition monitoring system
133.
continuous monitoring
134.
Copernicus Marine Environment Monitoring Service
135.
corporate performance monitoring system
136.
corrosion monitoring
137.
data-driven condition monitoring
138.
deformation monitoring
139.
diagnosis and performance monitoring
140.
Distributed flow monitoring
141.
distributed monitoring
142.
distributed online monitoring
143.
disturbance monitoring
144.
drone-based traffic monitoring
145.
drug monitoring
146.
e-monitoring
147.
Environmental compliance monitoring
148.
environmental monitoring
149.
fault monitoring
150.
field monitoring
151.
fish monitoring
152.
GHB monitoring
153.
groundwater monitoring
154.
haemodialysis monitoring
155.
health monitoring
156.
healthcare monitoring
157.
hemodialysis monitoring
158.
home blood pressure monitoring
159.
home monitoring
160.
industrial monitoring
161.
infrastructure monitoring
162.
in-situ monitoring
163.
integrated hemodynamic monitoring
164.
interactive monitoring
165.
IoT-based monitoring
166.
laboratory monitoring
167.
landfill monitoring
168.
load monitoring
169.
long term monitoring
170.
long-term monitoring
171.
machine condition monitoring
172.
machinery monitoring
173.
Magnetic induction monitoring
174.
marine microplastic monitoring
175.
marine monitoring
176.
monitoring
177.
monitoring and application design
178.
monitoring and detection
179.
monitoring and prognosis
180.
monitoring deformations
181.
monitoring program
182.
monitoring RIS3 observatory
183.
monitoring system
184.
monitoring the health patients
185.
NetFlow based network monitoring
186.
network monitoring
187.
Non-intrusive load monitoring
188.
non-intrusive load monitoring (NILM)
189.
ocean monitoring
190.
online monitoring
191.
on-line monitoring
192.
optical monitoring
193.
passive acoustic monitoring
194.
patient monitoring
195.
performance monitoring
196.
periodic monitoring
197.
pollen monitoring
198.
power quality monitoring
199.
PQM (Power Quality Monitoring)
200.
process monitoring
201.
production monitoring
202.
production monitoring system
203.
production monitoring system (PLM)
204.
production monitoring system (PMS)
205.
production monitoring systems (PMS)
206.
project-monitoring
207.
quality monitoring
208.
real time monitoring process
209.
real-time collision monitoring
210.
real-time monitoring
211.
remote monitoring
212.
remote patient monitoring
213.
respiratory monitoring
214.
RIS3 evaluation and monitoring
215.
road surface condition monitoring
216.
sea monitoring
217.
sensor respiratory monitoring
218.
smart materials with structural health monitoring capabilities
219.
SoC health monitoring
220.
stormwater monitoring
221.
structural health monitoring
222.
surface water monitoring
223.
susceptibility monitoring
224.
system monitoring
225.
terms—production environment monitoring
226.
the accuracy of monitoring in analysis of impact impulses
227.
The Baltic Monitoring and Forecasting Centre (BAL MFC)
228.
traffic behavior monitoring
229.
treatment monitoring
230.
water pollution monitoring
231.
water quality monitoring
232.
wearable health monitoring
233.
wide area monitoring
märksõna
7
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
4.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
5.
Baltic Monitoring and Forecasting Center (BALMFC)
6.
Copernicus Marine Environment Monitoring Service (CMEMS)
7.
MyOcean Baltic Sea Monitoring and Forecasting Centre
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT