Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Security evaluation (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/151)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
149
1.
Security evaluation
2.
ad-hoc sensor networks security
3.
Blockchain security
4.
cache security
5.
communication system security
6.
comprehensive system of economic security
7.
computer security
8.
cooperative security dilemma
9.
cyber security
10.
cyber security education
11.
cyber security exercises
12.
cyber security strategies
13.
cyber-security
14.
data security
15.
development of security cameras
16.
drinking water security
17.
economic security
18.
economic security of enterprise
19.
emotional security
20.
energy security
21.
energy security indicator
22.
graded security
23.
hardware security
24.
hardware security primitive
25.
human security
26.
information security
27.
internal security
28.
international security
29.
investment and innovation security
30.
IPv6 security
31.
IT security
32.
job security
33.
long-term security
34.
metadata model for security measures
35.
Middle Eastern security
36.
Mobile security
37.
national cyber security strategy
38.
national security
39.
NATO. Science for Peace and Security Program
40.
network security
41.
network security monitoring
42.
OSCE (Organization for Security and Co-operation in Europe)
43.
passenger’s security
44.
policy-based routing security
45.
political and security cultures
46.
post-quantum security
47.
power system security
48.
quantitative security
49.
regional security
50.
security
51.
security and privacy
52.
security and privacy in smart grids
53.
security closure
54.
Security Coverage
55.
security dataset
56.
security dilemma
57.
security log analysis
58.
security management
59.
security model
60.
security monitoring
61.
security notion
62.
security objectives
63.
security of data
64.
security of supply
65.
security operation center
66.
security patterns
67.
security problem definition
68.
security proof
69.
security protocols
70.
security requirements
71.
security requirements engineering
72.
security risk assessment
73.
security risk management
74.
security strategies
75.
security systems for military objects
76.
security testing
77.
security training
78.
security verification
79.
social security planning
80.
societal security
81.
system of economic security
82.
system security
83.
terrorism security
84.
transmission System Security
85.
voting privacy and security
86.
accuracy evaluation
87.
answer evaluation
88.
Automated Bonding Evaluation System
89.
automatic evaluation
90.
binding evaluation
91.
cohesion policy evaluation
92.
comprehensive evaluation
93.
compression method evaluation
94.
decision-making trial and evaluation laboratory
95.
descriptive sensory evaluation
96.
design evaluation
97.
empirical evaluation
98.
enhanced economy evaluation
99.
evaluation
100.
evaluation metrics
101.
evaluation of companies
102.
evaluation of the results of environmental innovations
103.
experimental evaluation
104.
feasibility evaluation
105.
financial evaluation
106.
function evaluation
107.
hazard evaluation
108.
Integrated hedonic-utilitarian evaluation
109.
investment effectiveness evaluation
110.
investment evaluation
111.
investments profitability evaluation
112.
life cycle evaluation
113.
meta-evaluation
114.
microstructure evaluation
115.
model evaluation
116.
multi-criteria evaluation
117.
non destructive evaluation
118.
non-destructive evaluation
119.
numerical evaluation of the order of convergence
120.
Organizational performance evaluation
121.
parameter evaluation
122.
performance evaluation
123.
performance evaluation and comparison
124.
Platform Evaluation
125.
point of evaluation
126.
production performance evaluation system
127.
quality evaluation of scientific information
128.
RIS3 evaluation and monitoring
129.
risk evaluation model
130.
risk evaluation model development
131.
self-evaluation
132.
shelter design evaluation
133.
Software engineering methodology evaluation
134.
source rock evaluation
135.
student evaluation
136.
students' evaluation and feedback
137.
system evaluation
138.
system-level evaluation
139.
tender evaluation model
140.
test and evaluation platform
141.
total evaluation of complexity
142.
total evaluation of performance
143.
trajectory evaluation
144.
ultrasonic nondestructive evaluation
145.
urban environmental evaluation
146.
user evaluation
147.
web usability evaluation
148.
visualization design and evaluation methods
149.
“Evaluation-hesitance”
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT