Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
emotional security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/129)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
A systematic approach to define requirements and engineer the ontology for semantically merging data sets for personal-Centric healthcare systems
Kormiltsõn, Aleksandr
CAiSE 2018 Doctoral Consortium
2018
/
p. 91 - 99
https://ceur-ws.org/Vol-2114/paper11.pdf
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
127
1.
emotional security
2.
emotional and physiological states
3.
emotional contagion
4.
emotional context
5.
emotional coping
6.
emotional exhaustion
7.
emotional goals
8.
Emotional Intelligence (EI)
9.
emotional labour
10.
Emotional, affective and physiological states, arousal and valence
11.
human emotional and physiological states
12.
socio-emotional learning
13.
ad-hoc sensor networks security
14.
Automatic Security Verification
15.
Blockchain security
16.
cache security
17.
communication system security
18.
comprehensive system of economic security
19.
computer security
20.
cooperative security dilemma
21.
cyber security
22.
cyber security education
23.
cyber security exercises
24.
cyber security monitoring
25.
cyber security strategies
26.
cyber-security
27.
data and information security
28.
data security
29.
development of security cameras
30.
digital security practices
31.
drinking water security
32.
economic security
33.
economic security of enterprise
34.
energy security
35.
energy security indicator
36.
Estonian information security standard
37.
graded security
38.
hardware security
39.
hardware security primitive
40.
high level of security
41.
Homeland security
42.
human security
43.
information security
44.
information security and privacy
45.
initial level of security
46.
internal security
47.
international security
48.
investment and innovation security
49.
IPv6 security
50.
IT security
51.
IT security management
52.
job security
53.
long-term security
54.
medium level of security
55.
metadata model for security measures
56.
Middle Eastern security
57.
Mobile security
58.
national cyber security strategy
59.
national security
60.
NATO. Science for Peace and Security Program
61.
network security
62.
network security monitoring
63.
OSCE (Organization for Security and Co-operation in Europe)
64.
passenger’s security
65.
policy-based routing security
66.
political and security cultures
67.
post-quantum security
68.
power system security
69.
quantitative security
70.
regional security
71.
RISC-V Security Verification
72.
Safety and Security in Sea Transportation
73.
safety and security testing
74.
security
75.
security adaptation
76.
security alert prioritization
77.
security analysis
78.
security and justice (AFSJ)
79.
Security and political science
80.
security and privacy
81.
security and privacy in smart grids
82.
Security Assertion Mining
83.
security closure
84.
Security Coverage
85.
security dataset
86.
security dilemma
87.
Security evaluation
88.
security evaluation instruments
89.
Security limitations
90.
security log analysis
91.
security management
92.
security model
93.
security monitoring
94.
security notion
95.
security objectives
96.
security of data
97.
security of supply
98.
security operation center
99.
security operations center
100.
security patterns
101.
security policy
102.
security problem definition
103.
security proof
104.
security protocols
105.
security requirements
106.
security requirements engineering
107.
security risk assessment
108.
security risk management
109.
security risks
110.
security science and technology
111.
security strategies
112.
security systems for military objects
113.
security testing
114.
security training
115.
security verification
116.
security-by-design
117.
social security planning
118.
societal security
119.
software security
120.
software security level
121.
software security subcharacteristics
122.
sufficient level of security
123.
system of economic security
124.
system security
125.
terrorism security
126.
transmission System Security
127.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT