Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
55
Vaata veel..
(2/120)
Ekspordi
ekspordi kõik päringu tulemused
(55)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
51
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Split-chip design to prevent IP reverse engineering
Pagliarini, Samuel Nascimento
;
Sweeney, Joseph
;
Mai, Ken
;
Blanton, Shawn
;
Mitra, Subhasish
;
Pileggi, Larry
IEEE Design and Test
2020
/
p. 109-118
https://doi.org/10.1109/MDAT.2020.3033255
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
52
artikkel kogumikus
The invisible front : a cyber resilience perspective
Bahsi, Hayretdin
The geopolitics of power grids : political and security aspects of Baltic electricity synchronization : March 2018
2018
/
p. 53–68 : ill
https://www.ester.ee/record=b5053315*est
artikkel kogumikus
53
artikkel kogumikus EST
/
artikkel kogumikus ENG
TOOP trust architecture
Boldrin, Luca
;
Sellitto, Giovanni Paolo
;
Tepandi, Jaak
The once-only principle : The TOOP project
2021
/
p. 126–140
https://doi.org/10.1007/978-3-030-79851-2_7
Article collection metrics at Scopus
Article at Scopus
Article collection metrics at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
54
artikkel kogumikus
Using Incremental Inductive Logic Programming for Learning Spoofing Attacks on Maritime Automatic Identification System Data
Benterki, Aboubaker Seddiq
;
Visky, Gabor
;
Vain, Jüri
;
Tsiopoulos, Leonidas
Maritime Cybersecurity
2025
/
p. 123-141
https://doi.org/10.1007/978-3-031-87290-7_7
artikkel kogumikus
Seotud publikatsioonid
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
55
artikkel kogumikus
Wearable wireless sensor networks for emergency response in public safety networks
Alam, Muhammad Mahtab
;
Ben Arbia, Dhafer
;
Ben Hamida, Elyes
Wireless public safety networks 2 : a systematic approach
2016
/
p. 63-94 : ill
https://doi.org/10.1016/B978-1-78548-052-2.50003-7
artikkel kogumikus
Kirjeid leitud 55, kuvan
51 - 55
eelmine
1
2
3
järgmine
võtmesõna
118
1.
ad-hoc sensor networks security
2.
Automatic Security Verification
3.
Blockchain security
4.
cache security
5.
communication system security
6.
comprehensive system of economic security
7.
computer security
8.
cooperative security dilemma
9.
cyber security
10.
cyber security education
11.
cyber security exercises
12.
cyber security monitoring
13.
cyber security strategies
14.
cyber-security
15.
data and information security
16.
data security
17.
development of security cameras
18.
digital security practices
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
high level of security
30.
Homeland security
31.
human security
32.
information security
33.
information security and privacy
34.
initial level of security
35.
internal security
36.
international security
37.
investment and innovation security
38.
IPv6 security
39.
IT security
40.
IT security management
41.
job security
42.
long-term security
43.
medium level of security
44.
metadata model for security measures
45.
Middle Eastern security
46.
Mobile security
47.
national cyber security strategy
48.
national security
49.
NATO. Science for Peace and Security Program
50.
network security
51.
network security monitoring
52.
OSCE (Organization for Security and Co-operation in Europe)
53.
passenger’s security
54.
policy-based routing security
55.
political and security cultures
56.
post-quantum security
57.
power system security
58.
quantitative security
59.
regional security
60.
RISC-V Security Verification
61.
Safety and Security in Sea Transportation
62.
safety and security testing
63.
security
64.
security adaptation
65.
security alert prioritization
66.
security analysis
67.
security and justice (AFSJ)
68.
Security and political science
69.
security and privacy
70.
security and privacy in smart grids
71.
Security Assertion Mining
72.
security closure
73.
Security Coverage
74.
security dataset
75.
security dilemma
76.
Security evaluation
77.
security evaluation instruments
78.
Security limitations
79.
security log analysis
80.
security management
81.
security model
82.
security monitoring
83.
security notion
84.
security objectives
85.
security of data
86.
security of supply
87.
security operation center
88.
security operations center
89.
security patterns
90.
security policy
91.
security problem definition
92.
security proof
93.
security protocols
94.
security requirements
95.
security requirements engineering
96.
security risk assessment
97.
security risk management
98.
security risks
99.
security science and technology
100.
security strategies
101.
security systems for military objects
102.
security testing
103.
security training
104.
security verification
105.
security-by-design
106.
social security planning
107.
societal security
108.
software security
109.
software security level
110.
software security subcharacteristics
111.
sufficient level of security
112.
system of economic security
113.
system security
114.
terrorism security
115.
transmission System Security
116.
voting privacy and security
117.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
118.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT