Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
software security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(3/213)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Method for determining the security level of software
Hovorushchenko, Tetiana
;
Voichur, Yurii
;
Medzatyi, Dmytro
;
Boyarchuk, Artem
;
Hnatchuk, Alina
IntelITSIS 2024 : 5th International Workshop on Intelligent Information Technologies and Systems of Information Security, March 28, 2024 : proceedings
2024
/
p. 72-85 : ill
https://ceur-ws.org/Vol-3675/
Article at Scopus
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
210
1.
software security
2.
software security level
3.
software security subcharacteristics
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
data and information security
19.
data security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
maritime cyber security
47.
maritime cyber security operations centers
48.
Maritime Security Operations Center (M-SOC)
49.
medium level of security
50.
metadata model for security measures
51.
Middle Eastern security
52.
Mobile security
53.
national cyber security strategy
54.
national security
55.
NATO. Science for Peace and Security Program
56.
network security
57.
network security monitoring
58.
OSCE (Organization for Security and Co-operation in Europe)
59.
passenger’s security
60.
policy-based routing security
61.
political and security cultures
62.
post-quantum security
63.
power system security
64.
quantitative security
65.
regional security
66.
RISC-V Security Verification
67.
Safety and Security in Sea Transportation
68.
safety and security testing
69.
security
70.
security adaptation
71.
security alert prioritization
72.
security analysis
73.
security and justice (AFSJ)
74.
Security and political science
75.
security and privacy
76.
security and privacy in smart grids
77.
Security Assertion Mining
78.
security closure
79.
Security Coverage
80.
security dataset
81.
security dilemma
82.
Security evaluation
83.
security evaluation instruments
84.
Security limitations
85.
security log analysis
86.
security management
87.
security model
88.
security monitoring
89.
security notion
90.
security objectives
91.
security of data
92.
security of supply
93.
security operation center
94.
security operations center
95.
security patterns
96.
security policy
97.
security problem definition
98.
security proof
99.
security protocols
100.
security requirements
101.
security requirements engineering
102.
security research
103.
security risk assessment
104.
security risk management
105.
security risks
106.
security science and technology
107.
security strategies
108.
security systems for military objects
109.
security testing
110.
security training
111.
security verification
112.
security-by-design
113.
social security planning
114.
societal security
115.
sufficient level of security
116.
system of economic security
117.
system security
118.
terrorism security
119.
transmission System Security
120.
voting privacy and security
121.
advanced programming and software
122.
agent software architecture
123.
agent-oriented software engineering
124.
Agile software engineering
125.
AI based CAD software
126.
analysis software
127.
Anonymization software
128.
ARIS software
129.
Automated Synthesis of Software-based Self-test
130.
bernese software
131.
business software
132.
CFD (computational fluid dynamics) software
133.
client-vendor relationship in software development
134.
communicating hardware/software systems
135.
communicating software/hardware systems
136.
computer aided software engineering
137.
computer software
138.
Computer software and hardware
139.
COMSOL software
140.
educational software
141.
embedded software
142.
energy simulation software
143.
free software
144.
GIS software
145.
hardware/software co-design
146.
interoperability and evolution of healthcare models and software systems
147.
invasive software
148.
large software projects
149.
learning software agents
150.
model-based software development
151.
model-driven software engineering
152.
ontology driven software development
153.
ontology-based software engineering
154.
open source software
155.
optimization software
156.
plagiarism software
157.
public domain software
158.
RETScreen software
159.
self learning software
160.
sensor software
161.
simulation software "Delphin"
162.
simulations with software
163.
social software
164.
software
165.
software architecture
166.
software architecture improvement
167.
software based self-test
168.
software companies
169.
software complexity
170.
software containers
171.
software defined networking
172.
software defined networking (SDN)
173.
software defined networks (SDN)
174.
software defined radio
175.
software defined radio (SDR)
176.
software design
177.
software development
178.
software development concepts
179.
software documentation
180.
software engineering
181.
software engineering education
182.
Software engineering methodology evaluation
183.
software engineering practises
184.
software factory
185.
software for measurements
186.
software implementation
187.
software level TMR
188.
software modeling
189.
software outsourcing
190.
Software packages
191.
software project management
192.
software qualification
193.
software quality
194.
software quality attributes
195.
software quality characteristics
196.
software refactoring
197.
software sector
198.
software testing
199.
software/hardware partitioning
200.
software/hardware systems
201.
software-based self-test
202.
software-based self-test (SBST)
203.
software-defined network
204.
software-defined networking
205.
software-defined networking (SDN)
206.
software-in-the-loop (SIL) testing
207.
SOLIDWORKS software
208.
SysML modeling software
209.
system-to-software integrity
210.
triptych software engineering
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
autor
1
1.
Department of Software Science, Tallinn University of Technology
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT