Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
medium level of security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/305)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Method for determining the security level of software
Hovorushchenko, Tetiana
;
Voichur, Yurii
;
Medzatyi, Dmytro
;
Boyarchuk, Artem
;
Hnatchuk, Alina
IntelITSIS 2024 : 5th International Workshop on Intelligent Information Technologies and Systems of Information Security, March 28, 2024 : proceedings
2024
/
p. 72-85 : ill
https://ceur-ws.org/Vol-3675/
Article at Scopus
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
303
1.
medium level of security
2.
high level of security
3.
initial level of security
4.
Security Level Evaluation
5.
software security level
6.
sufficient level of security
7.
logic level and high level BDDs
8.
ceramic filter medium
9.
defined medium
10.
defined rich medium
11.
dual-phase medium-entropy alloy
12.
effective medium
13.
implementation of IFRS for small and medium-sized entities (SMEs)
14.
inhomogeneous medium
15.
medium access control
16.
medium access control (MAC)
17.
medium alkalinity
18.
medium density fibreboard (MDF) cracking
19.
medium optimization
20.
medium with damages
21.
medium with microstructure
22.
medium voltage
23.
medium voltage insulator
24.
medium voltage overhead lines
25.
medium voltage power cables
26.
microstructured medium
27.
safety activities at small and medium-sized enterprises
28.
safety in small and medium-sized enterprises
29.
small and medium enterprises
30.
small and medium enterprises (SME)
31.
small and medium sized enterprises (SMEs)
32.
small and medium-sized enterprise
33.
small and medium-sized enterprise (sme)
34.
small and medium-sized enterprises
35.
small- and medium-sized enterprises
36.
small and medium-sized enterprises (SME)
37.
Small and Medium-sized Enterprises (SMEs)
38.
small and medium-sized ports
39.
small and medium-sized seaports
40.
Small to medium-sized enterprises
41.
SMEs (small and medium size companies)
42.
two-phase medium
43.
ad-hoc sensor networks security
44.
Automatic Security Verification
45.
Blockchain security
46.
cache security
47.
cloud security
48.
communication system security
49.
comprehensive system of economic security
50.
computer security
51.
cooperative security dilemma
52.
cyber security
53.
cyber security education
54.
cyber security exercises
55.
cyber security monitoring
56.
cyber security strategies
57.
cyber-physical system security
58.
cyber-security
59.
data and information security
60.
data security
61.
development of security cameras
62.
digital security practices
63.
drinking water security
64.
economic security
65.
economic security of enterprise
66.
emotional security
67.
energy security
68.
energy security indicator
69.
Estonian information security standard
70.
graded security
71.
hardware security
72.
hardware security primitive
73.
Homeland security
74.
human security
75.
information security
76.
information security and privacy
77.
internal security
78.
international security
79.
investment and innovation security
80.
IPv6 security
81.
IT security
82.
IT security management
83.
job security
84.
long-term security
85.
maritime cyber security
86.
maritime cyber security operations centers
87.
Maritime Security Operations Center (M-SOC)
88.
metadata model for security measures
89.
Middle Eastern security
90.
Mobile security
91.
national cyber security strategy
92.
national security
93.
NATO. Science for Peace and Security Program
94.
network security
95.
network security monitoring
96.
OSCE (Organization for Security and Co-operation in Europe)
97.
passenger’s security
98.
policy-based routing security
99.
political and security cultures
100.
post-quantum security
101.
power system security
102.
quantitative security
103.
regional security
104.
RISC-V Security Verification
105.
Safety and Security in Sea Transportation
106.
safety and security testing
107.
security
108.
security adaptation
109.
security alert prioritization
110.
security analysis
111.
security and justice (AFSJ)
112.
Security and political science
113.
security and privacy
114.
security and privacy in smart grids
115.
Security Assertion
116.
Security Assertion Mining
117.
security closure
118.
Security Coverage
119.
security dataset
120.
security dilemma
121.
Security evaluation
122.
security evaluation instruments
123.
Security limitations
124.
security log analysis
125.
security management
126.
security model
127.
security monitoring
128.
security notion
129.
security objectives
130.
security of data
131.
security of supply
132.
security operation center
133.
security operations center
134.
security patterns
135.
security policy
136.
security problem definition
137.
security proof
138.
security protocols
139.
security requirements
140.
security requirements engineering
141.
security research
142.
security risk assessment
143.
security risk management
144.
security risks
145.
security science and technology
146.
security strategies
147.
security systems for military objects
148.
security testing
149.
security training
150.
security verification
151.
security-by-design
152.
social security planning
153.
societal security
154.
software security
155.
software security subcharacteristics
156.
system of economic security
157.
system security
158.
terrorism security
159.
transmission System Security
160.
voting privacy and security
161.
absolute sea level
162.
airport level of service
163.
arousal level
164.
assurance level
165.
behaviour level test generation
166.
bi-level optimization
167.
CO2 level in classrooms
168.
CO2 level in classrooms and kindergartens
169.
confidence level
170.
country-level logistics
171.
Cross-level Modeling of Faults in Digital Systems
172.
customer compatibility level
173.
deep level
174.
deep level traps
175.
determination of the CO2 level
176.
determining the level of creatine
177.
digitalisation level
178.
distribution-level phasor measurement units (D-PMUs)
179.
education level
180.
exposure level
181.
extreme penetration level of non synchronous generation
182.
extreme sea-level prediction
183.
extreme water level
184.
gate-level analysis
185.
gate-level circuit abstraction
186.
gate-level netlist
187.
graduate level
188.
Hierarchical Multi-level Test Generation
189.
hierarchical two-level analysis
190.
high level DD (HLDD)
191.
high level synthesis
192.
high-level control fault model
193.
high-level control faults
194.
high-level decision diagram
195.
high-level decision diagrams
196.
high-level decision diagrams (HLDD) synthesis
197.
High-level Decision Diagrams for Modeling Digital Systems
198.
high-level expert group on AI
199.
high-level fault coverage
200.
high-level fault model
201.
high-level fault simulation
202.
high-level functional fault model
203.
high-level synthesis
204.
High-Level Synthesis (HLS)
205.
high-level synthesis for test
206.
high-level test data generation
207.
improvement of safety level at enterprises
208.
improvement of safety level at SMEs
209.
lake level
210.
level control
211.
level crossing
212.
level ice
213.
Level of paranoia
214.
level set
215.
level(s) methodology
216.
level-crossing ADC
217.
level-crossing analog-to-digital converters
218.
level-crossing analogue-to-digital converters (ADC)
219.
logic level
220.
lower trophic level models
221.
low-level control system transportation
222.
low-level fault redundancy
223.
low-level radiation
224.
Low-level RF EMF
225.
macro-level industry influences
226.
mean sea level
227.
module level power electronics (MLPE)
228.
module-level power electronics (MLPE)
229.
multi-level governance
230.
multi-level inverter
231.
multi-level leadership
232.
multi-level modeling
233.
multi-level perspective
234.
multi-level perspective of sustainability transitions
235.
multi-level selection and processing environment
236.
noise level
237.
operational level (OL)
238.
Price level
239.
Process/Product Sigma Performance Level (PSPL)
240.
PV module level power electronics
241.
register transfer and gate level simulation
242.
Register Transfer Level - RTL
243.
register transfer level modeling decision diagams
244.
register-transfer level
245.
Register-Transfer Level (RTL)
246.
relative sea level
247.
relative sea level changes
248.
relative sea-level change
249.
RH level
250.
school-level policies
251.
sea level
252.
sea level forecasting
253.
sea level prediction
254.
sea level rise
255.
sea level series
256.
sea level trend
257.
sea level: variations and mean
258.
sea-level
259.
sea-level changes
260.
sea-level equation
261.
Sea-level indicator
262.
sea-level prediction
263.
sea-level rise
264.
sea-level trend
265.
service-level agreements
266.
seven-level multilevel
267.
Sigma performance level
268.
skin conductance level
269.
software level TMR
270.
steel-level bureaucracy
271.
strategic level decision makers
272.
system level
273.
system level hazards
274.
system level simulation
275.
system level test
276.
system planning level
277.
system-level analysis
278.
system-level evaluation
279.
task-level uninterrupted presence
280.
three-level
281.
three-level converter
282.
three-level inverter
283.
three-level neutral-point-clamped inverter
284.
three-level NPC inverter
285.
three-level T-type
286.
three-level T-type inverter
287.
three-level T-type quasi-impedance-source inverter (3L-T-type qZSI)
288.
three-level voltage inverter
289.
Tool Confidence Level
290.
top-level domain
291.
transaction-level modeling
292.
treatment level
293.
two-level inverter
294.
undergraduate level
295.
university level informatics education
296.
water level
297.
water level fluctuation
298.
water level measurements
299.
water level reconstruction
300.
water-level changes
301.
voltage level
302.
voltage level optimisation
303.
3-level T-type inverter
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT