Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security research (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/224)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Hunting for vulnerabilities : call for European protection of security researchers
Rampašek, Michal
;
Andraško, Jozef
;
Sokol, Pavol
;
Hamulak, Ondrej
Journal of Cybersecurity
2026
/
art. tyag002 ; 18 p
https://doi.org/10.1093/cybsec/tyag002
https://academic.oup.com/cybersecurity/article/12/1/tyag002/8449232
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
219
1.
security research
2.
ad-hoc sensor networks security
3.
Automatic Security Verification
4.
Blockchain security
5.
cache security
6.
communication system security
7.
comprehensive system of economic security
8.
computer security
9.
cooperative security dilemma
10.
cyber security
11.
cyber security education
12.
cyber security exercises
13.
cyber security monitoring
14.
cyber security strategies
15.
cyber-security
16.
data and information security
17.
data security
18.
development of security cameras
19.
digital security practices
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
Estonian information security standard
27.
graded security
28.
hardware security
29.
hardware security primitive
30.
high level of security
31.
Homeland security
32.
human security
33.
information security
34.
information security and privacy
35.
initial level of security
36.
internal security
37.
international security
38.
investment and innovation security
39.
IPv6 security
40.
IT security
41.
IT security management
42.
job security
43.
long-term security
44.
maritime cyber security
45.
maritime cyber security operations centers
46.
Maritime Security Operations Center (M-SOC)
47.
medium level of security
48.
metadata model for security measures
49.
Middle Eastern security
50.
Mobile security
51.
national cyber security strategy
52.
national security
53.
NATO. Science for Peace and Security Program
54.
network security
55.
network security monitoring
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
Safety and Security in Sea Transportation
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion Mining
76.
security closure
77.
Security Coverage
78.
security dataset
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security limitations
83.
security log analysis
84.
security management
85.
security model
86.
security monitoring
87.
security notion
88.
security objectives
89.
security of data
90.
security of supply
91.
security operation center
92.
security operations center
93.
security patterns
94.
security policy
95.
security problem definition
96.
security proof
97.
security protocols
98.
security requirements
99.
security requirements engineering
100.
security risk assessment
101.
security risk management
102.
security risks
103.
security science and technology
104.
security strategies
105.
security systems for military objects
106.
security testing
107.
security training
108.
security verification
109.
security-by-design
110.
social security planning
111.
societal security
112.
software security
113.
software security level
114.
software security subcharacteristics
115.
sufficient level of security
116.
system of economic security
117.
system security
118.
terrorism security
119.
transmission System Security
120.
voting privacy and security
121.
Action design research
122.
action research
123.
agriculture applied research
124.
archival research
125.
biomedical research
126.
business model research
127.
commercialization of publicly funded research
128.
Community-based research
129.
comparative welfare research
130.
contemporary research
131.
critical research
132.
design science research
133.
desk research
134.
economy of research
135.
emerging research
136.
empirical trust research
137.
entrepreneurship research
138.
ergonomic research
139.
EU Horizon 2020 research project GRACE (Integrated oil spill response actions and environmental effects)
140.
European Code of Conduct for Research Integrity
141.
European research area
142.
Fish Research
143.
future research
144.
future research directions
145.
Information Systems research
146.
international research
147.
key research index
148.
longitudinal research
149.
market research
150.
ministry of education and research
151.
mixed method research
152.
new research direction
153.
operations research
154.
ownership research
155.
park research
156.
participatory action research
157.
public research funding
158.
public research groups
159.
public sector accounting research
160.
qualitative research
161.
qualitative research methods
162.
R&D (research and development)
163.
research
164.
research activities
165.
research and development
166.
research and development (R&D)
167.
research and development jobs
168.
research and industrial policy
169.
research and training scenarios
170.
research areas
171.
research avenues
172.
research centre
173.
research challenges
174.
research design
175.
research environment
176.
research ethics
177.
research funding
178.
research gaps
179.
research impact
180.
research infrastructure
181.
research integration
182.
research integrity
183.
research laboratory
184.
research libraries
185.
research methodologies
186.
research methodology
187.
research methodology and method
188.
research methods
189.
research needs
190.
research network
191.
research oriented teaching
192.
research phiosophies
193.
research priority
194.
research programme
195.
research relevance
196.
research strategies
197.
research traditions
198.
research trends
199.
research universities
200.
research with scale-up
201.
research, development and innovation (RDI)
202.
research-based education
203.
research-funding system
204.
research-oriented learning
205.
research-practice gap
206.
responsible research and innovation
207.
retaining research financing, changes in salary rules; new academic career model
208.
retinal pathology/research
209.
scientific research
210.
state of the art research
211.
survey research
212.
The Joint Research Centre (JRC)
213.
training and research tool
214.
transformative service research
215.
urban design research
216.
urban research and innovation
217.
user research
218.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
219.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
märksõna
5
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Consortium for Political Research (ECPR)
4.
Nordic Energy Research
5.
Research and Education in Mechatronics (REM 2008)
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT