Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
computer security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
7
Vaata veel..
(2/167)
Ekspordi
ekspordi kõik päringu tulemused
(7)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
artikkel kogumikus
Are the current system engineering practices sufficient to meet cyber crime?
Buldas, Ahto
;
Saarepera, Märt
Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017 : held as part of HCI International 2017, Vancouver, BC, Canada, July 9–14, 2017 : proceedings
2017
/
p. 451-463
http://doi.org/10.1007/978-3-319-58460-7_31
artikkel kogumikus
3
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
4
artikkel kogumikus
EU cybersecurity governance – stakeholders and normative intentions towards integration
Kasper, Agnes
The future of the European Union : demisting the debate
2020
/
p. 166−185
https://www.um.edu.mt/library/oar/handle/123456789/52308
https://www.um.edu.mt/library/oar/bitstream/123456789/52308/1/EU_cybersecurity_governance%e2%80%93stakeholders_and_normative_intentions_towards_integration_2020.pdf
artikkel kogumikus
5
artikkel kogumikus EST
/
artikkel kogumikus ENG
Preface
Bellatreche, Ladjel
;
Chernishev, George
;
Corral, Antonio
;
Ouchani, Samir
;
Vain, Jüri
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
/
p. v-vii
https://link.springer.com/content/pdf/bfm:978-3-030-87657-9/1?pdf=chapter%20toc
Article collection metrics at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
6
artikkel kogumikus
The becoming of cyber-military capabilities
Salminen, Mikko
;
Kerttunen, Mika
Routledge handbook of international cybersecurity
2020
/
p. 94-107
https://www.ester.ee/record=b5308475*est
artikkel kogumikus
7
artikkel kogumikus
Towards a Cyber Maastricht : two steps forward, one step back
Kasper, Agnes
;
Vernygora, Vlad Alex
The future of the European Union : demisting the debate
2020
/
p. 186-210
https://www.um.edu.mt/library/oar/handle/123456789/52310
https://www.um.edu.mt/library/oar/bitstream/123456789/52310/1/Towards_a_%e2%80%98Cyber_Maastricht%e2%80%99_two_steps_forward_one_step_back_2020.pdf
artikkel kogumikus
Kirjeid leitud 7, kuvan
1 - 7
võtmesõna
163
1.
computer security
2.
ad-hoc sensor networks security
3.
Automatic Security Verification
4.
Blockchain security
5.
cache security
6.
communication system security
7.
comprehensive system of economic security
8.
cooperative security dilemma
9.
cyber security
10.
cyber security education
11.
cyber security exercises
12.
cyber security strategies
13.
cyber-security
14.
data security
15.
development of security cameras
16.
drinking water security
17.
economic security
18.
economic security of enterprise
19.
emotional security
20.
energy security
21.
energy security indicator
22.
graded security
23.
hardware security
24.
hardware security primitive
25.
human security
26.
information security
27.
internal security
28.
international security
29.
investment and innovation security
30.
IPv6 security
31.
IT security
32.
job security
33.
long-term security
34.
metadata model for security measures
35.
Middle Eastern security
36.
Mobile security
37.
national cyber security strategy
38.
national security
39.
NATO. Science for Peace and Security Program
40.
network security
41.
network security monitoring
42.
OSCE (Organization for Security and Co-operation in Europe)
43.
passenger’s security
44.
policy-based routing security
45.
political and security cultures
46.
post-quantum security
47.
power system security
48.
quantitative security
49.
regional security
50.
RISC-V Security Verification
51.
security
52.
security and privacy
53.
security and privacy in smart grids
54.
Security Assertion Mining
55.
security closure
56.
Security Coverage
57.
security dataset
58.
security dilemma
59.
Security evaluation
60.
security log analysis
61.
security management
62.
security model
63.
security monitoring
64.
security notion
65.
security objectives
66.
security of data
67.
security of supply
68.
security operation center
69.
security patterns
70.
security problem definition
71.
security proof
72.
security protocols
73.
security requirements
74.
security requirements engineering
75.
security risk assessment
76.
security risk management
77.
security strategies
78.
security systems for military objects
79.
security testing
80.
security training
81.
security verification
82.
social security planning
83.
societal security
84.
system of economic security
85.
system security
86.
terrorism security
87.
transmission System Security
88.
voting privacy and security
89.
computer
90.
computer aided design
91.
computer aided diagnosis
92.
computer aided diagnostics
93.
computer aided instruction
94.
computer aided manufacturing
95.
computer aided testing
96.
computer algebra
97.
computer algebra system
98.
computer and education
99.
computer anxiety
100.
computer architecture
101.
computer assisted language learning
102.
computer based learning
103.
computer circuits
104.
computer control
105.
computer education
106.
computer engineering
107.
computer engineerng
108.
computer game
109.
computer graphics
110.
computer hardware
111.
computer integrated manufacturing
112.
computer network management
113.
computer network operations
114.
computer networks
115.
computer pipelines
116.
computer programming
117.
computer programs
118.
computer science
119.
computer science basics
120.
computer science education
121.
computer simulation
122.
computer simulation environments
123.
computer simulations
124.
computer software
125.
computer softwaregraph theory
126.
computer systems
127.
computer terminals
128.
computer vision
129.
computer workers
130.
computer-aided anthropometry
131.
computer-aided architectural design (CAAD)
132.
computer‐aided assessment
133.
computer-aided design
134.
computer-aided detection
135.
computer‐aided detection
136.
computer-aided diagnosis
137.
computer-aided drawing (CAD)
138.
computer-aided engineering
139.
computer-aided teaching
140.
Computer-Aided Tuning
141.
computer-aided tuning (CAT)
142.
computer-assisted language learning (CALL)
143.
computer-oriented technologies
144.
computer-supported decision-making
145.
computer-use
146.
control engineering computer applications
147.
distributed computer systems
148.
education in computer engineering
149.
fifth generation computer
150.
gateways (computer networks)
151.
high-performance computer systems
152.
human computer interaction
153.
human computer interaction (HCI)
154.
human-computer interaction
155.
Human-Computer Interaction (HCI)
156.
interactive computer graphics
157.
laptop computer
158.
logic in computer science
159.
single board computer
160.
single-board computer
161.
structure computer analysis
162.
ubiquitous computer technology
163.
Web and computer-based learning
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Computer Systems
4.
Estonian Summer School on Computer and Systems Science, 2023
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT