Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(4/232)
Export
export all inquiry results
(5)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
2
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
3
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
4
journal article EST
/
journal article ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
228
1.
Estonian information security standard
2.
information security
3.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
data security
19.
development of security cameras
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
metadata model for security measures
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
Security and political science
62.
security and privacy
63.
security and privacy in smart grids
64.
Security Assertion Mining
65.
security closure
66.
Security Coverage
67.
security dataset
68.
security dilemma
69.
Security evaluation
70.
security evaluation instruments
71.
Security limitations
72.
security log analysis
73.
security management
74.
security model
75.
security monitoring
76.
security notion
77.
security objectives
78.
security of data
79.
security of supply
80.
security operation center
81.
security operations center
82.
security patterns
83.
security policy
84.
security problem definition
85.
security proof
86.
security protocols
87.
security requirements
88.
security requirements engineering
89.
security risk assessment
90.
security risk management
91.
security risks
92.
security strategies
93.
security systems for military objects
94.
security testing
95.
security training
96.
security verification
97.
security-by-design
98.
social security planning
99.
societal security
100.
system of economic security
101.
system security
102.
terrorism security
103.
transmission System Security
104.
voting privacy and security
105.
access to information
106.
age of information
107.
banking information
108.
building information modelling
109.
building information modeling
110.
Building Information Modeling (BIM)
111.
building information modelling
112.
Building Information Modelling (BIM)
113.
Building Information Modelling (BIM) adoption
114.
business information technology
115.
city information modelling (CIM)
116.
communication channels (information theory)
117.
Community Statistics on Information Society (CSIS)
118.
court information system
119.
critical information infrastructure
120.
Data-information-knowledgewisdom (DIKW)
121.
discrete information bottle-neck
122.
dissemination of information
123.
enterprise information systems
124.
Estonian National Health Information System
125.
estonian national health information system (ENHIS)
126.
Estonian nationwide Health Information System (EHIS)
127.
evolutionary information systems
128.
financial information
129.
general theory of information transfer
130.
Geographic Information System (GIS)
131.
geographical information system
132.
health information exchange
133.
health information purpose
134.
health information sharing maturity
135.
health information systems
136.
Healthcare information systems
137.
high-performance computing systems, Information processing
138.
HL7 Version 3: Reference Information Model (RIM)
139.
ICT (information and communication technology)
140.
information
141.
information analysis
142.
information and communication technologies
143.
Information and Communication Technologies (ICT)
144.
Information and communication technologies (ICT) digitalisation
145.
Information and Communication Technologies (ICT) laws
146.
Information and Communication Technologies (ICTs)
147.
Information and Communication Technologies for Development
148.
information and communication technology
149.
information and communication technology (ICT)
150.
information and communications technology
151.
information architecture
152.
information asymmetry
153.
information commons
154.
information communication technology
155.
information content
156.
information control
157.
information dissemination
158.
information economy
159.
information entropy
160.
information exchange
161.
information extraction
162.
information filtering
163.
information flow control
164.
information fusion
165.
information governance
166.
information integration
167.
information literacy
168.
information literacy cooperation
169.
information logistics
170.
information management
171.
information measures
172.
information model
173.
information model-based urban planning
174.
information polity
175.
information potential
176.
information processing
177.
information processing system
178.
information rate
179.
information realities
180.
information retrieval
181.
information revolution
182.
information seeking behaviour
183.
information sharing
184.
information society
185.
Information sufficiency
186.
information system
187.
Information System Authority (RIA)
188.
information systems
189.
information systems development
190.
Information Systems research
191.
information technologies
192.
Information technology
193.
information technology (IT)
194.
information theory
195.
information to individual consumers
196.
information tool
197.
information value
198.
information warfare
199.
information visualization
200.
information volume
201.
Information-seeking activity
202.
intelligent information technology
203.
interoperability and evolutionary criteria of information systems
204.
laboratory information management system (LIMS)
205.
laboratory information management systems
206.
LIMS (laboratory information management systems)
207.
medical information
208.
Medical information policy
209.
middleware (for subscription and distribution of situational information)
210.
mobile information system
211.
multilingual information retrieval
212.
multimodal information
213.
open architecture for information exchange
214.
perception of visual information
215.
performance information
216.
performance information use
217.
philosophy of information
218.
process modeling and information systems within the extended enterprise
219.
quality evaluation of scientific information
220.
real time information
221.
real-time information
222.
Reaxys Chemistry database information
223.
scientific information
224.
SIS II (Schengen Information System II)
225.
traffic information system (TIS)
226.
tree information database
227.
website information
228.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TalTech subject term
1
1.
Building Information Modeling
TalTech department
1
1.
School of Information Technologies
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT