Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
6
Look more..
(4/254)
Export
export all inquiry results
(6)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Artificial intelligence approach to identifying propaganda techniques and objects, taking into account ethical and legal aspects
Molchanova, Maryna
;
Dutt, Pawan Kumar
Computer Systems and Information Technologies
2025
/
p. 97-103
https://doi.org/10.31891/csit-2025-2-11
https://csitjournal.khmnu.edu.ua/index.php/csit/article/view/423
journal article EST
/
journal article ENG
2
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
3
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
4
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
5
journal article EST
/
journal article ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
6
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 6, displaying
1 - 6
keyword
250
1.
data and information security
2.
Estonian information security standard
3.
information security
4.
information security and privacy
5.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
computer security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
data security
21.
development of security cameras
22.
digital security practices
23.
drinking water security
24.
economic security
25.
economic security of enterprise
26.
emotional security
27.
energy security
28.
energy security indicator
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
initial level of security
36.
internal security
37.
international security
38.
investment and innovation security
39.
IPv6 security
40.
IT security
41.
IT security management
42.
job security
43.
long-term security
44.
maritime cyber security
45.
maritime cyber security operations centers
46.
Maritime Security Operations Center (M-SOC)
47.
medium level of security
48.
metadata model for security measures
49.
Middle Eastern security
50.
Mobile security
51.
national cyber security strategy
52.
national security
53.
NATO. Science for Peace and Security Program
54.
network security
55.
network security monitoring
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
Safety and Security in Sea Transportation
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion Mining
76.
security closure
77.
Security Coverage
78.
security dataset
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security limitations
83.
security log analysis
84.
security management
85.
security model
86.
security monitoring
87.
security notion
88.
security objectives
89.
security of data
90.
security of supply
91.
security operation center
92.
security operations center
93.
security patterns
94.
security policy
95.
security problem definition
96.
security proof
97.
security protocols
98.
security requirements
99.
security requirements engineering
100.
security research
101.
security risk assessment
102.
security risk management
103.
security risks
104.
security science and technology
105.
security strategies
106.
security systems for military objects
107.
security testing
108.
security training
109.
security verification
110.
security-by-design
111.
social security planning
112.
societal security
113.
software security
114.
software security level
115.
software security subcharacteristics
116.
sufficient level of security
117.
system of economic security
118.
system security
119.
terrorism security
120.
transmission System Security
121.
voting privacy and security
122.
access to information
123.
age of information
124.
banking information
125.
building information modelling
126.
building information modeling
127.
Building Information Modeling (BIM)
128.
building information modelling
129.
Building Information Modelling (BIM)
130.
Building Information Modelling (BIM) adoption
131.
business information technology
132.
city information modelling (CIM)
133.
communication channels (information theory)
134.
Community Statistics on Information Society (CSIS)
135.
court information system
136.
critical information infrastructure
137.
Data-information-knowledgewisdom (DIKW)
138.
discrete information bottle-neck
139.
dissemination of information
140.
enterprise information systems
141.
Estonian National Health Information System
142.
estonian national health information system (ENHIS)
143.
Estonian nationwide Health Information System (EHIS)
144.
evolutionary information systems
145.
financial information
146.
general theory of information transfer
147.
Geographic Information System (GIS)
148.
geographical information system
149.
health information exchange
150.
health information purpose
151.
health information sharing maturity
152.
health information systems
153.
Healthcare information systems
154.
high-performance computing systems, Information processing
155.
HL7 Version 3: Reference Information Model (RIM)
156.
ICT (information and communication technology)
157.
information
158.
information analysis
159.
information and communication technologies
160.
Information and Communication Technologies (ICT)
161.
Information and communication technologies (ICT) digitalisation
162.
Information and Communication Technologies (ICT) laws
163.
Information and Communication Technologies (ICTs)
164.
Information and Communication Technologies for Development
165.
information and communication technology
166.
information and communication technology (ICT)
167.
information and communications technology
168.
information and consultation
169.
information architecture
170.
information asymmetry
171.
information commons
172.
information communication technology
173.
information content
174.
information control
175.
information dissemination
176.
information economy
177.
information entropy
178.
information exchange
179.
information extraction
180.
information filtering
181.
information flow control
182.
information fusion
183.
information governance
184.
information integration
185.
information literacy
186.
information literacy cooperation
187.
information logistics
188.
information management
189.
information measures
190.
information model
191.
information model-based urban planning
192.
information polity
193.
information potential
194.
information preprocessing
195.
information processing
196.
information processing system
197.
information rate
198.
information realities
199.
information retrieval
200.
information revolution
201.
information seeking behaviour
202.
information sharing
203.
information society
204.
Information sufficiency
205.
information system
206.
Information System Authority (RIA)
207.
information systems
208.
information systems development
209.
Information Systems research
210.
information technologies
211.
Information technology
212.
information technology (IT)
213.
information theory
214.
information to individual consumers
215.
information tool
216.
information use
217.
information value
218.
information warfare
219.
information visualization
220.
information volume
221.
Information-seeking activity
222.
intelligent information technology
223.
interoperability and evolutionary criteria of information systems
224.
laboratory information management system (LIMS)
225.
laboratory information management systems
226.
LIMS (laboratory information management systems)
227.
medical information
228.
Medical information policy
229.
middleware (for subscription and distribution of situational information)
230.
mobile information system
231.
multilingual information retrieval
232.
multimodal information
233.
open architecture for information exchange
234.
perception of visual information
235.
performance information
236.
performance information use
237.
philosophy of information
238.
process modeling and information systems within the extended enterprise
239.
provision of information to workers
240.
quality evaluation of scientific information
241.
real time information
242.
real-time information
243.
Reaxys Chemistry database information
244.
scientific information
245.
SIS II (Schengen Information System II)
246.
tactile information
247.
traffic information system (TIS)
248.
tree information database
249.
website information
250.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TalTech subject term
1
1.
Building Information Modeling
TalTech department
1
1.
School of Information Technologies
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT