Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
6
Look more..
(4/258)
Export
export all inquiry results
(6)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Artificial intelligence approach to identifying propaganda techniques and objects, taking into account ethical and legal aspects
Molchanova, Maryna
;
Dutt, Pawan Kumar
Computer Systems and Information Technologies
2025
/
p. 97-103
https://doi.org/10.31891/csit-2025-2-11
https://csitjournal.khmnu.edu.ua/index.php/csit/article/view/423
journal article EST
/
journal article ENG
2
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
3
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
4
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
5
journal article EST
/
journal article ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
6
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 6, displaying
1 - 6
keyword
254
1.
data and information security
2.
Estonian information security standard
3.
information security
4.
information security and privacy
5.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
cloud security
11.
communication system security
12.
comprehensive system of economic security
13.
computer security
14.
cooperative security dilemma
15.
cyber security
16.
cyber security education
17.
cyber security exercises
18.
cyber security monitoring
19.
cyber security strategies
20.
cyber-security
21.
data security
22.
development of security cameras
23.
digital security practices
24.
drinking water security
25.
economic security
26.
economic security of enterprise
27.
emotional security
28.
energy security
29.
energy security indicator
30.
graded security
31.
hardware security
32.
hardware security primitive
33.
high level of security
34.
Homeland security
35.
human security
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
maritime cyber security
46.
maritime cyber security operations centers
47.
Maritime Security Operations Center (M-SOC)
48.
medium level of security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion
77.
Security Assertion Mining
78.
security closure
79.
Security Coverage
80.
security dataset
81.
security dilemma
82.
Security evaluation
83.
security evaluation instruments
84.
Security Level Evaluation
85.
Security limitations
86.
security log analysis
87.
security management
88.
security model
89.
security monitoring
90.
security notion
91.
security objectives
92.
security of data
93.
security of supply
94.
security operation center
95.
security operations center
96.
security patterns
97.
security policy
98.
security problem definition
99.
security proof
100.
security protocols
101.
security requirements
102.
security requirements engineering
103.
security research
104.
security risk assessment
105.
security risk management
106.
security risks
107.
security science and technology
108.
security strategies
109.
security systems for military objects
110.
security testing
111.
security training
112.
security verification
113.
security-by-design
114.
social security planning
115.
societal security
116.
software security
117.
software security level
118.
software security subcharacteristics
119.
sufficient level of security
120.
system of economic security
121.
system security
122.
terrorism security
123.
transmission System Security
124.
voting privacy and security
125.
access to information
126.
age of information
127.
banking information
128.
building information modelling
129.
building information modeling
130.
Building Information Modeling (BIM)
131.
building information modelling
132.
Building Information Modelling (BIM)
133.
Building Information Modelling (BIM) adoption
134.
business information technology
135.
city information modelling (CIM)
136.
communication channels (information theory)
137.
Community Statistics on Information Society (CSIS)
138.
court information system
139.
critical information infrastructure
140.
Data-information-knowledgewisdom (DIKW)
141.
discrete information bottle-neck
142.
dissemination of information
143.
enterprise information systems
144.
Estonian National Health Information System
145.
estonian national health information system (ENHIS)
146.
Estonian nationwide Health Information System (EHIS)
147.
evolutionary information systems
148.
financial information
149.
general theory of information transfer
150.
Geographic Information System (GIS)
151.
geographical information system
152.
health information exchange
153.
health information purpose
154.
health information sharing maturity
155.
health information systems
156.
Healthcare information systems
157.
high-performance computing systems, Information processing
158.
HL7 Version 3: Reference Information Model (RIM)
159.
ICT (information and communication technology)
160.
information
161.
information analysis
162.
information and communication technologies
163.
Information and Communication Technologies (ICT)
164.
Information and communication technologies (ICT) digitalisation
165.
Information and Communication Technologies (ICT) laws
166.
Information and Communication Technologies (ICTs)
167.
Information and Communication Technologies for Development
168.
information and communication technology
169.
information and communication technology (ICT)
170.
information and communications technology
171.
information and consultation
172.
information architecture
173.
information asymmetry
174.
information commons
175.
information communication technology
176.
information content
177.
information control
178.
information dissemination
179.
information economy
180.
information entropy
181.
information exchange
182.
information extraction
183.
information filtering
184.
information flow control
185.
information fusion
186.
information governance
187.
information integration
188.
information literacy
189.
information literacy cooperation
190.
information logistics
191.
information management
192.
information measures
193.
information model
194.
information model-based urban planning
195.
information polity
196.
information potential
197.
information preprocessing
198.
information processing
199.
information processing system
200.
information rate
201.
information realities
202.
information retrieval
203.
information revolution
204.
information seeking behaviour
205.
information sharing
206.
information society
207.
Information sufficiency
208.
information system
209.
Information System Authority (RIA)
210.
information systems
211.
information systems development
212.
Information Systems research
213.
information technologies
214.
Information technology
215.
information technology (IT)
216.
information theory
217.
information to individual consumers
218.
information tool
219.
information use
220.
information value
221.
information war
222.
information warfare
223.
information visualization
224.
information volume
225.
Information-seeking activity
226.
intelligent information technology
227.
interoperability and evolutionary criteria of information systems
228.
laboratory information management system (LIMS)
229.
laboratory information management systems
230.
LIMS (laboratory information management systems)
231.
medical information
232.
Medical information policy
233.
middleware (for subscription and distribution of situational information)
234.
mobile information system
235.
multilingual information retrieval
236.
multimodal information
237.
open architecture for information exchange
238.
perception of visual information
239.
performance information
240.
performance information use
241.
philosophy of information
242.
process modeling and information systems within the extended enterprise
243.
provision of information to workers
244.
quality evaluation of scientific information
245.
real time information
246.
real-time information
247.
Reaxys Chemistry database information
248.
scientific information
249.
SIS II (Schengen Information System II)
250.
tactile information
251.
traffic information system (TIS)
252.
tree information database
253.
website information
254.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TalTech subject term
1
1.
Building Information Modeling
TalTech department
1
1.
School of Information Technologies
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT