Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
6
Look more..
(4/250)
Export
export all inquiry results
(6)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Artificial intelligence approach to identifying propaganda techniques and objects, taking into account ethical and legal aspects
Molchanova, Maryna
;
Dutt, Pawan Kumar
Computer Systems and Information Technologies
2025
/
p. 97-103
https://doi.org/10.31891/csit-2025-2-11
https://csitjournal.khmnu.edu.ua/index.php/csit/article/view/423
journal article EST
/
journal article ENG
2
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
3
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
4
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
5
journal article EST
/
journal article ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
6
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 6, displaying
1 - 6
keyword
246
1.
data and information security
2.
Estonian information security standard
3.
information security
4.
information security and privacy
5.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
computer security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
data security
21.
development of security cameras
22.
digital security practices
23.
drinking water security
24.
economic security
25.
economic security of enterprise
26.
emotional security
27.
energy security
28.
energy security indicator
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
initial level of security
36.
internal security
37.
international security
38.
investment and innovation security
39.
IPv6 security
40.
IT security
41.
IT security management
42.
job security
43.
long-term security
44.
medium level of security
45.
metadata model for security measures
46.
Middle Eastern security
47.
Mobile security
48.
national cyber security strategy
49.
national security
50.
NATO. Science for Peace and Security Program
51.
network security
52.
network security monitoring
53.
OSCE (Organization for Security and Co-operation in Europe)
54.
passenger’s security
55.
policy-based routing security
56.
political and security cultures
57.
post-quantum security
58.
power system security
59.
quantitative security
60.
regional security
61.
RISC-V Security Verification
62.
Safety and Security in Sea Transportation
63.
safety and security testing
64.
security
65.
security adaptation
66.
security alert prioritization
67.
security analysis
68.
security and justice (AFSJ)
69.
Security and political science
70.
security and privacy
71.
security and privacy in smart grids
72.
Security Assertion Mining
73.
security closure
74.
Security Coverage
75.
security dataset
76.
security dilemma
77.
Security evaluation
78.
security evaluation instruments
79.
Security limitations
80.
security log analysis
81.
security management
82.
security model
83.
security monitoring
84.
security notion
85.
security objectives
86.
security of data
87.
security of supply
88.
security operation center
89.
security operations center
90.
security patterns
91.
security policy
92.
security problem definition
93.
security proof
94.
security protocols
95.
security requirements
96.
security requirements engineering
97.
security risk assessment
98.
security risk management
99.
security risks
100.
security science and technology
101.
security strategies
102.
security systems for military objects
103.
security testing
104.
security training
105.
security verification
106.
security-by-design
107.
social security planning
108.
societal security
109.
software security
110.
software security level
111.
software security subcharacteristics
112.
sufficient level of security
113.
system of economic security
114.
system security
115.
terrorism security
116.
transmission System Security
117.
voting privacy and security
118.
access to information
119.
age of information
120.
banking information
121.
building information modelling
122.
building information modeling
123.
Building Information Modeling (BIM)
124.
building information modelling
125.
Building Information Modelling (BIM)
126.
Building Information Modelling (BIM) adoption
127.
business information technology
128.
city information modelling (CIM)
129.
communication channels (information theory)
130.
Community Statistics on Information Society (CSIS)
131.
court information system
132.
critical information infrastructure
133.
Data-information-knowledgewisdom (DIKW)
134.
discrete information bottle-neck
135.
dissemination of information
136.
enterprise information systems
137.
Estonian National Health Information System
138.
estonian national health information system (ENHIS)
139.
Estonian nationwide Health Information System (EHIS)
140.
evolutionary information systems
141.
financial information
142.
general theory of information transfer
143.
Geographic Information System (GIS)
144.
geographical information system
145.
health information exchange
146.
health information purpose
147.
health information sharing maturity
148.
health information systems
149.
Healthcare information systems
150.
high-performance computing systems, Information processing
151.
HL7 Version 3: Reference Information Model (RIM)
152.
ICT (information and communication technology)
153.
information
154.
information analysis
155.
information and communication technologies
156.
Information and Communication Technologies (ICT)
157.
Information and communication technologies (ICT) digitalisation
158.
Information and Communication Technologies (ICT) laws
159.
Information and Communication Technologies (ICTs)
160.
Information and Communication Technologies for Development
161.
information and communication technology
162.
information and communication technology (ICT)
163.
information and communications technology
164.
information and consultation
165.
information architecture
166.
information asymmetry
167.
information commons
168.
information communication technology
169.
information content
170.
information control
171.
information dissemination
172.
information economy
173.
information entropy
174.
information exchange
175.
information extraction
176.
information filtering
177.
information flow control
178.
information fusion
179.
information governance
180.
information integration
181.
information literacy
182.
information literacy cooperation
183.
information logistics
184.
information management
185.
information measures
186.
information model
187.
information model-based urban planning
188.
information polity
189.
information potential
190.
information preprocessing
191.
information processing
192.
information processing system
193.
information rate
194.
information realities
195.
information retrieval
196.
information revolution
197.
information seeking behaviour
198.
information sharing
199.
information society
200.
Information sufficiency
201.
information system
202.
Information System Authority (RIA)
203.
information systems
204.
information systems development
205.
Information Systems research
206.
information technologies
207.
Information technology
208.
information technology (IT)
209.
information theory
210.
information to individual consumers
211.
information tool
212.
information use
213.
information value
214.
information warfare
215.
information visualization
216.
information volume
217.
Information-seeking activity
218.
intelligent information technology
219.
interoperability and evolutionary criteria of information systems
220.
laboratory information management system (LIMS)
221.
laboratory information management systems
222.
LIMS (laboratory information management systems)
223.
medical information
224.
Medical information policy
225.
middleware (for subscription and distribution of situational information)
226.
mobile information system
227.
multilingual information retrieval
228.
multimodal information
229.
open architecture for information exchange
230.
perception of visual information
231.
performance information
232.
performance information use
233.
philosophy of information
234.
process modeling and information systems within the extended enterprise
235.
provision of information to workers
236.
quality evaluation of scientific information
237.
real time information
238.
real-time information
239.
Reaxys Chemistry database information
240.
scientific information
241.
SIS II (Schengen Information System II)
242.
tactile information
243.
traffic information system (TIS)
244.
tree information database
245.
website information
246.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TalTech subject term
1
1.
Building Information Modeling
TalTech department
1
1.
School of Information Technologies
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT