Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/211)
Export
export all inquiry results
(5)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
2
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
3
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
4
journal article EST
/
journal article ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
208
1.
information security
2.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security strategies
15.
cyber-security
16.
data security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
graded security
25.
hardware security
26.
hardware security primitive
27.
human security
28.
internal security
29.
international security
30.
investment and innovation security
31.
IPv6 security
32.
IT security
33.
IT security management
34.
job security
35.
long-term security
36.
metadata model for security measures
37.
Middle Eastern security
38.
Mobile security
39.
national cyber security strategy
40.
national security
41.
NATO. Science for Peace and Security Program
42.
network security
43.
network security monitoring
44.
OSCE (Organization for Security and Co-operation in Europe)
45.
passenger’s security
46.
policy-based routing security
47.
political and security cultures
48.
post-quantum security
49.
power system security
50.
quantitative security
51.
regional security
52.
RISC-V Security Verification
53.
security
54.
security and privacy
55.
security and privacy in smart grids
56.
Security Assertion Mining
57.
security closure
58.
Security Coverage
59.
security dataset
60.
security dilemma
61.
Security evaluation
62.
security log analysis
63.
security management
64.
security model
65.
security monitoring
66.
security notion
67.
security objectives
68.
security of data
69.
security of supply
70.
security operation center
71.
security patterns
72.
security policy
73.
security problem definition
74.
security proof
75.
security protocols
76.
security requirements
77.
security requirements engineering
78.
security risk assessment
79.
security risk management
80.
security strategies
81.
security systems for military objects
82.
security testing
83.
security training
84.
security verification
85.
social security planning
86.
societal security
87.
system of economic security
88.
system security
89.
terrorism security
90.
transmission System Security
91.
voting privacy and security
92.
access to information
93.
age of information
94.
banking information
95.
building information modelling
96.
building information modeling
97.
Building Information Modeling (BIM)
98.
building information modelling
99.
Building Information Modelling (BIM)
100.
Building Information Modelling (BIM) adoption
101.
business information technology
102.
city information modelling (CIM)
103.
communication channels (information theory)
104.
Community Statistics on Information Society (CSIS)
105.
court information system
106.
critical information infrastructure
107.
Data-information-knowledgewisdom (DIKW)
108.
discrete information bottle-neck
109.
dissemination of information
110.
enterprise information systems
111.
Estonian National Health Information System
112.
Estonian nationwide Health Information System (EHIS)
113.
evolutionary information systems
114.
financial information
115.
general theory of information transfer
116.
Geographic Information System (GIS)
117.
Geographic Information Systems (GIS)
118.
geographical information system
119.
health information exchange
120.
health information systems
121.
Healthcare information systems
122.
high-performance computing systems, Information processing
123.
HL7 Version 3: Reference Information Model (RIM)
124.
ICT (information and communication technology)
125.
information
126.
information and communication technologies
127.
Information and communication technologies (ICT) digitalisation
128.
Information and Communication Technologies (ICT) laws
129.
Information and Communication Technologies (ICTs)
130.
Information and Communication Technologies for Development
131.
information and communication technology
132.
information and communication technology (ICT)
133.
information and communications technology
134.
information architecture
135.
information asymmetry
136.
information commons
137.
information communication technology
138.
information content
139.
information control
140.
information dissemination
141.
information economy
142.
information entropy
143.
information exchange
144.
information extraction
145.
information flow control
146.
information fusion
147.
information governance
148.
information integration
149.
information literacy
150.
information literacy cooperation
151.
information logistics
152.
information management
153.
information measures
154.
information model
155.
information model-based urban planning
156.
information polity
157.
information potential
158.
information processing
159.
information processing system
160.
information rate
161.
information realities
162.
information retrieval
163.
information revolution
164.
information seeking behaviour
165.
information sharing
166.
information society
167.
Information sufficiency
168.
information system
169.
Information System Authority (RIA)
170.
information systems
171.
information systems development
172.
Information Systems research
173.
information technologies
174.
Information technology
175.
information technology (IT)
176.
information theory
177.
information to individual consumers
178.
information tool
179.
information value
180.
information warfare
181.
information visualization
182.
Information-seeking activity
183.
intelligent information technology
184.
interoperability and evolutionary criteria of information systems
185.
laboratory information management system (LIMS)
186.
laboratory information management systems
187.
LIMS (laboratory information management systems)
188.
medical information
189.
Medical information policy
190.
middleware (for subscription and distribution of situational information)
191.
mobile information system
192.
multilingual information retrieval
193.
multimodal information
194.
open architecture for information exchange
195.
perception of visual information
196.
performance information
197.
performance information use
198.
philosophy of information
199.
process modeling and information systems within the extended enterprise
200.
quality evaluation of scientific information
201.
real time information
202.
real-time information
203.
Reaxys Chemistry database information
204.
scientific information
205.
SIS II (Schengen Information System II)
206.
traffic information system (TIS)
207.
website information
208.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ subject term
1
1.
Building Information Modeling
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT