Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
computer security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
7
Look more..
(2/182)
Export
export all inquiry results
(7)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
Are the current system engineering practices sufficient to meet cyber crime?
Buldas, Ahto
;
Saarepera, Märt
Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017 : held as part of HCI International 2017, Vancouver, BC, Canada, July 9–14, 2017 : proceedings
2017
/
p. 451-463
https://doi.org/10.1007/978-3-319-58460-7_31
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
book article
EU cybersecurity governance – stakeholders and normative intentions towards integration
Kasper, Agnes
The future of the European Union : demisting the debate
2020
/
p. 166−185
https://www.um.edu.mt/library/oar/handle/123456789/52308
https://www.um.edu.mt/library/oar/bitstream/123456789/52308/1/EU_cybersecurity_governance%e2%80%93stakeholders_and_normative_intentions_towards_integration_2020.pdf
book article
5
book article EST
/
book article ENG
Preface
Bellatreche, Ladjel
;
Chernishev, George
;
Corral, Antonio
;
Ouchani, Samir
;
Vain, Jüri
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
/
p. v-vii
https://link.springer.com/content/pdf/bfm:978-3-030-87657-9/1?pdf=chapter%20toc
Article collection metrics at Scopus
Article at Scopus
book article EST
/
book article ENG
6
book article
The becoming of cyber-military capabilities
Salminen, Mikko
;
Kerttunen, Mika
Routledge handbook of international cybersecurity
2020
/
p. 94-107
https://www.ester.ee/record=b5308475*est
book article
7
book article
Towards a Cyber Maastricht : two steps forward, one step back
Kasper, Agnes
;
Vernygora, Vlad Alex
The future of the European Union : demisting the debate
2020
/
p. 186-210
https://www.um.edu.mt/library/oar/handle/123456789/52310
https://www.um.edu.mt/library/oar/bitstream/123456789/52310/1/Towards_a_%e2%80%98Cyber_Maastricht%e2%80%99_two_steps_forward_one_step_back_2020.pdf
book article
Number of records 7, displaying
1 - 7
keyword
178
1.
computer security
2.
ad-hoc sensor networks security
3.
Automatic Security Verification
4.
Blockchain security
5.
cache security
6.
communication system security
7.
comprehensive system of economic security
8.
cooperative security dilemma
9.
cyber security
10.
cyber security education
11.
cyber security exercises
12.
cyber security strategies
13.
cyber-security
14.
data security
15.
development of security cameras
16.
drinking water security
17.
economic security
18.
economic security of enterprise
19.
emotional security
20.
energy security
21.
energy security indicator
22.
Estonian information security standard
23.
graded security
24.
hardware security
25.
hardware security primitive
26.
human security
27.
information security
28.
internal security
29.
international security
30.
investment and innovation security
31.
IPv6 security
32.
IT security
33.
IT security management
34.
job security
35.
long-term security
36.
metadata model for security measures
37.
Middle Eastern security
38.
Mobile security
39.
national cyber security strategy
40.
national security
41.
NATO. Science for Peace and Security Program
42.
network security
43.
network security monitoring
44.
OSCE (Organization for Security and Co-operation in Europe)
45.
passenger’s security
46.
policy-based routing security
47.
political and security cultures
48.
post-quantum security
49.
power system security
50.
quantitative security
51.
regional security
52.
RISC-V Security Verification
53.
safety and security testing
54.
security
55.
security adaptation
56.
security alert prioritization
57.
security analysis
58.
security and justice (AFSJ)
59.
security and privacy
60.
security and privacy in smart grids
61.
Security Assertion Mining
62.
security closure
63.
Security Coverage
64.
security dataset
65.
security dilemma
66.
Security evaluation
67.
security evaluation instruments
68.
security log analysis
69.
security management
70.
security model
71.
security monitoring
72.
security notion
73.
security objectives
74.
security of data
75.
security of supply
76.
security operation center
77.
security operations center
78.
security patterns
79.
security policy
80.
security problem definition
81.
security proof
82.
security protocols
83.
security requirements
84.
security requirements engineering
85.
security risk assessment
86.
security risk management
87.
security strategies
88.
security systems for military objects
89.
security testing
90.
security training
91.
security verification
92.
security-by-design
93.
social security planning
94.
societal security
95.
system of economic security
96.
system security
97.
terrorism security
98.
transmission System Security
99.
voting privacy and security
100.
computer
101.
computer aided design
102.
computer aided diagnosis
103.
computer aided diagnostics
104.
computer aided instruction
105.
computer aided language translation
106.
computer aided manufacturing
107.
computer aided testing
108.
computer algebra
109.
computer algebra system
110.
computer and education
111.
computer anxiety
112.
computer architecture
113.
computer assisted language learning
114.
computer based learning
115.
computer circuits
116.
computer control
117.
Computer crime
118.
computer education
119.
computer engineering
120.
computer engineerng
121.
computer game
122.
computer graphics
123.
computer hardware
124.
computer integrated manufacturing
125.
computer network management
126.
computer network operations
127.
computer networks
128.
computer pipelines
129.
computer programming
130.
computer programs
131.
computer science
132.
computer science basics
133.
computer science education
134.
computer simulation
135.
computer simulation environments
136.
computer simulations
137.
computer software
138.
computer softwaregraph theory
139.
computer systems
140.
Computer systems organization
141.
computer terminals
142.
computer vision
143.
computer workers
144.
computer-aided anthropometry
145.
computer-aided architectural design (CAAD)
146.
computer‐aided assessment
147.
computer-aided design
148.
computer-aided detection
149.
computer‐aided detection
150.
computer-aided diagnosis
151.
computer-aided drawing (CAD)
152.
computer-aided engineering
153.
computer-aided teaching
154.
Computer-Aided Tuning
155.
computer-aided tuning (CAT)
156.
computer-assisted language learning (CALL)
157.
computer-oriented technologies
158.
computer-supported decision-making
159.
computer-use
160.
control engineering computer applications
161.
distributed computer systems
162.
education in computer engineering
163.
fifth generation computer
164.
gateways (computer networks)
165.
high-performance computer systems
166.
human computer interaction
167.
human computer interaction (HCI)
168.
human-computer interaction
169.
Human-Computer Interaction (HCI)
170.
human-computer trust
171.
interactive computer graphics
172.
laptop computer
173.
logic in computer science
174.
single board computer
175.
single-board computer
176.
structure computer analysis
177.
ubiquitous computer technology
178.
Web and computer-based learning
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Computer Systems
4.
Estonian Summer School on Computer and Systems Science, 2023
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT