Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
IT security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/120)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Implementation of information security in the EU information systems : an Estonian case study
Järvsoo, Maris
;
Norta, Alexander
;
Tsap, Valentyna
;
Pappel, Ingrid
;
Draheim, Dirk
Challenges and Opportunities in the Digital Era : 17th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society : I3E 2018, Kuwait City, Kuwait, October 30 - November 1, 2018 : proceedings
2018
/
p. 150-163
https://doi.org/10.1007/978-3-030-02131-3_15
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
2
book article EST
/
book article ENG
Key factors in coping with large-scale security vulnerabilities in the eID field
Lips, Silvia
;
Pappel, Ingrid
;
Tsap, Valentyna
;
Draheim, Dirk
Electronic Government and the Information Systems Perspective :7th International Conference, EGOVIS 2018, Regensburg, Germany, September 3–5, 2018 : proceedings
2018
/
p. 60-70
https://doi.org/10.1007/978-3-319-98349-3_5
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
Related publications
2
eID public acceptance : success factors, citizen perception, and impact of electronic identity = eID avalik aktsepteerimine : edutegurid, kodanike pertseptsioon ja elektroonilise identiteedi mõju
A multifaceted assessment framework for electronic identity schemes = Elektrooniliste autentimisskeemide mitmetahuline hindamise raamistik
Number of records 2, displaying
1 - 2
keyword
118
1.
ad-hoc sensor networks security
2.
Automatic Security Verification
3.
Blockchain security
4.
cache security
5.
communication system security
6.
comprehensive system of economic security
7.
computer security
8.
cooperative security dilemma
9.
cyber security
10.
cyber security education
11.
cyber security exercises
12.
cyber security monitoring
13.
cyber security strategies
14.
cyber-security
15.
data and information security
16.
data security
17.
development of security cameras
18.
digital security practices
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
high level of security
30.
Homeland security
31.
human security
32.
information security
33.
information security and privacy
34.
initial level of security
35.
internal security
36.
international security
37.
investment and innovation security
38.
IPv6 security
39.
IT security
40.
IT security management
41.
job security
42.
long-term security
43.
medium level of security
44.
metadata model for security measures
45.
Middle Eastern security
46.
Mobile security
47.
national cyber security strategy
48.
national security
49.
NATO. Science for Peace and Security Program
50.
network security
51.
network security monitoring
52.
OSCE (Organization for Security and Co-operation in Europe)
53.
passenger’s security
54.
policy-based routing security
55.
political and security cultures
56.
post-quantum security
57.
power system security
58.
quantitative security
59.
regional security
60.
RISC-V Security Verification
61.
Safety and Security in Sea Transportation
62.
safety and security testing
63.
security
64.
security adaptation
65.
security alert prioritization
66.
security analysis
67.
security and justice (AFSJ)
68.
Security and political science
69.
security and privacy
70.
security and privacy in smart grids
71.
Security Assertion Mining
72.
security closure
73.
Security Coverage
74.
security dataset
75.
security dilemma
76.
Security evaluation
77.
security evaluation instruments
78.
Security limitations
79.
security log analysis
80.
security management
81.
security model
82.
security monitoring
83.
security notion
84.
security objectives
85.
security of data
86.
security of supply
87.
security operation center
88.
security operations center
89.
security patterns
90.
security policy
91.
security problem definition
92.
security proof
93.
security protocols
94.
security requirements
95.
security requirements engineering
96.
security risk assessment
97.
security risk management
98.
security risks
99.
security science and technology
100.
security strategies
101.
security systems for military objects
102.
security testing
103.
security training
104.
security verification
105.
security-by-design
106.
social security planning
107.
societal security
108.
software security
109.
software security level
110.
software security subcharacteristics
111.
sufficient level of security
112.
system of economic security
113.
system security
114.
terrorism security
115.
transmission System Security
116.
voting privacy and security
117.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
118.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT