Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
security operation center (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/170)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
How to build a SOC on a budget
Vaarandi, Risto
;
Mäses, Sten
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
2022
/
p. 171-177 : ill
https://doi.org/10.1109/CSR54599.2022.9850281
book article
Number of records 1, displaying
1 - 1
keyword
163
1.
security operation center
2.
Maritime Security Operations Center (M-SOC)
3.
security operations center
4.
maritime cyber security operations centers
5.
OSCE (Organization for Security and Co-operation in Europe)
6.
autoservice center
7.
center-tapped coupled inductor
8.
data center
9.
data center (DC)
10.
data center applications
11.
daycare center
12.
Municipal Operations Center
13.
Non-emergency Contact Center
14.
shared service center
15.
shared service center (SSC)
16.
underwater data center
17.
urban learning center
18.
alternate operation
19.
boiler transient operation
20.
buckboost operation
21.
buck–boost operation
22.
co-operation
23.
co-operation between member states
24.
cyber operation
25.
cyber operation officer
26.
dynamic operation of heating systems
27.
fault tolerant operation
28.
influence operation
29.
islanded operation
30.
judicial co-operation
31.
maintenance and efficient operation
32.
morphological operation
33.
operation
34.
operation and maintenance
35.
operation costs
36.
operation management
37.
optimal operation strategy
38.
pick-and-place operation
39.
power system operation
40.
protection non operation
41.
regional co-operation
42.
remote operation of vehicles
43.
safe operation
44.
transmission system operation
45.
wide voltage range operation
46.
ad-hoc sensor networks security
47.
Automatic Security Verification
48.
Blockchain security
49.
cache security
50.
cloud security
51.
communication system security
52.
comprehensive system of economic security
53.
computer security
54.
cooperative security dilemma
55.
cyber security
56.
cyber security education
57.
cyber security exercises
58.
cyber security monitoring
59.
cyber security strategies
60.
cyber-security
61.
data and information security
62.
data security
63.
development of security cameras
64.
digital security practices
65.
drinking water security
66.
economic security
67.
economic security of enterprise
68.
emotional security
69.
energy security
70.
energy security indicator
71.
Estonian information security standard
72.
graded security
73.
hardware security
74.
hardware security primitive
75.
high level of security
76.
Homeland security
77.
human security
78.
information security
79.
information security and privacy
80.
initial level of security
81.
internal security
82.
international security
83.
investment and innovation security
84.
IPv6 security
85.
IT security
86.
IT security management
87.
job security
88.
long-term security
89.
maritime cyber security
90.
medium level of security
91.
metadata model for security measures
92.
Middle Eastern security
93.
Mobile security
94.
national cyber security strategy
95.
national security
96.
NATO. Science for Peace and Security Program
97.
network security
98.
network security monitoring
99.
passenger’s security
100.
policy-based routing security
101.
political and security cultures
102.
post-quantum security
103.
power system security
104.
quantitative security
105.
regional security
106.
RISC-V Security Verification
107.
Safety and Security in Sea Transportation
108.
safety and security testing
109.
security
110.
security adaptation
111.
security alert prioritization
112.
security analysis
113.
security and justice (AFSJ)
114.
Security and political science
115.
security and privacy
116.
security and privacy in smart grids
117.
Security Assertion
118.
Security Assertion Mining
119.
security closure
120.
Security Coverage
121.
security dataset
122.
security dilemma
123.
Security evaluation
124.
security evaluation instruments
125.
Security Level Evaluation
126.
Security limitations
127.
security log analysis
128.
security management
129.
security model
130.
security monitoring
131.
security notion
132.
security objectives
133.
security of data
134.
security of supply
135.
security patterns
136.
security policy
137.
security problem definition
138.
security proof
139.
security protocols
140.
security requirements
141.
security requirements engineering
142.
security research
143.
security risk assessment
144.
security risk management
145.
security risks
146.
security science and technology
147.
security strategies
148.
security systems for military objects
149.
security testing
150.
security training
151.
security verification
152.
security-by-design
153.
social security planning
154.
societal security
155.
software security
156.
software security level
157.
software security subcharacteristics
158.
sufficient level of security
159.
system of economic security
160.
system security
161.
terrorism security
162.
transmission System Security
163.
voting privacy and security
subject term
7
1.
Baltic Monitoring and Forecasting Center (BALMFC)
2.
Estonian Center for Safe and Trustworthy Artificial Intelligence (ECSTAI)
3.
FinEst Center for Smart Cities
4.
The Center for European Integration Studies
5.
UNDP Urban Learning Center
6.
National Computer Security Incident Response Teams (N-CSIRTs)
7.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT