Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
security risks (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/146)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Preventing data-security breaches and patient-safety risks in cross-blockchain e-healthcare systems
Kormiltsõn, Aleksandr
;
Norta, Alex
;
Nisar, Sanam
;
Dwivedi, Vimal
Management of Digital EcoSystems : 15th International Conference, MEDES 2023, Heraklion, Crete, Greece, May 5–7, 2023, Revised Selected Papers
2024
/
p. 41-54
https://doi.org/10.1007/978-3-031-51643-6_4
Conference proceedings at scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
144
1.
security risks
2.
risks knowledge risks
3.
cyber-risks
4.
digitalization risks
5.
environmental risks
6.
ESG risks
7.
geopolitical risks
8.
health risks
9.
identifying risks
10.
knowledge risks
11.
knowledge risks in health-care organizations
12.
market risks
13.
Occupational health risks
14.
off-balance-sheet risks
15.
operational risks
16.
perceived cyber risks and threats
17.
ranked risks
18.
risks
19.
socio-economic risks
20.
systemic risks
21.
Transition risks
22.
uncertain risks
23.
ad-hoc sensor networks security
24.
Automatic Security Verification
25.
Blockchain security
26.
cache security
27.
cloud security
28.
communication system security
29.
comprehensive system of economic security
30.
computer security
31.
cooperative security dilemma
32.
cyber security
33.
cyber security education
34.
cyber security exercises
35.
cyber security monitoring
36.
cyber security strategies
37.
cyber-security
38.
data and information security
39.
data security
40.
development of security cameras
41.
digital security practices
42.
drinking water security
43.
economic security
44.
economic security of enterprise
45.
emotional security
46.
energy security
47.
energy security indicator
48.
Estonian information security standard
49.
graded security
50.
hardware security
51.
hardware security primitive
52.
high level of security
53.
Homeland security
54.
human security
55.
information security
56.
information security and privacy
57.
initial level of security
58.
internal security
59.
international security
60.
investment and innovation security
61.
IPv6 security
62.
IT security
63.
IT security management
64.
job security
65.
long-term security
66.
maritime cyber security
67.
maritime cyber security operations centers
68.
Maritime Security Operations Center (M-SOC)
69.
medium level of security
70.
metadata model for security measures
71.
Middle Eastern security
72.
Mobile security
73.
national cyber security strategy
74.
national security
75.
NATO. Science for Peace and Security Program
76.
network security
77.
network security monitoring
78.
OSCE (Organization for Security and Co-operation in Europe)
79.
passenger’s security
80.
policy-based routing security
81.
political and security cultures
82.
post-quantum security
83.
power system security
84.
quantitative security
85.
regional security
86.
RISC-V Security Verification
87.
Safety and Security in Sea Transportation
88.
safety and security testing
89.
security
90.
security adaptation
91.
security alert prioritization
92.
security analysis
93.
security and justice (AFSJ)
94.
Security and political science
95.
security and privacy
96.
security and privacy in smart grids
97.
Security Assertion
98.
Security Assertion Mining
99.
security closure
100.
Security Coverage
101.
security dataset
102.
security dilemma
103.
Security evaluation
104.
security evaluation instruments
105.
Security Level Evaluation
106.
Security limitations
107.
security log analysis
108.
security management
109.
security model
110.
security monitoring
111.
security notion
112.
security objectives
113.
security of data
114.
security of supply
115.
security operation center
116.
security operations center
117.
security patterns
118.
security policy
119.
security problem definition
120.
security proof
121.
security protocols
122.
security requirements
123.
security requirements engineering
124.
security research
125.
security risk assessment
126.
security risk management
127.
security science and technology
128.
security strategies
129.
security systems for military objects
130.
security testing
131.
security training
132.
security verification
133.
security-by-design
134.
social security planning
135.
societal security
136.
software security
137.
software security level
138.
software security subcharacteristics
139.
sufficient level of security
140.
system of economic security
141.
system security
142.
terrorism security
143.
transmission System Security
144.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT