Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Information and information security (title)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(4/255)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Information and information security
Henno, Jaak
Third Workshop on Software Quality Analysis, Monitoring, Improvement and Applications SQAMIA 2014 : Lovran, Croatia, September 19-22, 2014 : proceedings
2014
/
p. 23-28 : ill
https://ceur-ws.org/Vol-1266/SQAMIA2014Proceedings.pdf
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
2
book article EST
/
book article ENG
Information and information security
Henno, Jaak
Information modelling and knowledge bases XXVII
2016
/
p. 103-120
https://doi.org/10.3233/978-1-61499-611-8-103
Article collection metrics at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Number of records 2, displaying
1 - 2
keyword
251
1.
data and information security
2.
Estonian information security standard
3.
information security and privacy
4.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
5.
information security
6.
access to information
7.
age of information
8.
banking information
9.
building information modelling
10.
building information modeling
11.
Building Information Modeling (BIM)
12.
building information modelling
13.
Building Information Modelling (BIM)
14.
Building Information Modelling (BIM) adoption
15.
business information technology
16.
city information modelling (CIM)
17.
communication channels (information theory)
18.
Community Statistics on Information Society (CSIS)
19.
court information system
20.
critical information infrastructure
21.
Data-information-knowledgewisdom (DIKW)
22.
discrete information bottle-neck
23.
dissemination of information
24.
enterprise information systems
25.
Estonian National Health Information System
26.
estonian national health information system (ENHIS)
27.
Estonian nationwide Health Information System (EHIS)
28.
evolutionary information systems
29.
financial information
30.
general theory of information transfer
31.
Geographic Information System (GIS)
32.
geographical information system
33.
health information exchange
34.
health information purpose
35.
health information sharing maturity
36.
health information systems
37.
Healthcare information systems
38.
high-performance computing systems, Information processing
39.
HL7 Version 3: Reference Information Model (RIM)
40.
ICT (information and communication technology)
41.
information
42.
information analysis
43.
information and communication technologies
44.
Information and Communication Technologies (ICT)
45.
Information and communication technologies (ICT) digitalisation
46.
Information and Communication Technologies (ICT) laws
47.
Information and Communication Technologies (ICTs)
48.
Information and Communication Technologies for Development
49.
information and communication technology
50.
information and communication technology (ICT)
51.
information and communications technology
52.
information and consultation
53.
information architecture
54.
information asymmetry
55.
information commons
56.
information communication technology
57.
information content
58.
information control
59.
information dissemination
60.
information economy
61.
information entropy
62.
information exchange
63.
information extraction
64.
information filtering
65.
information flow control
66.
information fusion
67.
information governance
68.
information integration
69.
information literacy
70.
information literacy cooperation
71.
information logistics
72.
information management
73.
information measures
74.
information model
75.
information model-based urban planning
76.
information polity
77.
information potential
78.
information preprocessing
79.
information processing
80.
information processing system
81.
information rate
82.
information realities
83.
information retrieval
84.
information revolution
85.
information seeking behaviour
86.
information sharing
87.
information society
88.
Information sufficiency
89.
information system
90.
Information System Authority (RIA)
91.
information systems
92.
information systems development
93.
Information Systems research
94.
information technologies
95.
Information technology
96.
information technology (IT)
97.
information theory
98.
information to individual consumers
99.
information tool
100.
information use
101.
information value
102.
information war
103.
information warfare
104.
information visualization
105.
information volume
106.
Information-seeking activity
107.
intelligent information technology
108.
interoperability and evolutionary criteria of information systems
109.
laboratory information management system (LIMS)
110.
laboratory information management systems
111.
LIMS (laboratory information management systems)
112.
medical information
113.
Medical information policy
114.
middleware (for subscription and distribution of situational information)
115.
mobile information system
116.
multilingual information retrieval
117.
multimodal information
118.
open architecture for information exchange
119.
perception of visual information
120.
performance information
121.
performance information use
122.
philosophy of information
123.
process modeling and information systems within the extended enterprise
124.
provision of information to workers
125.
quality evaluation of scientific information
126.
real time information
127.
real-time information
128.
Reaxys Chemistry database information
129.
scientific information
130.
SIS II (Schengen Information System II)
131.
tactile information
132.
traffic information system (TIS)
133.
tree information database
134.
website information
135.
VIS (Visa Information System)
136.
ad-hoc sensor networks security
137.
Automatic Security Verification
138.
Blockchain security
139.
cache security
140.
communication system security
141.
comprehensive system of economic security
142.
computer security
143.
cooperative security dilemma
144.
cyber security
145.
cyber security education
146.
cyber security exercises
147.
cyber security monitoring
148.
cyber security strategies
149.
cyber-security
150.
data security
151.
development of security cameras
152.
digital security practices
153.
drinking water security
154.
economic security
155.
economic security of enterprise
156.
emotional security
157.
energy security
158.
energy security indicator
159.
graded security
160.
hardware security
161.
hardware security primitive
162.
high level of security
163.
Homeland security
164.
human security
165.
initial level of security
166.
internal security
167.
international security
168.
investment and innovation security
169.
IPv6 security
170.
IT security
171.
IT security management
172.
job security
173.
long-term security
174.
maritime cyber security
175.
maritime cyber security operations centers
176.
Maritime Security Operations Center (M-SOC)
177.
medium level of security
178.
metadata model for security measures
179.
Middle Eastern security
180.
Mobile security
181.
national cyber security strategy
182.
national security
183.
NATO. Science for Peace and Security Program
184.
network security
185.
network security monitoring
186.
OSCE (Organization for Security and Co-operation in Europe)
187.
passenger’s security
188.
policy-based routing security
189.
political and security cultures
190.
post-quantum security
191.
power system security
192.
quantitative security
193.
regional security
194.
RISC-V Security Verification
195.
Safety and Security in Sea Transportation
196.
safety and security testing
197.
security
198.
security adaptation
199.
security alert prioritization
200.
security analysis
201.
security and justice (AFSJ)
202.
Security and political science
203.
security and privacy
204.
security and privacy in smart grids
205.
Security Assertion Mining
206.
security closure
207.
Security Coverage
208.
security dataset
209.
security dilemma
210.
Security evaluation
211.
security evaluation instruments
212.
Security limitations
213.
security log analysis
214.
security management
215.
security model
216.
security monitoring
217.
security notion
218.
security objectives
219.
security of data
220.
security of supply
221.
security operation center
222.
security operations center
223.
security patterns
224.
security policy
225.
security problem definition
226.
security proof
227.
security protocols
228.
security requirements
229.
security requirements engineering
230.
security research
231.
security risk assessment
232.
security risk management
233.
security risks
234.
security science and technology
235.
security strategies
236.
security systems for military objects
237.
security testing
238.
security training
239.
security verification
240.
security-by-design
241.
social security planning
242.
societal security
243.
software security
244.
software security level
245.
software security subcharacteristics
246.
sufficient level of security
247.
system of economic security
248.
system security
249.
terrorism security
250.
transmission System Security
251.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TalTech subject term
1
1.
Building Information Modeling
TalTech department
1
1.
School of Information Technologies
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT