Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(4/226)
Export
export all inquiry results
(5)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
2
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
3
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
4
journal article EST
/
journal article ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
222
1.
Estonian information security standard
2.
information security
3.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security strategies
16.
cyber-security
17.
data security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
internal security
30.
international security
31.
investment and innovation security
32.
IPv6 security
33.
IT security
34.
IT security management
35.
job security
36.
long-term security
37.
metadata model for security measures
38.
Middle Eastern security
39.
Mobile security
40.
national cyber security strategy
41.
national security
42.
NATO. Science for Peace and Security Program
43.
network security
44.
network security monitoring
45.
OSCE (Organization for Security and Co-operation in Europe)
46.
passenger’s security
47.
policy-based routing security
48.
political and security cultures
49.
post-quantum security
50.
power system security
51.
quantitative security
52.
regional security
53.
RISC-V Security Verification
54.
safety and security testing
55.
security
56.
security adaptation
57.
security alert prioritization
58.
security analysis
59.
security and justice (AFSJ)
60.
security and privacy
61.
security and privacy in smart grids
62.
Security Assertion Mining
63.
security closure
64.
Security Coverage
65.
security dataset
66.
security dilemma
67.
Security evaluation
68.
security evaluation instruments
69.
security log analysis
70.
security management
71.
security model
72.
security monitoring
73.
security notion
74.
security objectives
75.
security of data
76.
security of supply
77.
security operation center
78.
security operations center
79.
security patterns
80.
security policy
81.
security problem definition
82.
security proof
83.
security protocols
84.
security requirements
85.
security requirements engineering
86.
security risk assessment
87.
security risk management
88.
security strategies
89.
security systems for military objects
90.
security testing
91.
security training
92.
security verification
93.
security-by-design
94.
social security planning
95.
societal security
96.
system of economic security
97.
system security
98.
terrorism security
99.
transmission System Security
100.
voting privacy and security
101.
access to information
102.
age of information
103.
banking information
104.
building information modelling
105.
building information modeling
106.
Building Information Modeling (BIM)
107.
building information modelling
108.
Building Information Modelling (BIM)
109.
Building Information Modelling (BIM) adoption
110.
business information technology
111.
city information modelling (CIM)
112.
communication channels (information theory)
113.
Community Statistics on Information Society (CSIS)
114.
court information system
115.
critical information infrastructure
116.
Data-information-knowledgewisdom (DIKW)
117.
discrete information bottle-neck
118.
dissemination of information
119.
enterprise information systems
120.
Estonian National Health Information System
121.
Estonian nationwide Health Information System (EHIS)
122.
evolutionary information systems
123.
financial information
124.
general theory of information transfer
125.
Geographic Information System (GIS)
126.
geographical information system
127.
health information exchange
128.
health information purpose
129.
health information sharing maturity
130.
health information systems
131.
Healthcare information systems
132.
high-performance computing systems, Information processing
133.
HL7 Version 3: Reference Information Model (RIM)
134.
ICT (information and communication technology)
135.
information
136.
information analysis
137.
information and communication technologies
138.
Information and communication technologies (ICT) digitalisation
139.
Information and Communication Technologies (ICT) laws
140.
Information and Communication Technologies (ICTs)
141.
Information and Communication Technologies for Development
142.
information and communication technology
143.
information and communication technology (ICT)
144.
information and communications technology
145.
information architecture
146.
information asymmetry
147.
information commons
148.
information communication technology
149.
information content
150.
information control
151.
information dissemination
152.
information economy
153.
information entropy
154.
information exchange
155.
information extraction
156.
information filtering
157.
information flow control
158.
information fusion
159.
information governance
160.
information integration
161.
information literacy
162.
information literacy cooperation
163.
information logistics
164.
information management
165.
information measures
166.
information model
167.
information model-based urban planning
168.
information polity
169.
information potential
170.
information processing
171.
information processing system
172.
information rate
173.
information realities
174.
information retrieval
175.
information revolution
176.
information seeking behaviour
177.
information sharing
178.
information society
179.
Information sufficiency
180.
information system
181.
Information System Authority (RIA)
182.
information systems
183.
information systems development
184.
Information Systems research
185.
information technologies
186.
Information technology
187.
information technology (IT)
188.
information theory
189.
information to individual consumers
190.
information tool
191.
information value
192.
information warfare
193.
information visualization
194.
information volume
195.
Information-seeking activity
196.
intelligent information technology
197.
interoperability and evolutionary criteria of information systems
198.
laboratory information management system (LIMS)
199.
laboratory information management systems
200.
LIMS (laboratory information management systems)
201.
medical information
202.
Medical information policy
203.
middleware (for subscription and distribution of situational information)
204.
mobile information system
205.
multilingual information retrieval
206.
multimodal information
207.
open architecture for information exchange
208.
perception of visual information
209.
performance information
210.
performance information use
211.
philosophy of information
212.
process modeling and information systems within the extended enterprise
213.
quality evaluation of scientific information
214.
real time information
215.
real-time information
216.
Reaxys Chemistry database information
217.
scientific information
218.
SIS II (Schengen Information System II)
219.
traffic information system (TIS)
220.
tree information database
221.
website information
222.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TalTech subject term
1
1.
Building Information Modeling
TalTech department
1
1.
School of Information Technologies
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT