Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
information security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
6
Look more..
(4/243)
Export
export all inquiry results
(6)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Artificial intelligence approach to identifying propaganda techniques and objects, taking into account ethical and legal aspects
Molchanova, Maryna
;
Dutt, Pawan Kumar
Computer Systems and Information Technologies
2025
/
p. 97-103
https://doi.org/10.31891/csit-2025-2-11
https://csitjournal.khmnu.edu.ua/index.php/csit/article/view/423
journal article EST
/
journal article ENG
2
book article
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
book article
3
book article
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
book article
4
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
5
journal article EST
/
journal article ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
6
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 6, displaying
1 - 6
keyword
239
1.
data and information security
2.
Estonian information security standard
3.
information security
4.
information security and privacy
5.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
computer security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
data security
21.
development of security cameras
22.
digital security practices
23.
drinking water security
24.
economic security
25.
economic security of enterprise
26.
emotional security
27.
energy security
28.
energy security indicator
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
Homeland security
33.
human security
34.
internal security
35.
international security
36.
investment and innovation security
37.
IPv6 security
38.
IT security
39.
IT security management
40.
job security
41.
long-term security
42.
metadata model for security measures
43.
Middle Eastern security
44.
Mobile security
45.
national cyber security strategy
46.
national security
47.
NATO. Science for Peace and Security Program
48.
network security
49.
network security monitoring
50.
OSCE (Organization for Security and Co-operation in Europe)
51.
passenger’s security
52.
policy-based routing security
53.
political and security cultures
54.
post-quantum security
55.
power system security
56.
quantitative security
57.
regional security
58.
RISC-V Security Verification
59.
Safety and Security in Sea Transportation
60.
safety and security testing
61.
security
62.
security adaptation
63.
security alert prioritization
64.
security analysis
65.
security and justice (AFSJ)
66.
Security and political science
67.
security and privacy
68.
security and privacy in smart grids
69.
Security Assertion Mining
70.
security closure
71.
Security Coverage
72.
security dataset
73.
security dilemma
74.
Security evaluation
75.
security evaluation instruments
76.
Security limitations
77.
security log analysis
78.
security management
79.
security model
80.
security monitoring
81.
security notion
82.
security objectives
83.
security of data
84.
security of supply
85.
security operation center
86.
security operations center
87.
security patterns
88.
security policy
89.
security problem definition
90.
security proof
91.
security protocols
92.
security requirements
93.
security requirements engineering
94.
security risk assessment
95.
security risk management
96.
security risks
97.
security science and technology
98.
security strategies
99.
security systems for military objects
100.
security testing
101.
security training
102.
security verification
103.
security-by-design
104.
social security planning
105.
societal security
106.
system of economic security
107.
system security
108.
terrorism security
109.
transmission System Security
110.
voting privacy and security
111.
access to information
112.
age of information
113.
banking information
114.
building information modelling
115.
building information modeling
116.
Building Information Modeling (BIM)
117.
building information modelling
118.
Building Information Modelling (BIM)
119.
Building Information Modelling (BIM) adoption
120.
business information technology
121.
city information modelling (CIM)
122.
communication channels (information theory)
123.
Community Statistics on Information Society (CSIS)
124.
court information system
125.
critical information infrastructure
126.
Data-information-knowledgewisdom (DIKW)
127.
discrete information bottle-neck
128.
dissemination of information
129.
enterprise information systems
130.
Estonian National Health Information System
131.
estonian national health information system (ENHIS)
132.
Estonian nationwide Health Information System (EHIS)
133.
evolutionary information systems
134.
financial information
135.
general theory of information transfer
136.
Geographic Information System (GIS)
137.
geographical information system
138.
health information exchange
139.
health information purpose
140.
health information sharing maturity
141.
health information systems
142.
Healthcare information systems
143.
high-performance computing systems, Information processing
144.
HL7 Version 3: Reference Information Model (RIM)
145.
ICT (information and communication technology)
146.
information
147.
information analysis
148.
information and communication technologies
149.
Information and Communication Technologies (ICT)
150.
Information and communication technologies (ICT) digitalisation
151.
Information and Communication Technologies (ICT) laws
152.
Information and Communication Technologies (ICTs)
153.
Information and Communication Technologies for Development
154.
information and communication technology
155.
information and communication technology (ICT)
156.
information and communications technology
157.
information and consultation
158.
information architecture
159.
information asymmetry
160.
information commons
161.
information communication technology
162.
information content
163.
information control
164.
information dissemination
165.
information economy
166.
information entropy
167.
information exchange
168.
information extraction
169.
information filtering
170.
information flow control
171.
information fusion
172.
information governance
173.
information integration
174.
information literacy
175.
information literacy cooperation
176.
information logistics
177.
information management
178.
information measures
179.
information model
180.
information model-based urban planning
181.
information polity
182.
information potential
183.
information preprocessing
184.
information processing
185.
information processing system
186.
information rate
187.
information realities
188.
information retrieval
189.
information revolution
190.
information seeking behaviour
191.
information sharing
192.
information society
193.
Information sufficiency
194.
information system
195.
Information System Authority (RIA)
196.
information systems
197.
information systems development
198.
Information Systems research
199.
information technologies
200.
Information technology
201.
information technology (IT)
202.
information theory
203.
information to individual consumers
204.
information tool
205.
information use
206.
information value
207.
information warfare
208.
information visualization
209.
information volume
210.
Information-seeking activity
211.
intelligent information technology
212.
interoperability and evolutionary criteria of information systems
213.
laboratory information management system (LIMS)
214.
laboratory information management systems
215.
LIMS (laboratory information management systems)
216.
medical information
217.
Medical information policy
218.
middleware (for subscription and distribution of situational information)
219.
mobile information system
220.
multilingual information retrieval
221.
multimodal information
222.
open architecture for information exchange
223.
perception of visual information
224.
performance information
225.
performance information use
226.
philosophy of information
227.
process modeling and information systems within the extended enterprise
228.
provision of information to workers
229.
quality evaluation of scientific information
230.
real time information
231.
real-time information
232.
Reaxys Chemistry database information
233.
scientific information
234.
SIS II (Schengen Information System II)
235.
tactile information
236.
traffic information system (TIS)
237.
tree information database
238.
website information
239.
VIS (Visa Information System)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TalTech subject term
1
1.
Building Information Modeling
TalTech department
1
1.
School of Information Technologies
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT