Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
computer security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
7
Look more..
(3/215)
Export
export all inquiry results
(7)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
Are the current system engineering practices sufficient to meet cyber crime?
Buldas, Ahto
;
Saarepera, Märt
Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017 : held as part of HCI International 2017, Vancouver, BC, Canada, July 9–14, 2017 : proceedings
2017
/
p. 451-463
https://doi.org/10.1007/978-3-319-58460-7_31
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
book article
EU cybersecurity governance – stakeholders and normative intentions towards integration
Kasper, Agnes
The future of the European Union : demisting the debate
2020
/
p. 166−185
https://www.um.edu.mt/library/oar/handle/123456789/52308
https://www.um.edu.mt/library/oar/bitstream/123456789/52308/1/EU_cybersecurity_governance%e2%80%93stakeholders_and_normative_intentions_towards_integration_2020.pdf
book article
5
book article EST
/
book article ENG
Preface
Bellatreche, Ladjel
;
Chernishev, George
;
Corral, Antonio
;
Ouchani, Samir
;
Vain, Jüri
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
/
p. v-vii
https://link.springer.com/content/pdf/bfm:978-3-030-87657-9/1?pdf=chapter%20toc
Article collection metrics at Scopus
Article at Scopus
book article EST
/
book article ENG
6
book article
The becoming of cyber-military capabilities
Salminen, Mikko
;
Kerttunen, Mika
Routledge handbook of international cybersecurity
2020
/
p. 94-107
https://www.ester.ee/record=b5308475*est
book article
7
book article
Towards a Cyber Maastricht : two steps forward, one step back
Kasper, Agnes
;
Vernygora, Vlad Alex
The future of the European Union : demisting the debate
2020
/
p. 186-210
https://www.um.edu.mt/library/oar/handle/123456789/52310
https://www.um.edu.mt/library/oar/bitstream/123456789/52310/1/Towards_a_%e2%80%98Cyber_Maastricht%e2%80%99_two_steps_forward_one_step_back_2020.pdf
book article
Number of records 7, displaying
1 - 7
keyword
210
1.
computer security
2.
ad-hoc sensor networks security
3.
Automatic Security Verification
4.
Blockchain security
5.
cache security
6.
cloud security
7.
communication system security
8.
comprehensive system of economic security
9.
cooperative security dilemma
10.
cyber security
11.
cyber security education
12.
cyber security exercises
13.
cyber security monitoring
14.
cyber security strategies
15.
cyber-security
16.
data and information security
17.
data security
18.
development of security cameras
19.
digital security practices
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
Estonian information security standard
27.
graded security
28.
hardware security
29.
hardware security primitive
30.
high level of security
31.
Homeland security
32.
human security
33.
information security
34.
information security and privacy
35.
initial level of security
36.
internal security
37.
international security
38.
investment and innovation security
39.
IPv6 security
40.
IT security
41.
IT security management
42.
job security
43.
long-term security
44.
maritime cyber security
45.
maritime cyber security operations centers
46.
Maritime Security Operations Center (M-SOC)
47.
medium level of security
48.
metadata model for security measures
49.
Middle Eastern security
50.
Mobile security
51.
national cyber security strategy
52.
national security
53.
NATO. Science for Peace and Security Program
54.
network security
55.
network security monitoring
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
Safety and Security in Sea Transportation
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion
76.
Security Assertion Mining
77.
security closure
78.
Security Coverage
79.
security dataset
80.
security dilemma
81.
Security evaluation
82.
security evaluation instruments
83.
Security Level Evaluation
84.
Security limitations
85.
security log analysis
86.
security management
87.
security model
88.
security monitoring
89.
security notion
90.
security objectives
91.
security of data
92.
security of supply
93.
security operation center
94.
security operations center
95.
security patterns
96.
security policy
97.
security problem definition
98.
security proof
99.
security protocols
100.
security requirements
101.
security requirements engineering
102.
security research
103.
security risk assessment
104.
security risk management
105.
security risks
106.
security science and technology
107.
security strategies
108.
security systems for military objects
109.
security testing
110.
security training
111.
security verification
112.
security-by-design
113.
social security planning
114.
societal security
115.
software security
116.
software security level
117.
software security subcharacteristics
118.
sufficient level of security
119.
system of economic security
120.
system security
121.
terrorism security
122.
transmission System Security
123.
voting privacy and security
124.
computer
125.
computer aided design
126.
computer aided diagnosis
127.
computer aided diagnostics
128.
computer aided instruction
129.
computer aided language translation
130.
computer aided manufacturing
131.
computer aided methods
132.
computer aided software engineering
133.
computer aided testing
134.
computer algebra
135.
computer algebra system
136.
computer and education
137.
computer anxiety
138.
computer architecture
139.
computer assisted language learning
140.
computer based learning
141.
computer circuits
142.
computer control
143.
Computer crime
144.
computer education
145.
computer engineering
146.
computer engineerng
147.
computer game
148.
computer graphics
149.
computer hardware
150.
computer integrated manufacturing
151.
computer network management
152.
computer network operations
153.
computer networks
154.
computer pipelines
155.
computer programming
156.
computer programming languages
157.
computer programs
158.
computer science
159.
computer science basics
160.
computer science education
161.
computer simulation
162.
computer simulation environments
163.
computer simulations
164.
computer software
165.
Computer software and hardware
166.
computer softwaregraph theory
167.
computer systems
168.
Computer systems organization
169.
computer terminals
170.
computer vision
171.
computer vision-based methods
172.
computer workers
173.
computer-aided anthropometry
174.
computer-aided architectural design (CAAD)
175.
computer‐aided assessment
176.
computer-aided design
177.
computer-aided design (CAD)
178.
computer-aided detection
179.
computer‐aided detection
180.
computer-aided diagnosis
181.
computer-aided drawing (CAD)
182.
computer-aided engineering
183.
computer-aided teaching
184.
Computer-Aided Tuning
185.
computer-aided tuning (CAT)
186.
computer-assisted language learning (CALL)
187.
computer-oriented technologies
188.
computer-supported decision-making
189.
computer-use
190.
computer-workers
191.
control engineering computer applications
192.
distributed computer systems
193.
education in computer engineering
194.
fifth generation computer
195.
gateways (computer networks)
196.
high-performance computer systems
197.
human computer interaction
198.
human computer interaction (HCI)
199.
human-computer interaction
200.
human–computer interaction
201.
Human-Computer Interaction (HCI)
202.
human-computer trust
203.
interactive computer graphics
204.
laptop computer
205.
logic in computer science
206.
single board computer
207.
single-board computer
208.
structure computer analysis
209.
ubiquitous computer technology
210.
Web and computer-based learning
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Computer Systems
4.
Estonian Summer School on Computer and Systems Science, 2023
TalTech department
1
1.
Department of Computer Systems
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT