Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security monitoring (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/197)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
How to build a SOC on a budget
Vaarandi, Risto
;
Mäses, Sten
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
2022
/
p. 171-177 : ill
https://doi.org/10.1109/CSR54599.2022.9850281
book article
Number of records 1, displaying
1 - 1
keyword
190
1.
network security monitoring
2.
security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security strategies
15.
cyber-security
16.
data security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
graded security
25.
hardware security
26.
hardware security primitive
27.
human security
28.
information security
29.
internal security
30.
international security
31.
investment and innovation security
32.
IPv6 security
33.
IT security
34.
job security
35.
long-term security
36.
metadata model for security measures
37.
Middle Eastern security
38.
Mobile security
39.
national cyber security strategy
40.
national security
41.
NATO. Science for Peace and Security Program
42.
network security
43.
OSCE (Organization for Security and Co-operation in Europe)
44.
passenger’s security
45.
policy-based routing security
46.
political and security cultures
47.
post-quantum security
48.
power system security
49.
quantitative security
50.
regional security
51.
RISC-V Security Verification
52.
security
53.
security and privacy
54.
security and privacy in smart grids
55.
Security Assertion Mining
56.
security closure
57.
Security Coverage
58.
security dataset
59.
security dilemma
60.
Security evaluation
61.
security log analysis
62.
security management
63.
security model
64.
security notion
65.
security objectives
66.
security of data
67.
security of supply
68.
security operation center
69.
security patterns
70.
security problem definition
71.
security proof
72.
security protocols
73.
security requirements
74.
security requirements engineering
75.
security risk assessment
76.
security risk management
77.
security strategies
78.
security systems for military objects
79.
security testing
80.
security training
81.
security verification
82.
social security planning
83.
societal security
84.
system of economic security
85.
system security
86.
terrorism security
87.
transmission System Security
88.
voting privacy and security
89.
Baltic-wide HELCOM COMBINE monitoring program
90.
bi-directional fault monitoring devices
91.
biological monitoring
92.
biomedical monitoring
93.
biosignal monitoring
94.
cardiac monitoring
95.
CO2 monitoring
96.
condition monitoring
97.
condition monitoring system
98.
continuous monitoring
99.
Copernicus Marine Environment Monitoring Service
100.
corporate performance monitoring system
101.
corrosion monitoring
102.
deformation monitoring
103.
diagnosis and performance monitoring
104.
Distributed flow monitoring
105.
distributed monitoring
106.
distributed online monitoring
107.
disturbance monitoring
108.
e-monitoring
109.
Environmental compliance monitoring
110.
environmental monitoring
111.
fault monitoring
112.
fish monitoring
113.
GHB monitoring
114.
groundwater monitoring
115.
haemodialysis monitoring
116.
health monitoring
117.
healthcare monitoring
118.
hemodialysis monitoring
119.
home blood pressure monitoring
120.
home monitoring
121.
industrial monitoring
122.
infrastructure monitoring
123.
integrated hemodynamic monitoring
124.
interactive monitoring
125.
IoT-based monitoring
126.
laboratory monitoring
127.
landfill monitoring
128.
load monitoring
129.
long term monitoring
130.
long-term monitoring
131.
machine condition monitoring
132.
machinery monitoring
133.
Magnetic induction monitoring
134.
marine microplastic monitoring
135.
marine monitoring
136.
monitoring
137.
monitoring and application design
138.
monitoring and detection
139.
monitoring and prognosis
140.
monitoring deformations
141.
monitoring program
142.
monitoring RIS3 observatory
143.
monitoring system
144.
monitoring the health patients
145.
NetFlow based network monitoring
146.
network monitoring
147.
Non-intrusive load monitoring
148.
non-intrusive load monitoring (NILM)
149.
ocean monitoring
150.
online monitoring
151.
on-line monitoring
152.
optical monitoring
153.
passive acoustic monitoring
154.
patient monitoring
155.
performance monitoring
156.
periodic monitoring
157.
pollen monitoring
158.
power quality monitoring
159.
PQM (Power Quality Monitoring)
160.
process monitoring
161.
production monitoring
162.
production monitoring system
163.
production monitoring system (PLM)
164.
production monitoring system (PMS)
165.
production monitoring systems (PMS)
166.
project-monitoring
167.
quality monitoring
168.
real time monitoring process
169.
real-time collision monitoring
170.
real-time monitoring
171.
remote monitoring
172.
respiratory monitoring
173.
RIS3 evaluation and monitoring
174.
road surface condition monitoring
175.
sea monitoring
176.
sensor respiratory monitoring
177.
smart materials with structural health monitoring capabilities
178.
stormwater monitoring
179.
structural health monitoring
180.
surface water monitoring
181.
susceptibility monitoring
182.
system monitoring
183.
terms—production environment monitoring
184.
the accuracy of monitoring in analysis of impact impulses
185.
The Baltic Monitoring and Forecasting Centre (BAL MFC)
186.
traffic behavior monitoring
187.
water pollution monitoring
188.
water quality monitoring
189.
wearable health monitoring
190.
wide area monitoring
subject term
7
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
4.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
5.
Baltic Monitoring and Forecasting Center (BALMFC)
6.
Copernicus Marine Environment Monitoring Service (CMEMS)
7.
MyOcean Baltic Sea Monitoring and Forecasting Centre
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT