Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security operation center (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/130)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
How to build a SOC on a budget
Vaarandi, Risto
;
Mäses, Sten
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
2022
/
p. 171-177 : ill
https://doi.org/10.1109/CSR54599.2022.9850281
book article
Number of records 1, displaying
1 - 1
keyword
123
1.
security operation center
2.
OSCE (Organization for Security and Co-operation in Europe)
3.
autoservice center
4.
center-tapped coupled inductor
5.
data center
6.
daycare center
7.
Municipal Operations Center
8.
Non-emergency Contact Center
9.
shared service center
10.
shared service center (SSC)
11.
urban learning center
12.
alternate operation
13.
boiler transient operation
14.
buckboost operation
15.
buck–boost operation
16.
co-operation
17.
co-operation between member states
18.
cyber operation
19.
dynamic operation of heating systems
20.
fault tolerant operation
21.
islanded operation
22.
judicial co-operation
23.
maintenance and efficient operation
24.
morphological operation
25.
operation
26.
operation and maintenance
27.
operation costs
28.
operation management
29.
optimal operation strategy
30.
pick-and-place operation
31.
power system operation
32.
protection non operation
33.
regional co-operation
34.
remote operation of vehicles
35.
safe operation
36.
transmission system operation
37.
wide voltage range operation
38.
ad-hoc sensor networks security
39.
Automatic Security Verification
40.
Blockchain security
41.
cache security
42.
communication system security
43.
comprehensive system of economic security
44.
computer security
45.
cooperative security dilemma
46.
cyber security
47.
cyber security education
48.
cyber security exercises
49.
cyber security strategies
50.
cyber-security
51.
data security
52.
development of security cameras
53.
drinking water security
54.
economic security
55.
economic security of enterprise
56.
emotional security
57.
energy security
58.
energy security indicator
59.
graded security
60.
hardware security
61.
hardware security primitive
62.
human security
63.
information security
64.
internal security
65.
international security
66.
investment and innovation security
67.
IPv6 security
68.
IT security
69.
job security
70.
long-term security
71.
metadata model for security measures
72.
Middle Eastern security
73.
Mobile security
74.
national cyber security strategy
75.
national security
76.
NATO. Science for Peace and Security Program
77.
network security
78.
network security monitoring
79.
passenger’s security
80.
policy-based routing security
81.
political and security cultures
82.
post-quantum security
83.
power system security
84.
quantitative security
85.
regional security
86.
RISC-V Security Verification
87.
security
88.
security and privacy
89.
security and privacy in smart grids
90.
Security Assertion Mining
91.
security closure
92.
Security Coverage
93.
security dataset
94.
security dilemma
95.
Security evaluation
96.
security log analysis
97.
security management
98.
security model
99.
security monitoring
100.
security notion
101.
security objectives
102.
security of data
103.
security of supply
104.
security patterns
105.
security problem definition
106.
security proof
107.
security protocols
108.
security requirements
109.
security requirements engineering
110.
security risk assessment
111.
security risk management
112.
security strategies
113.
security systems for military objects
114.
security testing
115.
security training
116.
security verification
117.
social security planning
118.
societal security
119.
system of economic security
120.
system security
121.
terrorism security
122.
transmission System Security
123.
voting privacy and security
subject term
7
1.
Baltic Monitoring and Forecasting Center (BALMFC)
2.
Estonian Center for Safe and Trustworthy Artificial Intelligence (ECSTAI)
3.
FinEst Center for Smart Cities
4.
The Center for European Integration Studies
5.
UNDP Urban Learning Center
6.
National Computer Security Incident Response Teams (N-CSIRTs)
7.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT