Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
58
Look more..
(2/129)
Export
export all inquiry results
(58)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
26
book article
Improving Security and Privacy with Raspberry Pi Devices
Džankic, Radoje
;
Bulatovic, Zvonko
;
Bauk, Sanja
Maritime Cybersecurity
2025
/
p. 217-233
https://doi.org/10.1007/978-3-031-87290-7_12
book article
27
book article
Improving the technical functionality of children's tracking watches
Jennings, Luke
;
Singh, Inderbir
;
Sorell, Matthew
;
Hovhannisyan, Kristine
Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018
2018
/
p. 57-59
https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
book article
28
book article EST
/
book article ENG
Information and information security
Henno, Jaak
Information modelling and knowledge bases XXVII
2016
/
p. 103-120
https://doi.org/10.3233/978-1-61499-611-8-103
Article collection metrics at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
29
book article
Latch-Based logic locking
Sweeney, J.
;
Mohammed Zackriya, V.
;
Pagliarini, Samuel Nascimento
;
Pileggi, Larry
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020
2020
/
p. 132−141 : ill
https://doi.org/10.1109/HOST45689.2020.9300256
book article
30
book article
Latest trends in hardware security and privacy
Di Natale, Giorgio
;
Regazzoni, Francesco
;
Albanese, Vincent
;
Lhermet, Frank
;
Loisel, Yann
;
Sensaoui, Abderrahmane
;
Pagliarini, Samuel Nascimento
33rd IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) : ESA-ESRIN, Italy (On-line Virtual Event),October 19–21, 2020
2020
/
4 p. : ill
https://doi.org/10.1109/DFT50435.2020.9250816
book article
31
journal article EST
/
journal article ENG
A lightweight anonymous authentication scheme for secure cloud computing services
Hammami, Hamza
;
Ben Yahia, Sadok
;
Obaidat, Mohammad S.
The Journal of Supercomputing
2021
/
p. 1693-1713
https://doi.org/10.1007/s11227-020-03313-y
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
32
journal article
Limited statehood and its security implications on the fragmentation political order in the Middle East and North Africa
Polese, Abel
;
Hanau Santini, Ruth
Small wars & insurgencies
2018
/
p. 379-390
https://www.tandfonline.com/doi/full/10.1080/09592318.2018.1456815#
journal article
33
journal article EST
/
journal article ENG
Machine learning meets communication networks : current trends and future challenges
Ahmad, Ijaz
;
Shahabuddin, Shariar
;
Malik, Hassan
;
Leppänen, Teemu
;
Loven, Lauri
;
Anttonen, Antti
;
Sodhro, Ali Hassan
;
Alam, Muhammad Mahtab
;
Juntti, Markku
;
Yla-Jääski, Antti
IEEE Access
2020
/
art. 9274307, p. 223418-223460
https://doi.org/10.1109/ACCESS.2020.3041765
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
34
journal article
Maksukuulekus ja selle tähendus sisejulgeoleku teoreetilises käsitluses
Randlane, Kerly
Sisekaitseakadeemia toimetised
2011
/
lk. 284-301
journal article
35
book article EST
/
book article ENG
Mapping requirements specifications into a formalized blockchain-enabled authentication protocol for secured personal identity assurance
Leiding, Benjamin
;
Norta, Alexander
Future Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017 : proceedings
2017
/
p. 181-196 : ill
https://doi.org/10.1007/978-3-319-70004-5_13
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
36
journal article
Maritime cyber-insurance : The Norwegian case : [abstract]
Franke, Ulrik
;
Langfeldt Friberg, Even
;
Bahsi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267–286
https://doi.org/10.1504/IJCIS.2022.10046729
journal article
37
journal article EST
/
journal article ENG
Maritime cyber-insurance: the Norwegian case
Franke, Ulrik
;
Friberg, Even Langfeldt
;
Bahsi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267-286
https://doi.org/10.1504/ijcis.2022.125816
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
38
journal article
A modern empire and its public diplomacy : on Russia’s communication with Estonia
Vernygora, Vlad Alex
;
Belonosova, Elizaveta
The New Zealand Slavonic Journal
2019
/
p. 59-94
https://resolver.scholarsportal.info/resolve/00288683/v53-54inone/59_ameaipd.xml
journal article
39
book article
Multi-modal biometric system security and privacy
Essen, Akim
;
Sorell, Matthew
;
Maennel, Olaf Manuel
Proceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology
2019
/
p. 30-32
https://www.ester.ee/record=b5238490*est
book article
40
journal article
Nord Stream project : ecopolitical, economical and security field considerations
Värk, Juhan
;
Nutt, Mart
;
Martin, Jüri
Social and natural sciences journal
2011
/
p. 18-27
https://ojs.journals.cz/index.php/SNSJ/article/view/270
journal article
41
book article
A novel anonymous authentication and key agreement scheme for smart grid
Hammami, Hamza
;
Obaidat, Mohammad S.
;
Ben Yahia, Sadok
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 2020
2020
/
p. 357-362
https://doi.org/10.5220/0009824203570362
book article
42
journal article EST
/
journal article ENG
A novel efficient and lightweight authentication scheme for secure smart grid communication systems
Hammami, Hamza
;
Ben Yahia, Sadok
;
Obaidat, Mohammad S.
The Journal of Supercomputing
2023
/
p. 7360 - 7376
https://doi.org/10.1007/s11227-022-04944-z
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
43
book article
Origin and definition of the category of economic security of enterprise [Online resource]
Ianioglo, Alina
;
Põlajeva, Tatjana
9th International Scientific Conference "Business and Management 2016" : May 12-13, 2016, Vilnius, Lithuania
2016
/
p. 1-8 : ill
http://dx.doi.org/10.3846/bm.2016.46
book article
44
journal article
A peer-to-peer data sharing framework for Web browsers : analysis and evaluation
Pattanaik, Vishwajeet
;
Sharvadze, Ioane
;
Draheim, Dirk
SN Computer Science
2020
/
art. 214, 10 p
https://doi.org/10.1007/s42979-020-00236-6
journal article
Related publications
1
Robust Web annotations in support of knowledge co-creation = Töökindlad veebiannotatsioonid teadmiste ühisloome toetamiseks
45
book
Producing cultural change in political communities : the impact of populism and extremism on the international security environment
2023
https://doi.org/10.1007/978-3-031-43440-2
book
46
journal article EST
/
journal article ENG
REACT: Autonomous intrusion response system for intelligent vehicles
Hamad, Mohammad
;
Finkenzeller, Andreas
;
Kühr, Michael
;
Roberts, Andrew James
;
Maennel, Olaf Manuel
;
Steinhorst, Sebastian
;
Prevelakis, Vassilis
Computers and security
2024
/
art. 104008, 17 p. : ill
https://doi.org/10.1016/j.cose.2024.104008
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Cybersecurity testing and attack propagation analysis of autonomous driving software = Autonoomse sõiduki juhtimistarkvara küberturvalisuse testimine ja rünnakute leviku analüüs
47
book article
RESCUE EDA Toolset for interdependent aspects of reliability, security and quality in nanoelectronic systems design
Gürsoy, Cemil Cem
;
Cardoso Medeiros, Guilherme
;
Chen, Juanho
;
Balakrishnan, Aneesh
;
Lai, Xinhui
;
Bagbaba, Ahmet Cagri
;
Raik, Jaan
;
Jenihhin, Maksim
DATE 2019
2019
/
1 p. : ill
https://doi.org/10.5281/zenodo.3362529
https://past.date-conference.com/
book article
48
book article
RESCUE: interdependent challenges of reliability, security and quality in nanoelectronic systems
Jenihhin, Maksim
;
Raik, Jaan
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE) : proceedings
2020
/
art. 19690741 , 6 p
https://doi.org/10.23919/DATE48585.2020.9116558
book article
49
journal article EST
/
journal article ENG
A robust mutual authentication scheme for health-focused connected intelligent objects
Hammami, Hamza
;
Ben Yahia, Sadok
;
Obaidat, Mohammad S.
Cluster Computing
2025
/
art. 63, 16 p
https://doi.org/10.1007/s10586-024-04700-3
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
50
journal article EST
/
journal article ENG
Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns
Norta, Alexander
;
Matulevičius, Raimundas
;
Leiding, Benjamin
Computers & Security
2019
/
p. 253−269
https://doi.org/10.1016/j.cose.2019.05.017
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 58, displaying
26 - 50
previous
1
2
3
next
keyword
127
1.
ad-hoc sensor networks security
2.
Automatic Security Verification
3.
Blockchain security
4.
cache security
5.
cloud security
6.
communication system security
7.
comprehensive system of economic security
8.
computer security
9.
cooperative security dilemma
10.
cyber security
11.
cyber security education
12.
cyber security exercises
13.
cyber security monitoring
14.
cyber security monitoring in maritime
15.
cyber security strategies
16.
cyber-physical system security
17.
cyber-security
18.
data and information security
19.
data security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
maritime cyber security
47.
maritime cyber security operations centers
48.
Maritime Security Operations Center (M-SOC)
49.
medium level of security
50.
metadata model for security measures
51.
Middle Eastern security
52.
Mobile security
53.
national cyber security strategy
54.
national security
55.
NATO. Science for Peace and Security Program
56.
network security
57.
network security monitoring
58.
OSCE (Organization for Security and Co-operation in Europe)
59.
passenger’s security
60.
policy-based routing security
61.
political and security cultures
62.
post-quantum security
63.
power system security
64.
quantitative security
65.
regional security
66.
RISC-V Security Verification
67.
Safety and Security in Sea Transportation
68.
safety and security testing
69.
security
70.
security adaptation
71.
security alert prioritization
72.
security analysis
73.
security and justice (AFSJ)
74.
Security and political science
75.
security and privacy
76.
security and privacy in smart grids
77.
Security Assertion
78.
Security Assertion Mining
79.
security closure
80.
Security Coverage
81.
security dataset
82.
security dilemma
83.
Security evaluation
84.
security evaluation instruments
85.
Security Level Evaluation
86.
Security limitations
87.
security log analysis
88.
security management
89.
security model
90.
security monitoring
91.
security notion
92.
security objectives
93.
security of data
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security research
105.
security risk assessment
106.
security risk management
107.
security risks
108.
security science and technology
109.
security strategies
110.
security systems for military objects
111.
security testing
112.
security training
113.
security verification
114.
security-by-design
115.
social security planning
116.
societal security
117.
software security
118.
software security level
119.
software security subcharacteristics
120.
sufficient level of security
121.
system of economic security
122.
system security
123.
terrorism security
124.
transmission System Security
125.
voting privacy and security
126.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
127.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT