Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
47
Look more..
(2/95)
Export
export all inquiry results
(47)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
26
journal article
Limited statehood and its security implications on the fragmentation political order in the Middle East and North Africa
Polese, Abel
;
Hanau Santini, Ruth
Small wars & insurgencies
2018
/
p. 379-390
https://www.tandfonline.com/doi/full/10.1080/09592318.2018.1456815#
journal article
27
journal article EST
/
journal article ENG
Machine learning meets communication networks : current trends and future challenges
Ahmad, Ijaz
;
Shahabuddin, Shariar
;
Malik, Hassan
;
Leppänen, Teemu
;
Loven, Lauri
;
Anttonen, Antti
;
Sodhro, Ali Hassan
;
Alam, Muhammad Mahtab
;
Juntti, Markku
;
Yla-Jääski, Antti
IEEE Access
2020
/
art. 9274307, p. 223418-223460
https://doi.org/10.1109/ACCESS.2020.3041765
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
28
journal article
Maksukuulekus ja selle tähendus sisejulgeoleku teoreetilises käsitluses
Randlane, Kerly
Sisekaitseakadeemia toimetised
2011
/
lk. 284-301
journal article
29
book article EST
/
book article ENG
Mapping requirements specifications into a formalized blockchain-enabled authentication protocol for secured personal identity assurance
Leiding, Benjamin
;
Norta, Alexander
Future Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017 : proceedings
2017
/
p. 181-196 : ill
https://doi.org/10.1007/978-3-319-70004-5_13
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
30
journal article
Maritime cyber-insurance : The Norwegian case : [abstract]
Franke, Ulrik
;
Langfeldt Friberg, Even
;
Bahsi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267–286
https://doi.org/10.1504/IJCIS.2022.10046729
journal article
31
journal article EST
/
journal article ENG
Maritime cyber-insurance: the Norwegian case
Franke, Ulrik
;
Friberg, Even Langfeldt
;
Bahşi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267-286
https://doi.org/10.1504/ijcis.2022.125816
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
32
journal article
A modern empire and its public diplomacy : on Russia’s communication with Estonia
Vernygora, Vlad Alex
;
Belonosova, Elizaveta
The New Zealand Slavonic Journal
2019
/
p. 59-94
https://resolver.scholarsportal.info/resolve/00288683/v53-54inone/59_ameaipd.xml
journal article
33
book article
Multi-modal biometric system security and privacy
Essen, Akim
;
Sorell, Matthew
;
Maennel, Olaf Manuel
Proceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology
2019
/
p. 30-32
https://www.ester.ee/record=b5238490*est
book article
34
journal article
Nord Stream project : ecopolitical, economical and security field considerations
Värk, Juhan
;
Nutt, Mart
;
Martin, Jüri
Social and natural sciences journal
2011
/
p. 18-27
https://ojs.journals.cz/index.php/SNSJ/article/view/270
journal article
35
book article
A novel anonymous authentication and key agreement scheme for smart grid
Hammami, Hamza
;
Obaidat, Mohammad S.
;
Ben Yahia, Sadok
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 2020
2020
/
p. 357-362
https://doi.org/10.5220/0009824203570362
book article
36
journal article EST
/
journal article ENG
A novel efficient and lightweight authentication scheme for secure smart grid communication systems
Hammami, Hamza
;
Ben Yahia, Sadok
;
Obaidat, Mohammad S.
The Journal of Supercomputing
2023
/
p. 7360 - 7376
https://doi.org/10.1007/s11227-022-04944-z
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
37
book article
Origin and definition of the category of economic security of enterprise [Online resource]
Ianioglo, Alina
;
Põlajeva, Tatjana
9th International Scientific Conference "Business and Management 2016" : May 12-13, 2016, Vilnius, Lithuania
2016
/
p. 1-8 : ill
http://dx.doi.org/10.3846/bm.2016.46
book article
38
journal article
A peer-to-peer data sharing framework for Web browsers : analysis and evaluation
Pattanaik, Vishwajeet
;
Sharvadze, Ioane
;
Draheim, Dirk
SN Computer Science
2020
/
art. 214, 10 p
https://doi.org/10.1007/s42979-020-00236-6
journal article
Seotud publikatsioonid
1
Robust Web annotations in support of knowledge co-creation = Töökindlad veebiannotatsioonid teadmiste ühisloome toetamiseks
39
book
Producing cultural change in political communities : the impact of populism and extremism on the international security environment
2023
https://doi.org/10.1007/978-3-031-43440-2
book
40
book article
RESCUE EDA Toolset for interdependent aspects of reliability, security and quality in nanoelectronic systems design
Gürsoy, Cemil Cem
;
Cardoso Medeiros, Guilherme
;
Chen, Juanho
;
Balakrishnan, Aneesh
;
Lai, Xinhui
;
Bagbaba, Ahmet Cagri
;
Raik, Jaan
;
Jenihhin, Maksim
DATE 2019
2019
/
1 p. : ill
https://doi.org/10.5281/zenodo.3362529
https://past.date-conference.com/
book article
41
book article
RESCUE: interdependent challenges of reliability, security and quality in nanoelectronic systems
Jenihhin, Maksim
;
Raik, Jaan
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 9-13 March 2020, Grenoble, France : proceedings
2020
/
art. 19690741 , 6 p
https://doi.org/10.23919/DATE48585.2020.9116558
book article
42
journal article EST
/
journal article ENG
Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns
Norta, Alexander
;
Matulevičius, Raimundas
;
Leiding, Benjamin
Computers & Security
2019
/
p. 253−269
https://doi.org/10.1016/j.cose.2019.05.017
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
43
book article EST
/
book article ENG
Security risk management in the aviation turnaround sector
Matulevičius, Raimundas
;
Norta, Alexander
;
Udokwu, Chibuzor
;
Nõukas, Rein
Future Data and Security Engineering : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016 : proceedings
2016
/
p. 119-140 : ill
https://doi.org/10.1007/978-3-319-48057-2_8
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
44
journal article EST
/
journal article ENG
Split-chip design to prevent IP reverse engineering
Pagliarini, Samuel Nascimento
;
Sweeney, Joseph
;
Mai, Ken
;
Blanton, Shawn
;
Mitra, Subhasish
;
Pileggi, Larry
IEEE Design and Test
2020
/
p. 109-118
https://doi.org/10.1109/MDAT.2020.3033255
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
45
book article
The invisible front : a cyber resilience perspective
Bahsi, Hayretdin
The geopolitics of power grids : political and security aspects of Baltic electricity synchronization : March 2018
2018
/
p. 53–68 : ill
https://www.ester.ee/record=b5053315*est
book article
46
book article EST
/
book article ENG
TOOP trust architecture
Boldrin, Luca
;
Sellitto, Giovanni Paolo
;
Tepandi, Jaak
The once-only principle : The TOOP project
2021
/
p. 126–140
https://doi.org/10.1007/978-3-030-79851-2_7
Article collection metrics at Scopus
Article at Scopus
Article collection metrics at WOS
Article at WOS
book article EST
/
book article ENG
47
book article
Wearable wireless sensor networks for emergency response in public safety networks
Alam, Muhammad Mahtab
;
Ben Arbia, Dhafer
;
Ben Hamida, Elyes
Wireless public safety networks 2 : a systematic approach
2016
/
p. 63-94 : ill
https://doi.org/10.1016/B978-1-78548-052-2.50003-7
book article
Number of records 47, displaying
26 - 47
previous
1
2
next
keyword
93
1.
ad-hoc sensor networks security
2.
Automatic Security Verification
3.
Blockchain security
4.
cache security
5.
communication system security
6.
comprehensive system of economic security
7.
computer security
8.
cooperative security dilemma
9.
cyber security
10.
cyber security education
11.
cyber security exercises
12.
cyber security strategies
13.
cyber-security
14.
data security
15.
development of security cameras
16.
drinking water security
17.
economic security
18.
economic security of enterprise
19.
emotional security
20.
energy security
21.
energy security indicator
22.
graded security
23.
hardware security
24.
hardware security primitive
25.
human security
26.
information security
27.
internal security
28.
international security
29.
investment and innovation security
30.
IPv6 security
31.
IT security
32.
IT security management
33.
job security
34.
long-term security
35.
metadata model for security measures
36.
Middle Eastern security
37.
Mobile security
38.
national cyber security strategy
39.
national security
40.
NATO. Science for Peace and Security Program
41.
network security
42.
network security monitoring
43.
OSCE (Organization for Security and Co-operation in Europe)
44.
passenger’s security
45.
policy-based routing security
46.
political and security cultures
47.
post-quantum security
48.
power system security
49.
quantitative security
50.
regional security
51.
RISC-V Security Verification
52.
security
53.
security and justice (AFSJ)
54.
security and privacy
55.
security and privacy in smart grids
56.
Security Assertion Mining
57.
security closure
58.
Security Coverage
59.
security dataset
60.
security dilemma
61.
Security evaluation
62.
security log analysis
63.
security management
64.
security model
65.
security monitoring
66.
security notion
67.
security objectives
68.
security of data
69.
security of supply
70.
security operation center
71.
security patterns
72.
security policy
73.
security problem definition
74.
security proof
75.
security protocols
76.
security requirements
77.
security requirements engineering
78.
security risk assessment
79.
security risk management
80.
security strategies
81.
security systems for military objects
82.
security testing
83.
security training
84.
security verification
85.
social security planning
86.
societal security
87.
system of economic security
88.
system security
89.
terrorism security
90.
transmission System Security
91.
voting privacy and security
92.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
93.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT