Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
initial level of security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/277)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Method for determining the security level of software
Hovorushchenko, Tetiana
;
Voichur, Yurii
;
Medzatyi, Dmytro
;
Boyarchuk, Artem
;
Hnatchuk, Alina
IntelITSIS 2024 : 5th International Workshop on Intelligent Information Technologies and Systems of Information Security, March 28, 2024 : proceedings
2024
/
p. 72-85 : ill
https://ceur-ws.org/Vol-3675/
Article at Scopus
book article
Number of records 1, displaying
1 - 1
keyword
275
1.
initial level of security
2.
high level of security
3.
medium level of security
4.
software security level
5.
sufficient level of security
6.
logic level and high level BDDs
7.
initial commitment
8.
initial conditions
9.
initial data
10.
initial data for AI
11.
initial data model
12.
initial moisture content
13.
initial planning or design stage
14.
initial settings
15.
initial solution to the linear programming problem
16.
Initial state
17.
method of initial parameters
18.
method of initial parameters in differential form
19.
ad-hoc sensor networks security
20.
Automatic Security Verification
21.
Blockchain security
22.
cache security
23.
communication system security
24.
comprehensive system of economic security
25.
computer security
26.
cooperative security dilemma
27.
cyber security
28.
cyber security education
29.
cyber security exercises
30.
cyber security monitoring
31.
cyber security strategies
32.
cyber-security
33.
data and information security
34.
data security
35.
development of security cameras
36.
digital security practices
37.
drinking water security
38.
economic security
39.
economic security of enterprise
40.
emotional security
41.
energy security
42.
energy security indicator
43.
Estonian information security standard
44.
graded security
45.
hardware security
46.
hardware security primitive
47.
Homeland security
48.
human security
49.
information security
50.
information security and privacy
51.
internal security
52.
international security
53.
investment and innovation security
54.
IPv6 security
55.
IT security
56.
IT security management
57.
job security
58.
long-term security
59.
maritime cyber security
60.
maritime cyber security operations centers
61.
Maritime Security Operations Center (M-SOC)
62.
metadata model for security measures
63.
Middle Eastern security
64.
Mobile security
65.
national cyber security strategy
66.
national security
67.
NATO. Science for Peace and Security Program
68.
network security
69.
network security monitoring
70.
OSCE (Organization for Security and Co-operation in Europe)
71.
passenger’s security
72.
policy-based routing security
73.
political and security cultures
74.
post-quantum security
75.
power system security
76.
quantitative security
77.
regional security
78.
RISC-V Security Verification
79.
Safety and Security in Sea Transportation
80.
safety and security testing
81.
security
82.
security adaptation
83.
security alert prioritization
84.
security analysis
85.
security and justice (AFSJ)
86.
Security and political science
87.
security and privacy
88.
security and privacy in smart grids
89.
Security Assertion Mining
90.
security closure
91.
Security Coverage
92.
security dataset
93.
security dilemma
94.
Security evaluation
95.
security evaluation instruments
96.
Security limitations
97.
security log analysis
98.
security management
99.
security model
100.
security monitoring
101.
security notion
102.
security objectives
103.
security of data
104.
security of supply
105.
security operation center
106.
security operations center
107.
security patterns
108.
security policy
109.
security problem definition
110.
security proof
111.
security protocols
112.
security requirements
113.
security requirements engineering
114.
security research
115.
security risk assessment
116.
security risk management
117.
security risks
118.
security science and technology
119.
security strategies
120.
security systems for military objects
121.
security testing
122.
security training
123.
security verification
124.
security-by-design
125.
social security planning
126.
societal security
127.
software security
128.
software security subcharacteristics
129.
system of economic security
130.
system security
131.
terrorism security
132.
transmission System Security
133.
voting privacy and security
134.
absolute sea level
135.
airport level of service
136.
arousal level
137.
assurance level
138.
behaviour level test generation
139.
bi-level optimization
140.
CO2 level in classrooms
141.
CO2 level in classrooms and kindergartens
142.
confidence level
143.
country-level logistics
144.
Cross-level Modeling of Faults in Digital Systems
145.
customer compatibility level
146.
deep level
147.
deep level traps
148.
determination of the CO2 level
149.
determining the level of creatine
150.
digitalisation level
151.
distribution-level phasor measurement units (D-PMUs)
152.
education level
153.
exposure level
154.
extreme penetration level of non synchronous generation
155.
extreme sea-level prediction
156.
extreme water level
157.
gate-level analysis
158.
gate-level circuit abstraction
159.
gate-level netlist
160.
graduate level
161.
Hierarchical Multi-level Test Generation
162.
hierarchical two-level analysis
163.
high level DD (HLDD)
164.
high level synthesis
165.
high-level control fault model
166.
high-level control faults
167.
high-level decision diagram
168.
high-level decision diagrams
169.
high-level decision diagrams (HLDD) synthesis
170.
High-level Decision Diagrams for Modeling Digital Systems
171.
high-level expert group on AI
172.
high-level fault coverage
173.
high-level fault model
174.
high-level fault simulation
175.
high-level functional fault model
176.
high-level synthesis
177.
High-Level Synthesis (HLS)
178.
high-level synthesis for test
179.
high-level test data generation
180.
improvement of safety level at enterprises
181.
improvement of safety level at SMEs
182.
lake level
183.
level control
184.
level crossing
185.
level ice
186.
Level of paranoia
187.
level set
188.
level(s) methodology
189.
level-crossing ADC
190.
level-crossing analog-to-digital converters
191.
level-crossing analogue-to-digital converters (ADC)
192.
logic level
193.
lower trophic level models
194.
low-level control system transportation
195.
low-level fault redundancy
196.
low-level radiation
197.
Low-level RF EMF
198.
macro-level industry influences
199.
mean sea level
200.
module level power electronics (MLPE)
201.
module-level power electronics (MLPE)
202.
multi-level governance
203.
multi-level inverter
204.
multi-level leadership
205.
multi-level modeling
206.
multi-level perspective
207.
multi-level perspective of sustainability transitions
208.
multi-level selection and processing environment
209.
noise level
210.
operational level (OL)
211.
Price level
212.
Process/Product Sigma Performance Level (PSPL)
213.
PV module level power electronics
214.
register transfer and gate level simulation
215.
Register Transfer Level - RTL
216.
register transfer level modeling decision diagams
217.
register-transfer level
218.
relative sea level
219.
relative sea level changes
220.
relative sea-level change
221.
RH level
222.
school-level policies
223.
sea level
224.
sea level forecasting
225.
sea level prediction
226.
sea level rise
227.
sea level series
228.
sea level trend
229.
sea level: variations and mean
230.
sea-level
231.
sea-level changes
232.
sea-level equation
233.
Sea-level indicator
234.
sea-level prediction
235.
sea-level rise
236.
sea-level trend
237.
service-level agreements
238.
seven-level multilevel
239.
Sigma performance level
240.
skin conductance level
241.
software level TMR
242.
steel-level bureaucracy
243.
strategic level decision makers
244.
system level
245.
system level hazards
246.
system level simulation
247.
system level test
248.
system planning level
249.
system-level analysis
250.
system-level evaluation
251.
task-level uninterrupted presence
252.
three-level
253.
three-level converter
254.
three-level inverter
255.
three-level neutral-point-clamped inverter
256.
three-level NPC inverter
257.
three-level T-type
258.
three-level T-type inverter
259.
three-level T-type quasi-impedance-source inverter (3L-T-type qZSI)
260.
three-level voltage inverter
261.
Tool Confidence Level
262.
top-level domain
263.
transaction-level modeling
264.
treatment level
265.
two-level inverter
266.
undergraduate level
267.
university level informatics education
268.
water level
269.
water level fluctuation
270.
water level measurements
271.
water level reconstruction
272.
water-level changes
273.
voltage level
274.
voltage level optimisation
275.
3-level T-type inverter
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT