Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
medium level of security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/300)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Method for determining the security level of software
Hovorushchenko, Tetiana
;
Voichur, Yurii
;
Medzatyi, Dmytro
;
Boyarchuk, Artem
;
Hnatchuk, Alina
IntelITSIS 2024 : 5th International Workshop on Intelligent Information Technologies and Systems of Information Security, March 28, 2024 : proceedings
2024
/
p. 72-85 : ill
https://ceur-ws.org/Vol-3675/
Article at Scopus
book article
Number of records 1, displaying
1 - 1
keyword
298
1.
medium level of security
2.
high level of security
3.
initial level of security
4.
software security level
5.
sufficient level of security
6.
logic level and high level BDDs
7.
ceramic filter medium
8.
defined medium
9.
defined rich medium
10.
dual-phase medium-entropy alloy
11.
effective medium
12.
implementation of IFRS for small and medium-sized entities (SMEs)
13.
inhomogeneous medium
14.
medium access control
15.
medium access control (MAC)
16.
medium alkalinity
17.
medium density fibreboard (MDF) cracking
18.
medium optimization
19.
medium with damages
20.
medium with microstructure
21.
medium voltage
22.
medium voltage insulator
23.
medium voltage overhead lines
24.
medium voltage power cables
25.
microstructured medium
26.
safety activities at small and medium-sized enterprises
27.
safety in small and medium-sized enterprises
28.
small and medium enterprises
29.
small and medium enterprises (SME)
30.
small and medium sized enterprises (SMEs)
31.
small and medium-sized enterprise
32.
small and medium-sized enterprise (sme)
33.
small and medium-sized enterprises
34.
small- and medium-sized enterprises
35.
small and medium-sized enterprises (SME)
36.
Small and Medium-sized Enterprises (SMEs)
37.
small and medium-sized ports
38.
small and medium-sized seaports
39.
Small to medium-sized enterprises
40.
SMEs (small and medium size companies)
41.
two-phase medium
42.
ad-hoc sensor networks security
43.
Automatic Security Verification
44.
Blockchain security
45.
cache security
46.
communication system security
47.
comprehensive system of economic security
48.
computer security
49.
cooperative security dilemma
50.
cyber security
51.
cyber security education
52.
cyber security exercises
53.
cyber security monitoring
54.
cyber security strategies
55.
cyber-security
56.
data and information security
57.
data security
58.
development of security cameras
59.
digital security practices
60.
drinking water security
61.
economic security
62.
economic security of enterprise
63.
emotional security
64.
energy security
65.
energy security indicator
66.
Estonian information security standard
67.
graded security
68.
hardware security
69.
hardware security primitive
70.
Homeland security
71.
human security
72.
information security
73.
information security and privacy
74.
internal security
75.
international security
76.
investment and innovation security
77.
IPv6 security
78.
IT security
79.
IT security management
80.
job security
81.
long-term security
82.
maritime cyber security
83.
maritime cyber security operations centers
84.
Maritime Security Operations Center (M-SOC)
85.
metadata model for security measures
86.
Middle Eastern security
87.
Mobile security
88.
national cyber security strategy
89.
national security
90.
NATO. Science for Peace and Security Program
91.
network security
92.
network security monitoring
93.
OSCE (Organization for Security and Co-operation in Europe)
94.
passenger’s security
95.
policy-based routing security
96.
political and security cultures
97.
post-quantum security
98.
power system security
99.
quantitative security
100.
regional security
101.
RISC-V Security Verification
102.
Safety and Security in Sea Transportation
103.
safety and security testing
104.
security
105.
security adaptation
106.
security alert prioritization
107.
security analysis
108.
security and justice (AFSJ)
109.
Security and political science
110.
security and privacy
111.
security and privacy in smart grids
112.
Security Assertion Mining
113.
security closure
114.
Security Coverage
115.
security dataset
116.
security dilemma
117.
Security evaluation
118.
security evaluation instruments
119.
Security limitations
120.
security log analysis
121.
security management
122.
security model
123.
security monitoring
124.
security notion
125.
security objectives
126.
security of data
127.
security of supply
128.
security operation center
129.
security operations center
130.
security patterns
131.
security policy
132.
security problem definition
133.
security proof
134.
security protocols
135.
security requirements
136.
security requirements engineering
137.
security research
138.
security risk assessment
139.
security risk management
140.
security risks
141.
security science and technology
142.
security strategies
143.
security systems for military objects
144.
security testing
145.
security training
146.
security verification
147.
security-by-design
148.
social security planning
149.
societal security
150.
software security
151.
software security subcharacteristics
152.
system of economic security
153.
system security
154.
terrorism security
155.
transmission System Security
156.
voting privacy and security
157.
absolute sea level
158.
airport level of service
159.
arousal level
160.
assurance level
161.
behaviour level test generation
162.
bi-level optimization
163.
CO2 level in classrooms
164.
CO2 level in classrooms and kindergartens
165.
confidence level
166.
country-level logistics
167.
Cross-level Modeling of Faults in Digital Systems
168.
customer compatibility level
169.
deep level
170.
deep level traps
171.
determination of the CO2 level
172.
determining the level of creatine
173.
digitalisation level
174.
distribution-level phasor measurement units (D-PMUs)
175.
education level
176.
exposure level
177.
extreme penetration level of non synchronous generation
178.
extreme sea-level prediction
179.
extreme water level
180.
gate-level analysis
181.
gate-level circuit abstraction
182.
gate-level netlist
183.
graduate level
184.
Hierarchical Multi-level Test Generation
185.
hierarchical two-level analysis
186.
high level DD (HLDD)
187.
high level synthesis
188.
high-level control fault model
189.
high-level control faults
190.
high-level decision diagram
191.
high-level decision diagrams
192.
high-level decision diagrams (HLDD) synthesis
193.
High-level Decision Diagrams for Modeling Digital Systems
194.
high-level expert group on AI
195.
high-level fault coverage
196.
high-level fault model
197.
high-level fault simulation
198.
high-level functional fault model
199.
high-level synthesis
200.
High-Level Synthesis (HLS)
201.
high-level synthesis for test
202.
high-level test data generation
203.
improvement of safety level at enterprises
204.
improvement of safety level at SMEs
205.
lake level
206.
level control
207.
level crossing
208.
level ice
209.
Level of paranoia
210.
level set
211.
level(s) methodology
212.
level-crossing ADC
213.
level-crossing analog-to-digital converters
214.
level-crossing analogue-to-digital converters (ADC)
215.
logic level
216.
lower trophic level models
217.
low-level control system transportation
218.
low-level fault redundancy
219.
low-level radiation
220.
Low-level RF EMF
221.
macro-level industry influences
222.
mean sea level
223.
module level power electronics (MLPE)
224.
module-level power electronics (MLPE)
225.
multi-level governance
226.
multi-level inverter
227.
multi-level leadership
228.
multi-level modeling
229.
multi-level perspective
230.
multi-level perspective of sustainability transitions
231.
multi-level selection and processing environment
232.
noise level
233.
operational level (OL)
234.
Price level
235.
Process/Product Sigma Performance Level (PSPL)
236.
PV module level power electronics
237.
register transfer and gate level simulation
238.
Register Transfer Level - RTL
239.
register transfer level modeling decision diagams
240.
register-transfer level
241.
relative sea level
242.
relative sea level changes
243.
relative sea-level change
244.
RH level
245.
school-level policies
246.
sea level
247.
sea level forecasting
248.
sea level prediction
249.
sea level rise
250.
sea level series
251.
sea level trend
252.
sea level: variations and mean
253.
sea-level
254.
sea-level changes
255.
sea-level equation
256.
Sea-level indicator
257.
sea-level prediction
258.
sea-level rise
259.
sea-level trend
260.
service-level agreements
261.
seven-level multilevel
262.
Sigma performance level
263.
skin conductance level
264.
software level TMR
265.
steel-level bureaucracy
266.
strategic level decision makers
267.
system level
268.
system level hazards
269.
system level simulation
270.
system level test
271.
system planning level
272.
system-level analysis
273.
system-level evaluation
274.
task-level uninterrupted presence
275.
three-level
276.
three-level converter
277.
three-level inverter
278.
three-level neutral-point-clamped inverter
279.
three-level NPC inverter
280.
three-level T-type
281.
three-level T-type inverter
282.
three-level T-type quasi-impedance-source inverter (3L-T-type qZSI)
283.
three-level voltage inverter
284.
Tool Confidence Level
285.
top-level domain
286.
transaction-level modeling
287.
treatment level
288.
two-level inverter
289.
undergraduate level
290.
university level informatics education
291.
water level
292.
water level fluctuation
293.
water level measurements
294.
water level reconstruction
295.
water-level changes
296.
voltage level
297.
voltage level optimisation
298.
3-level T-type inverter
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT