Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security research (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/227)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Hunting for vulnerabilities : call for European protection of security researchers
Rampašek, Michal
;
Andraško, Jozef
;
Sokol, Pavol
;
Hamulak, Ondrej
Journal of Cybersecurity
2026
/
art. tyag002 ; 18 p
https://doi.org/10.1093/cybsec/tyag002
https://academic.oup.com/cybersecurity/article/12/1/tyag002/8449232
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
222
1.
security research
2.
ad-hoc sensor networks security
3.
Automatic Security Verification
4.
Blockchain security
5.
cache security
6.
cloud security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
high level of security
32.
Homeland security
33.
human security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
maritime cyber security
46.
maritime cyber security operations centers
47.
Maritime Security Operations Center (M-SOC)
48.
medium level of security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion
77.
Security Assertion Mining
78.
security closure
79.
Security Coverage
80.
security dataset
81.
security dilemma
82.
Security evaluation
83.
security evaluation instruments
84.
Security Level Evaluation
85.
Security limitations
86.
security log analysis
87.
security management
88.
security model
89.
security monitoring
90.
security notion
91.
security objectives
92.
security of data
93.
security of supply
94.
security operation center
95.
security operations center
96.
security patterns
97.
security policy
98.
security problem definition
99.
security proof
100.
security protocols
101.
security requirements
102.
security requirements engineering
103.
security risk assessment
104.
security risk management
105.
security risks
106.
security science and technology
107.
security strategies
108.
security systems for military objects
109.
security testing
110.
security training
111.
security verification
112.
security-by-design
113.
social security planning
114.
societal security
115.
software security
116.
software security level
117.
software security subcharacteristics
118.
sufficient level of security
119.
system of economic security
120.
system security
121.
terrorism security
122.
transmission System Security
123.
voting privacy and security
124.
Action design research
125.
action research
126.
agriculture applied research
127.
archival research
128.
biomedical research
129.
business model research
130.
commercialization of publicly funded research
131.
Community-based research
132.
comparative welfare research
133.
contemporary research
134.
critical research
135.
design science research
136.
desk research
137.
economy of research
138.
emerging research
139.
empirical trust research
140.
entrepreneurship research
141.
ergonomic research
142.
EU Horizon 2020 research project GRACE (Integrated oil spill response actions and environmental effects)
143.
European Code of Conduct for Research Integrity
144.
European research area
145.
Fish Research
146.
future research
147.
future research directions
148.
Information Systems research
149.
international research
150.
key research index
151.
longitudinal research
152.
market research
153.
ministry of education and research
154.
mixed method research
155.
new research direction
156.
operations research
157.
ownership research
158.
park research
159.
participatory action research
160.
public research funding
161.
public research groups
162.
public sector accounting research
163.
qualitative research
164.
qualitative research methods
165.
R&D (research and development)
166.
research
167.
research activities
168.
research and development
169.
research and development (R&D)
170.
research and development jobs
171.
research and industrial policy
172.
research and training scenarios
173.
research areas
174.
research avenues
175.
research centre
176.
research challenges
177.
research design
178.
research environment
179.
research ethics
180.
research funding
181.
research gaps
182.
research impact
183.
research infrastructure
184.
research integration
185.
research integrity
186.
research laboratory
187.
research libraries
188.
research methodologies
189.
research methodology
190.
research methodology and method
191.
research methods
192.
research needs
193.
research network
194.
research oriented teaching
195.
research phiosophies
196.
research priority
197.
research programme
198.
research relevance
199.
research strategies
200.
research traditions
201.
research trends
202.
research universities
203.
research with scale-up
204.
research, development and innovation (RDI)
205.
research-based education
206.
research-funding system
207.
research-oriented learning
208.
research-practice gap
209.
responsible research and innovation
210.
retaining research financing, changes in salary rules; new academic career model
211.
retinal pathology/research
212.
scientific research
213.
state of the art research
214.
survey research
215.
The Joint Research Centre (JRC)
216.
training and research tool
217.
transformative service research
218.
urban design research
219.
urban research and innovation
220.
user research
221.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
222.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
subject term
5
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Consortium for Political Research (ECPR)
4.
Nordic Energy Research
5.
Research and Education in Mechatronics (REM 2008)
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT