Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Information and information security (pealkiri)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(3/257)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Information and information security
Henno, Jaak
Third Workshop on Software Quality Analysis, Monitoring, Improvement and Applications SQAMIA 2014 : Lovran, Croatia, September 19-22, 2014 : proceedings
2014
/
p. 23-28 : ill
https://ceur-ws.org/Vol-1266/SQAMIA2014Proceedings.pdf
Conference proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
Information and information security
Henno, Jaak
Information modelling and knowledge bases XXVII
2016
/
p. 103-120
https://doi.org/10.3233/978-1-61499-611-8-103
Article collection metrics at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
254
1.
data and information security
2.
Estonian information security standard
3.
information security and privacy
4.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
5.
information security
6.
access to information
7.
age of information
8.
banking information
9.
building information modelling
10.
building information modeling
11.
Building Information Modeling (BIM)
12.
building information modelling
13.
Building Information Modelling (BIM)
14.
Building Information Modelling (BIM) adoption
15.
business information technology
16.
city information modelling (CIM)
17.
communication channels (information theory)
18.
Community Statistics on Information Society (CSIS)
19.
court information system
20.
critical information infrastructure
21.
Data-information-knowledgewisdom (DIKW)
22.
discrete information bottle-neck
23.
dissemination of information
24.
enterprise information systems
25.
Estonian National Health Information System
26.
estonian national health information system (ENHIS)
27.
Estonian nationwide Health Information System (EHIS)
28.
evolutionary information systems
29.
financial information
30.
general theory of information transfer
31.
Geographic Information System (GIS)
32.
geographical information system
33.
health information exchange
34.
health information purpose
35.
health information sharing maturity
36.
health information systems
37.
Healthcare information systems
38.
high-performance computing systems, Information processing
39.
HL7 Version 3: Reference Information Model (RIM)
40.
ICT (information and communication technology)
41.
information
42.
information analysis
43.
information and communication technologies
44.
Information and Communication Technologies (ICT)
45.
Information and communication technologies (ICT) digitalisation
46.
Information and Communication Technologies (ICT) laws
47.
Information and Communication Technologies (ICTs)
48.
Information and Communication Technologies for Development
49.
information and communication technology
50.
information and communication technology (ICT)
51.
information and communications technology
52.
information and consultation
53.
information architecture
54.
information asymmetry
55.
information commons
56.
information communication technology
57.
information content
58.
information control
59.
information dissemination
60.
information economy
61.
information entropy
62.
information exchange
63.
information extraction
64.
information filtering
65.
information flow control
66.
information fusion
67.
information governance
68.
information integration
69.
information literacy
70.
information literacy cooperation
71.
information logistics
72.
information management
73.
information measures
74.
information model
75.
information model-based urban planning
76.
information polity
77.
information potential
78.
information preprocessing
79.
information processing
80.
information processing system
81.
information rate
82.
information realities
83.
information retrieval
84.
information revolution
85.
information seeking behaviour
86.
information sharing
87.
information society
88.
Information sufficiency
89.
information system
90.
Information System Authority (RIA)
91.
information systems
92.
information systems development
93.
Information Systems research
94.
information technologies
95.
Information technology
96.
information technology (IT)
97.
information theory
98.
information to individual consumers
99.
information tool
100.
information use
101.
information value
102.
information war
103.
information warfare
104.
information visualization
105.
information volume
106.
Information-seeking activity
107.
intelligent information technology
108.
interoperability and evolutionary criteria of information systems
109.
laboratory information management system (LIMS)
110.
laboratory information management systems
111.
LIMS (laboratory information management systems)
112.
medical information
113.
Medical information policy
114.
middleware (for subscription and distribution of situational information)
115.
mobile information system
116.
multilingual information retrieval
117.
multimodal information
118.
open architecture for information exchange
119.
perception of visual information
120.
performance information
121.
performance information use
122.
philosophy of information
123.
process modeling and information systems within the extended enterprise
124.
provision of information to workers
125.
quality evaluation of scientific information
126.
real time information
127.
real-time information
128.
Reaxys Chemistry database information
129.
scientific information
130.
SIS II (Schengen Information System II)
131.
tactile information
132.
traffic information system (TIS)
133.
tree information database
134.
website information
135.
VIS (Visa Information System)
136.
ad-hoc sensor networks security
137.
Automatic Security Verification
138.
Blockchain security
139.
cache security
140.
cloud security
141.
communication system security
142.
comprehensive system of economic security
143.
computer security
144.
cooperative security dilemma
145.
cyber security
146.
cyber security education
147.
cyber security exercises
148.
cyber security monitoring
149.
cyber security strategies
150.
cyber-security
151.
data security
152.
development of security cameras
153.
digital security practices
154.
drinking water security
155.
economic security
156.
economic security of enterprise
157.
emotional security
158.
energy security
159.
energy security indicator
160.
graded security
161.
hardware security
162.
hardware security primitive
163.
high level of security
164.
Homeland security
165.
human security
166.
initial level of security
167.
internal security
168.
international security
169.
investment and innovation security
170.
IPv6 security
171.
IT security
172.
IT security management
173.
job security
174.
long-term security
175.
maritime cyber security
176.
maritime cyber security operations centers
177.
Maritime Security Operations Center (M-SOC)
178.
medium level of security
179.
metadata model for security measures
180.
Middle Eastern security
181.
Mobile security
182.
national cyber security strategy
183.
national security
184.
NATO. Science for Peace and Security Program
185.
network security
186.
network security monitoring
187.
OSCE (Organization for Security and Co-operation in Europe)
188.
passenger’s security
189.
policy-based routing security
190.
political and security cultures
191.
post-quantum security
192.
power system security
193.
quantitative security
194.
regional security
195.
RISC-V Security Verification
196.
Safety and Security in Sea Transportation
197.
safety and security testing
198.
security
199.
security adaptation
200.
security alert prioritization
201.
security analysis
202.
security and justice (AFSJ)
203.
Security and political science
204.
security and privacy
205.
security and privacy in smart grids
206.
Security Assertion
207.
Security Assertion Mining
208.
security closure
209.
Security Coverage
210.
security dataset
211.
security dilemma
212.
Security evaluation
213.
security evaluation instruments
214.
Security Level Evaluation
215.
Security limitations
216.
security log analysis
217.
security management
218.
security model
219.
security monitoring
220.
security notion
221.
security objectives
222.
security of data
223.
security of supply
224.
security operation center
225.
security operations center
226.
security patterns
227.
security policy
228.
security problem definition
229.
security proof
230.
security protocols
231.
security requirements
232.
security requirements engineering
233.
security research
234.
security risk assessment
235.
security risk management
236.
security risks
237.
security science and technology
238.
security strategies
239.
security systems for military objects
240.
security testing
241.
security training
242.
security verification
243.
security-by-design
244.
social security planning
245.
societal security
246.
software security
247.
software security level
248.
software security subcharacteristics
249.
sufficient level of security
250.
system of economic security
251.
system security
252.
terrorism security
253.
transmission System Security
254.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ märksõna
1
1.
Building Information Modeling
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT