Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
information security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
5
Vaata veel..
(3/231)
Ekspordi
ekspordi kõik päringu tulemused
(5)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
artikkel kogumikus
2
artikkel kogumikus
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
artikkel kogumikus
3
artikkel kogumikus EST
/
artikkel kogumikus ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 5, kuvan
1 - 5
võtmesõna
228
1.
Estonian information security standard
2.
information security
3.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
data security
19.
development of security cameras
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
metadata model for security measures
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
Security and political science
62.
security and privacy
63.
security and privacy in smart grids
64.
Security Assertion Mining
65.
security closure
66.
Security Coverage
67.
security dataset
68.
security dilemma
69.
Security evaluation
70.
security evaluation instruments
71.
Security limitations
72.
security log analysis
73.
security management
74.
security model
75.
security monitoring
76.
security notion
77.
security objectives
78.
security of data
79.
security of supply
80.
security operation center
81.
security operations center
82.
security patterns
83.
security policy
84.
security problem definition
85.
security proof
86.
security protocols
87.
security requirements
88.
security requirements engineering
89.
security risk assessment
90.
security risk management
91.
security risks
92.
security strategies
93.
security systems for military objects
94.
security testing
95.
security training
96.
security verification
97.
security-by-design
98.
social security planning
99.
societal security
100.
system of economic security
101.
system security
102.
terrorism security
103.
transmission System Security
104.
voting privacy and security
105.
access to information
106.
age of information
107.
banking information
108.
building information modelling
109.
building information modeling
110.
Building Information Modeling (BIM)
111.
building information modelling
112.
Building Information Modelling (BIM)
113.
Building Information Modelling (BIM) adoption
114.
business information technology
115.
city information modelling (CIM)
116.
communication channels (information theory)
117.
Community Statistics on Information Society (CSIS)
118.
court information system
119.
critical information infrastructure
120.
Data-information-knowledgewisdom (DIKW)
121.
discrete information bottle-neck
122.
dissemination of information
123.
enterprise information systems
124.
Estonian National Health Information System
125.
estonian national health information system (ENHIS)
126.
Estonian nationwide Health Information System (EHIS)
127.
evolutionary information systems
128.
financial information
129.
general theory of information transfer
130.
Geographic Information System (GIS)
131.
geographical information system
132.
health information exchange
133.
health information purpose
134.
health information sharing maturity
135.
health information systems
136.
Healthcare information systems
137.
high-performance computing systems, Information processing
138.
HL7 Version 3: Reference Information Model (RIM)
139.
ICT (information and communication technology)
140.
information
141.
information analysis
142.
information and communication technologies
143.
Information and Communication Technologies (ICT)
144.
Information and communication technologies (ICT) digitalisation
145.
Information and Communication Technologies (ICT) laws
146.
Information and Communication Technologies (ICTs)
147.
Information and Communication Technologies for Development
148.
information and communication technology
149.
information and communication technology (ICT)
150.
information and communications technology
151.
information architecture
152.
information asymmetry
153.
information commons
154.
information communication technology
155.
information content
156.
information control
157.
information dissemination
158.
information economy
159.
information entropy
160.
information exchange
161.
information extraction
162.
information filtering
163.
information flow control
164.
information fusion
165.
information governance
166.
information integration
167.
information literacy
168.
information literacy cooperation
169.
information logistics
170.
information management
171.
information measures
172.
information model
173.
information model-based urban planning
174.
information polity
175.
information potential
176.
information processing
177.
information processing system
178.
information rate
179.
information realities
180.
information retrieval
181.
information revolution
182.
information seeking behaviour
183.
information sharing
184.
information society
185.
Information sufficiency
186.
information system
187.
Information System Authority (RIA)
188.
information systems
189.
information systems development
190.
Information Systems research
191.
information technologies
192.
Information technology
193.
information technology (IT)
194.
information theory
195.
information to individual consumers
196.
information tool
197.
information value
198.
information warfare
199.
information visualization
200.
information volume
201.
Information-seeking activity
202.
intelligent information technology
203.
interoperability and evolutionary criteria of information systems
204.
laboratory information management system (LIMS)
205.
laboratory information management systems
206.
LIMS (laboratory information management systems)
207.
medical information
208.
Medical information policy
209.
middleware (for subscription and distribution of situational information)
210.
mobile information system
211.
multilingual information retrieval
212.
multimodal information
213.
open architecture for information exchange
214.
perception of visual information
215.
performance information
216.
performance information use
217.
philosophy of information
218.
process modeling and information systems within the extended enterprise
219.
quality evaluation of scientific information
220.
real time information
221.
real-time information
222.
Reaxys Chemistry database information
223.
scientific information
224.
SIS II (Schengen Information System II)
225.
traffic information system (TIS)
226.
tree information database
227.
website information
228.
VIS (Visa Information System)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ märksõna
1
1.
Building Information Modeling
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT