Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
information security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
5
Vaata veel..
(3/224)
Ekspordi
ekspordi kõik päringu tulemused
(5)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
artikkel kogumikus
2
artikkel kogumikus
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
artikkel kogumikus
3
artikkel kogumikus EST
/
artikkel kogumikus ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 5, kuvan
1 - 5
võtmesõna
221
1.
Estonian information security standard
2.
information security
3.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security strategies
16.
cyber-security
17.
data security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
internal security
30.
international security
31.
investment and innovation security
32.
IPv6 security
33.
IT security
34.
IT security management
35.
job security
36.
long-term security
37.
metadata model for security measures
38.
Middle Eastern security
39.
Mobile security
40.
national cyber security strategy
41.
national security
42.
NATO. Science for Peace and Security Program
43.
network security
44.
network security monitoring
45.
OSCE (Organization for Security and Co-operation in Europe)
46.
passenger’s security
47.
policy-based routing security
48.
political and security cultures
49.
post-quantum security
50.
power system security
51.
quantitative security
52.
regional security
53.
RISC-V Security Verification
54.
safety and security testing
55.
security
56.
security adaptation
57.
security alert prioritization
58.
security analysis
59.
security and justice (AFSJ)
60.
security and privacy
61.
security and privacy in smart grids
62.
Security Assertion Mining
63.
security closure
64.
Security Coverage
65.
security dataset
66.
security dilemma
67.
Security evaluation
68.
security evaluation instruments
69.
security log analysis
70.
security management
71.
security model
72.
security monitoring
73.
security notion
74.
security objectives
75.
security of data
76.
security of supply
77.
security operation center
78.
security operations center
79.
security patterns
80.
security policy
81.
security problem definition
82.
security proof
83.
security protocols
84.
security requirements
85.
security requirements engineering
86.
security risk assessment
87.
security risk management
88.
security strategies
89.
security systems for military objects
90.
security testing
91.
security training
92.
security verification
93.
security-by-design
94.
social security planning
95.
societal security
96.
system of economic security
97.
system security
98.
terrorism security
99.
transmission System Security
100.
voting privacy and security
101.
access to information
102.
age of information
103.
banking information
104.
building information modelling
105.
building information modeling
106.
Building Information Modeling (BIM)
107.
building information modelling
108.
Building Information Modelling (BIM)
109.
Building Information Modelling (BIM) adoption
110.
business information technology
111.
city information modelling (CIM)
112.
communication channels (information theory)
113.
Community Statistics on Information Society (CSIS)
114.
court information system
115.
critical information infrastructure
116.
Data-information-knowledgewisdom (DIKW)
117.
discrete information bottle-neck
118.
dissemination of information
119.
enterprise information systems
120.
Estonian National Health Information System
121.
Estonian nationwide Health Information System (EHIS)
122.
evolutionary information systems
123.
financial information
124.
general theory of information transfer
125.
Geographic Information System (GIS)
126.
Geographic Information Systems (GIS)
127.
geographical information system
128.
health information exchange
129.
health information purpose
130.
health information sharing maturity
131.
health information systems
132.
Healthcare information systems
133.
high-performance computing systems, Information processing
134.
HL7 Version 3: Reference Information Model (RIM)
135.
ICT (information and communication technology)
136.
information
137.
information and communication technologies
138.
Information and communication technologies (ICT) digitalisation
139.
Information and Communication Technologies (ICT) laws
140.
Information and Communication Technologies (ICTs)
141.
Information and Communication Technologies for Development
142.
information and communication technology
143.
information and communication technology (ICT)
144.
information and communications technology
145.
information architecture
146.
information asymmetry
147.
information commons
148.
information communication technology
149.
information content
150.
information control
151.
information dissemination
152.
information economy
153.
information entropy
154.
information exchange
155.
information extraction
156.
information flow control
157.
information fusion
158.
information governance
159.
information integration
160.
information literacy
161.
information literacy cooperation
162.
information logistics
163.
information management
164.
information measures
165.
information model
166.
information model-based urban planning
167.
information polity
168.
information potential
169.
information processing
170.
information processing system
171.
information rate
172.
information realities
173.
information retrieval
174.
information revolution
175.
information seeking behaviour
176.
information sharing
177.
information society
178.
Information sufficiency
179.
information system
180.
Information System Authority (RIA)
181.
information systems
182.
information systems development
183.
Information Systems research
184.
information technologies
185.
Information technology
186.
information technology (IT)
187.
information theory
188.
information to individual consumers
189.
information tool
190.
information value
191.
information warfare
192.
information visualization
193.
information volume
194.
Information-seeking activity
195.
intelligent information technology
196.
interoperability and evolutionary criteria of information systems
197.
laboratory information management system (LIMS)
198.
laboratory information management systems
199.
LIMS (laboratory information management systems)
200.
medical information
201.
Medical information policy
202.
middleware (for subscription and distribution of situational information)
203.
mobile information system
204.
multilingual information retrieval
205.
multimodal information
206.
open architecture for information exchange
207.
perception of visual information
208.
performance information
209.
performance information use
210.
philosophy of information
211.
process modeling and information systems within the extended enterprise
212.
quality evaluation of scientific information
213.
real time information
214.
real-time information
215.
Reaxys Chemistry database information
216.
scientific information
217.
SIS II (Schengen Information System II)
218.
traffic information system (TIS)
219.
tree information database
220.
website information
221.
VIS (Visa Information System)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ märksõna
1
1.
Building Information Modeling
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT