Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
information security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
6
Vaata veel..
(3/252)
Ekspordi
ekspordi kõik päringu tulemused
(6)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Artificial intelligence approach to identifying propaganda techniques and objects, taking into account ethical and legal aspects
Molchanova, Maryna
;
Dutt, Pawan Kumar
Computer Systems and Information Technologies
2025
/
p. 97-103
https://doi.org/10.31891/csit-2025-2-11
https://csitjournal.khmnu.edu.ua/index.php/csit/article/view/423
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
2
artikkel kogumikus
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
artikkel kogumikus
3
artikkel kogumikus
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
artikkel kogumikus
4
artikkel kogumikus EST
/
artikkel kogumikus ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
6
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 6, kuvan
1 - 6
võtmesõna
249
1.
data and information security
2.
Estonian information security standard
3.
information security
4.
information security and privacy
5.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
computer security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
data security
21.
development of security cameras
22.
digital security practices
23.
drinking water security
24.
economic security
25.
economic security of enterprise
26.
emotional security
27.
energy security
28.
energy security indicator
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
initial level of security
36.
internal security
37.
international security
38.
investment and innovation security
39.
IPv6 security
40.
IT security
41.
IT security management
42.
job security
43.
long-term security
44.
maritime cyber security
45.
maritime cyber security operations centers
46.
Maritime Security Operations Center (M-SOC)
47.
medium level of security
48.
metadata model for security measures
49.
Middle Eastern security
50.
Mobile security
51.
national cyber security strategy
52.
national security
53.
NATO. Science for Peace and Security Program
54.
network security
55.
network security monitoring
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
Safety and Security in Sea Transportation
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion Mining
76.
security closure
77.
Security Coverage
78.
security dataset
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security limitations
83.
security log analysis
84.
security management
85.
security model
86.
security monitoring
87.
security notion
88.
security objectives
89.
security of data
90.
security of supply
91.
security operation center
92.
security operations center
93.
security patterns
94.
security policy
95.
security problem definition
96.
security proof
97.
security protocols
98.
security requirements
99.
security requirements engineering
100.
security risk assessment
101.
security risk management
102.
security risks
103.
security science and technology
104.
security strategies
105.
security systems for military objects
106.
security testing
107.
security training
108.
security verification
109.
security-by-design
110.
social security planning
111.
societal security
112.
software security
113.
software security level
114.
software security subcharacteristics
115.
sufficient level of security
116.
system of economic security
117.
system security
118.
terrorism security
119.
transmission System Security
120.
voting privacy and security
121.
access to information
122.
age of information
123.
banking information
124.
building information modelling
125.
building information modeling
126.
Building Information Modeling (BIM)
127.
building information modelling
128.
Building Information Modelling (BIM)
129.
Building Information Modelling (BIM) adoption
130.
business information technology
131.
city information modelling (CIM)
132.
communication channels (information theory)
133.
Community Statistics on Information Society (CSIS)
134.
court information system
135.
critical information infrastructure
136.
Data-information-knowledgewisdom (DIKW)
137.
discrete information bottle-neck
138.
dissemination of information
139.
enterprise information systems
140.
Estonian National Health Information System
141.
estonian national health information system (ENHIS)
142.
Estonian nationwide Health Information System (EHIS)
143.
evolutionary information systems
144.
financial information
145.
general theory of information transfer
146.
Geographic Information System (GIS)
147.
geographical information system
148.
health information exchange
149.
health information purpose
150.
health information sharing maturity
151.
health information systems
152.
Healthcare information systems
153.
high-performance computing systems, Information processing
154.
HL7 Version 3: Reference Information Model (RIM)
155.
ICT (information and communication technology)
156.
information
157.
information analysis
158.
information and communication technologies
159.
Information and Communication Technologies (ICT)
160.
Information and communication technologies (ICT) digitalisation
161.
Information and Communication Technologies (ICT) laws
162.
Information and Communication Technologies (ICTs)
163.
Information and Communication Technologies for Development
164.
information and communication technology
165.
information and communication technology (ICT)
166.
information and communications technology
167.
information and consultation
168.
information architecture
169.
information asymmetry
170.
information commons
171.
information communication technology
172.
information content
173.
information control
174.
information dissemination
175.
information economy
176.
information entropy
177.
information exchange
178.
information extraction
179.
information filtering
180.
information flow control
181.
information fusion
182.
information governance
183.
information integration
184.
information literacy
185.
information literacy cooperation
186.
information logistics
187.
information management
188.
information measures
189.
information model
190.
information model-based urban planning
191.
information polity
192.
information potential
193.
information preprocessing
194.
information processing
195.
information processing system
196.
information rate
197.
information realities
198.
information retrieval
199.
information revolution
200.
information seeking behaviour
201.
information sharing
202.
information society
203.
Information sufficiency
204.
information system
205.
Information System Authority (RIA)
206.
information systems
207.
information systems development
208.
Information Systems research
209.
information technologies
210.
Information technology
211.
information technology (IT)
212.
information theory
213.
information to individual consumers
214.
information tool
215.
information use
216.
information value
217.
information warfare
218.
information visualization
219.
information volume
220.
Information-seeking activity
221.
intelligent information technology
222.
interoperability and evolutionary criteria of information systems
223.
laboratory information management system (LIMS)
224.
laboratory information management systems
225.
LIMS (laboratory information management systems)
226.
medical information
227.
Medical information policy
228.
middleware (for subscription and distribution of situational information)
229.
mobile information system
230.
multilingual information retrieval
231.
multimodal information
232.
open architecture for information exchange
233.
perception of visual information
234.
performance information
235.
performance information use
236.
philosophy of information
237.
process modeling and information systems within the extended enterprise
238.
provision of information to workers
239.
quality evaluation of scientific information
240.
real time information
241.
real-time information
242.
Reaxys Chemistry database information
243.
scientific information
244.
SIS II (Schengen Information System II)
245.
tactile information
246.
traffic information system (TIS)
247.
tree information database
248.
website information
249.
VIS (Visa Information System)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ märksõna
1
1.
Building Information Modeling
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT