Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
computer security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
7
Vaata veel..
(2/176)
Ekspordi
ekspordi kõik päringu tulemused
(7)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
Are the current system engineering practices sufficient to meet cyber crime?
Buldas, Ahto
;
Saarepera, Märt
Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017 : held as part of HCI International 2017, Vancouver, BC, Canada, July 9–14, 2017 : proceedings
2017
/
p. 451-463
https://doi.org/10.1007/978-3-319-58460-7_31
Conference proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
3
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
4
artikkel kogumikus
EU cybersecurity governance – stakeholders and normative intentions towards integration
Kasper, Agnes
The future of the European Union : demisting the debate
2020
/
p. 166−185
https://www.um.edu.mt/library/oar/handle/123456789/52308
https://www.um.edu.mt/library/oar/bitstream/123456789/52308/1/EU_cybersecurity_governance%e2%80%93stakeholders_and_normative_intentions_towards_integration_2020.pdf
artikkel kogumikus
5
artikkel kogumikus EST
/
artikkel kogumikus ENG
Preface
Bellatreche, Ladjel
;
Chernishev, George
;
Corral, Antonio
;
Ouchani, Samir
;
Vain, Jüri
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
/
p. v-vii
https://link.springer.com/content/pdf/bfm:978-3-030-87657-9/1?pdf=chapter%20toc
Article collection metrics at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
6
artikkel kogumikus
The becoming of cyber-military capabilities
Salminen, Mikko
;
Kerttunen, Mika
Routledge handbook of international cybersecurity
2020
/
p. 94-107
https://www.ester.ee/record=b5308475*est
artikkel kogumikus
7
artikkel kogumikus
Towards a Cyber Maastricht : two steps forward, one step back
Kasper, Agnes
;
Vernygora, Vlad Alex
The future of the European Union : demisting the debate
2020
/
p. 186-210
https://www.um.edu.mt/library/oar/handle/123456789/52310
https://www.um.edu.mt/library/oar/bitstream/123456789/52310/1/Towards_a_%e2%80%98Cyber_Maastricht%e2%80%99_two_steps_forward_one_step_back_2020.pdf
artikkel kogumikus
Kirjeid leitud 7, kuvan
1 - 7
võtmesõna
172
1.
computer security
2.
ad-hoc sensor networks security
3.
Automatic Security Verification
4.
Blockchain security
5.
cache security
6.
communication system security
7.
comprehensive system of economic security
8.
cooperative security dilemma
9.
cyber security
10.
cyber security education
11.
cyber security exercises
12.
cyber security strategies
13.
cyber-security
14.
data security
15.
development of security cameras
16.
drinking water security
17.
economic security
18.
economic security of enterprise
19.
emotional security
20.
energy security
21.
energy security indicator
22.
Estonian information security standard
23.
graded security
24.
hardware security
25.
hardware security primitive
26.
human security
27.
information security
28.
internal security
29.
international security
30.
investment and innovation security
31.
IPv6 security
32.
IT security
33.
IT security management
34.
job security
35.
long-term security
36.
metadata model for security measures
37.
Middle Eastern security
38.
Mobile security
39.
national cyber security strategy
40.
national security
41.
NATO. Science for Peace and Security Program
42.
network security
43.
network security monitoring
44.
OSCE (Organization for Security and Co-operation in Europe)
45.
passenger’s security
46.
policy-based routing security
47.
political and security cultures
48.
post-quantum security
49.
power system security
50.
quantitative security
51.
regional security
52.
RISC-V Security Verification
53.
security
54.
security adaptation
55.
security and justice (AFSJ)
56.
security and privacy
57.
security and privacy in smart grids
58.
Security Assertion Mining
59.
security closure
60.
Security Coverage
61.
security dataset
62.
security dilemma
63.
Security evaluation
64.
security evaluation instruments
65.
security log analysis
66.
security management
67.
security model
68.
security monitoring
69.
security notion
70.
security objectives
71.
security of data
72.
security of supply
73.
security operation center
74.
security patterns
75.
security policy
76.
security problem definition
77.
security proof
78.
security protocols
79.
security requirements
80.
security requirements engineering
81.
security risk assessment
82.
security risk management
83.
security strategies
84.
security systems for military objects
85.
security testing
86.
security training
87.
security verification
88.
social security planning
89.
societal security
90.
system of economic security
91.
system security
92.
terrorism security
93.
transmission System Security
94.
voting privacy and security
95.
computer
96.
computer aided design
97.
computer aided diagnosis
98.
computer aided diagnostics
99.
computer aided instruction
100.
computer aided manufacturing
101.
computer aided testing
102.
computer algebra
103.
computer algebra system
104.
computer and education
105.
computer anxiety
106.
computer architecture
107.
computer assisted language learning
108.
computer based learning
109.
computer circuits
110.
computer control
111.
Computer crime
112.
computer education
113.
computer engineering
114.
computer engineerng
115.
computer game
116.
computer graphics
117.
computer hardware
118.
computer integrated manufacturing
119.
computer network management
120.
computer network operations
121.
computer networks
122.
computer pipelines
123.
computer programming
124.
computer programs
125.
computer science
126.
computer science basics
127.
computer science education
128.
computer simulation
129.
computer simulation environments
130.
computer simulations
131.
computer software
132.
computer softwaregraph theory
133.
computer systems
134.
Computer systems organization
135.
computer terminals
136.
computer vision
137.
computer workers
138.
computer-aided anthropometry
139.
computer-aided architectural design (CAAD)
140.
computer‐aided assessment
141.
computer-aided design
142.
computer-aided detection
143.
computer‐aided detection
144.
computer-aided diagnosis
145.
computer-aided drawing (CAD)
146.
computer-aided engineering
147.
computer-aided teaching
148.
Computer-Aided Tuning
149.
computer-aided tuning (CAT)
150.
computer-assisted language learning (CALL)
151.
computer-oriented technologies
152.
computer-supported decision-making
153.
computer-use
154.
control engineering computer applications
155.
distributed computer systems
156.
education in computer engineering
157.
fifth generation computer
158.
gateways (computer networks)
159.
high-performance computer systems
160.
human computer interaction
161.
human computer interaction (HCI)
162.
human-computer interaction
163.
Human-Computer Interaction (HCI)
164.
human-computer trust
165.
interactive computer graphics
166.
laptop computer
167.
logic in computer science
168.
single board computer
169.
single-board computer
170.
structure computer analysis
171.
ubiquitous computer technology
172.
Web and computer-based learning
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Computer Systems
4.
Estonian Summer School on Computer and Systems Science, 2023
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT