Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
computer security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
7
Vaata veel..
(2/199)
Ekspordi
ekspordi kõik päringu tulemused
(7)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
Are the current system engineering practices sufficient to meet cyber crime?
Buldas, Ahto
;
Saarepera, Märt
Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017 : held as part of HCI International 2017, Vancouver, BC, Canada, July 9–14, 2017 : proceedings
2017
/
p. 451-463
https://doi.org/10.1007/978-3-319-58460-7_31
Conference proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
3
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
4
artikkel kogumikus
EU cybersecurity governance – stakeholders and normative intentions towards integration
Kasper, Agnes
The future of the European Union : demisting the debate
2020
/
p. 166−185
https://www.um.edu.mt/library/oar/handle/123456789/52308
https://www.um.edu.mt/library/oar/bitstream/123456789/52308/1/EU_cybersecurity_governance%e2%80%93stakeholders_and_normative_intentions_towards_integration_2020.pdf
artikkel kogumikus
5
artikkel kogumikus EST
/
artikkel kogumikus ENG
Preface
Bellatreche, Ladjel
;
Chernishev, George
;
Corral, Antonio
;
Ouchani, Samir
;
Vain, Jüri
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
/
p. v-vii
https://link.springer.com/content/pdf/bfm:978-3-030-87657-9/1?pdf=chapter%20toc
Article collection metrics at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
6
artikkel kogumikus
The becoming of cyber-military capabilities
Salminen, Mikko
;
Kerttunen, Mika
Routledge handbook of international cybersecurity
2020
/
p. 94-107
https://www.ester.ee/record=b5308475*est
artikkel kogumikus
7
artikkel kogumikus
Towards a Cyber Maastricht : two steps forward, one step back
Kasper, Agnes
;
Vernygora, Vlad Alex
The future of the European Union : demisting the debate
2020
/
p. 186-210
https://www.um.edu.mt/library/oar/handle/123456789/52310
https://www.um.edu.mt/library/oar/bitstream/123456789/52310/1/Towards_a_%e2%80%98Cyber_Maastricht%e2%80%99_two_steps_forward_one_step_back_2020.pdf
artikkel kogumikus
Kirjeid leitud 7, kuvan
1 - 7
võtmesõna
195
1.
computer security
2.
ad-hoc sensor networks security
3.
Automatic Security Verification
4.
Blockchain security
5.
cache security
6.
communication system security
7.
comprehensive system of economic security
8.
cooperative security dilemma
9.
cyber security
10.
cyber security education
11.
cyber security exercises
12.
cyber security monitoring
13.
cyber security strategies
14.
cyber-security
15.
data and information security
16.
data security
17.
development of security cameras
18.
digital security practices
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
information security and privacy
32.
internal security
33.
international security
34.
investment and innovation security
35.
IPv6 security
36.
IT security
37.
IT security management
38.
job security
39.
long-term security
40.
metadata model for security measures
41.
Middle Eastern security
42.
Mobile security
43.
national cyber security strategy
44.
national security
45.
NATO. Science for Peace and Security Program
46.
network security
47.
network security monitoring
48.
OSCE (Organization for Security and Co-operation in Europe)
49.
passenger’s security
50.
policy-based routing security
51.
political and security cultures
52.
post-quantum security
53.
power system security
54.
quantitative security
55.
regional security
56.
RISC-V Security Verification
57.
Safety and Security in Sea Transportation
58.
safety and security testing
59.
security
60.
security adaptation
61.
security alert prioritization
62.
security analysis
63.
security and justice (AFSJ)
64.
Security and political science
65.
security and privacy
66.
security and privacy in smart grids
67.
Security Assertion Mining
68.
security closure
69.
Security Coverage
70.
security dataset
71.
security dilemma
72.
Security evaluation
73.
security evaluation instruments
74.
Security limitations
75.
security log analysis
76.
security management
77.
security model
78.
security monitoring
79.
security notion
80.
security objectives
81.
security of data
82.
security of supply
83.
security operation center
84.
security operations center
85.
security patterns
86.
security policy
87.
security problem definition
88.
security proof
89.
security protocols
90.
security requirements
91.
security requirements engineering
92.
security risk assessment
93.
security risk management
94.
security risks
95.
security science and technology
96.
security strategies
97.
security systems for military objects
98.
security testing
99.
security training
100.
security verification
101.
security-by-design
102.
social security planning
103.
societal security
104.
system of economic security
105.
system security
106.
terrorism security
107.
transmission System Security
108.
voting privacy and security
109.
computer
110.
computer aided design
111.
computer aided diagnosis
112.
computer aided diagnostics
113.
computer aided instruction
114.
computer aided language translation
115.
computer aided manufacturing
116.
computer aided methods
117.
computer aided software engineering
118.
computer aided testing
119.
computer algebra
120.
computer algebra system
121.
computer and education
122.
computer anxiety
123.
computer architecture
124.
computer assisted language learning
125.
computer based learning
126.
computer circuits
127.
computer control
128.
Computer crime
129.
computer education
130.
computer engineering
131.
computer engineerng
132.
computer game
133.
computer graphics
134.
computer hardware
135.
computer integrated manufacturing
136.
computer network management
137.
computer network operations
138.
computer networks
139.
computer pipelines
140.
computer programming
141.
computer programming languages
142.
computer programs
143.
computer science
144.
computer science basics
145.
computer science education
146.
computer simulation
147.
computer simulation environments
148.
computer simulations
149.
computer software
150.
Computer software and hardware
151.
computer softwaregraph theory
152.
computer systems
153.
Computer systems organization
154.
computer terminals
155.
computer vision
156.
computer vision-based methods
157.
computer workers
158.
computer-aided anthropometry
159.
computer-aided architectural design (CAAD)
160.
computer‐aided assessment
161.
computer-aided design
162.
computer-aided design (CAD)
163.
computer-aided detection
164.
computer‐aided detection
165.
computer-aided diagnosis
166.
computer-aided drawing (CAD)
167.
computer-aided engineering
168.
computer-aided teaching
169.
Computer-Aided Tuning
170.
computer-aided tuning (CAT)
171.
computer-assisted language learning (CALL)
172.
computer-oriented technologies
173.
computer-supported decision-making
174.
computer-use
175.
computer-workers
176.
control engineering computer applications
177.
distributed computer systems
178.
education in computer engineering
179.
fifth generation computer
180.
gateways (computer networks)
181.
high-performance computer systems
182.
human computer interaction
183.
human computer interaction (HCI)
184.
human-computer interaction
185.
human–computer interaction
186.
Human-Computer Interaction (HCI)
187.
human-computer trust
188.
interactive computer graphics
189.
laptop computer
190.
logic in computer science
191.
single board computer
192.
single-board computer
193.
structure computer analysis
194.
ubiquitous computer technology
195.
Web and computer-based learning
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Computer Systems
4.
Estonian Summer School on Computer and Systems Science, 2023
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT