Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
IT security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/126)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Implementation of information security in the EU information systems : an Estonian case study
Järvsoo, Maris
;
Norta, Alexander
;
Tsap, Valentyna
;
Pappel, Ingrid
;
Draheim, Dirk
Challenges and Opportunities in the Digital Era : 17th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society : I3E 2018, Kuwait City, Kuwait, October 30 - November 1, 2018 : proceedings
2018
/
p. 150-163
https://doi.org/10.1007/978-3-030-02131-3_15
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
Key factors in coping with large-scale security vulnerabilities in the eID field
Lips, Silvia
;
Pappel, Ingrid
;
Tsap, Valentyna
;
Draheim, Dirk
Electronic Government and the Information Systems Perspective :7th International Conference, EGOVIS 2018, Regensburg, Germany, September 3–5, 2018 : proceedings
2018
/
p. 60-70
https://doi.org/10.1007/978-3-319-98349-3_5
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Seotud publikatsioonid
2
eID public acceptance : success factors, citizen perception, and impact of electronic identity = eID avalik aktsepteerimine : edutegurid, kodanike pertseptsioon ja elektroonilise identiteedi mõju
A multifaceted assessment framework for electronic identity schemes = Elektrooniliste autentimisskeemide mitmetahuline hindamise raamistik
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
124
1.
ad-hoc sensor networks security
2.
Automatic Security Verification
3.
Blockchain security
4.
cache security
5.
cloud security
6.
communication system security
7.
comprehensive system of economic security
8.
computer security
9.
cooperative security dilemma
10.
cyber security
11.
cyber security education
12.
cyber security exercises
13.
cyber security monitoring
14.
cyber security strategies
15.
cyber-security
16.
data and information security
17.
data security
18.
development of security cameras
19.
digital security practices
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
Estonian information security standard
27.
graded security
28.
hardware security
29.
hardware security primitive
30.
high level of security
31.
Homeland security
32.
human security
33.
information security
34.
information security and privacy
35.
initial level of security
36.
internal security
37.
international security
38.
investment and innovation security
39.
IPv6 security
40.
IT security
41.
IT security management
42.
job security
43.
long-term security
44.
maritime cyber security
45.
maritime cyber security operations centers
46.
Maritime Security Operations Center (M-SOC)
47.
medium level of security
48.
metadata model for security measures
49.
Middle Eastern security
50.
Mobile security
51.
national cyber security strategy
52.
national security
53.
NATO. Science for Peace and Security Program
54.
network security
55.
network security monitoring
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
Safety and Security in Sea Transportation
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion Mining
76.
security closure
77.
Security Coverage
78.
security dataset
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security Level Evaluation
83.
Security limitations
84.
security log analysis
85.
security management
86.
security model
87.
security monitoring
88.
security notion
89.
security objectives
90.
security of data
91.
security of supply
92.
security operation center
93.
security operations center
94.
security patterns
95.
security policy
96.
security problem definition
97.
security proof
98.
security protocols
99.
security requirements
100.
security requirements engineering
101.
security research
102.
security risk assessment
103.
security risk management
104.
security risks
105.
security science and technology
106.
security strategies
107.
security systems for military objects
108.
security testing
109.
security training
110.
security verification
111.
security-by-design
112.
social security planning
113.
societal security
114.
software security
115.
software security level
116.
software security subcharacteristics
117.
sufficient level of security
118.
system of economic security
119.
system security
120.
terrorism security
121.
transmission System Security
122.
voting privacy and security
123.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
124.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT