Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
55
Vaata veel..
(2/127)
Ekspordi
ekspordi kõik päringu tulemused
(55)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
ADSecData platform: an open-source data platform for autonomous driving cybersecurity
Roberts, Andrew James
;
Malayjerdi, Mohsen
;
Bellone, Mauro
;
Sell, Raivo
;
Maennel, Olaf Manuel
;
Hamad, Mohammad
;
Steinhorst, Sebastian
2025 IEEE 101st Vehicular Technology Conference, VTC2025-Spring : proceedings
2025
/
7 p
https://doi.org/10.1109/VTC2025-Spring65109.2025.11174582
artikkel kogumikus
Seotud publikatsioonid
1
Cybersecurity testing and attack propagation analysis of autonomous driving software = Autonoomse sõiduki juhtimistarkvara küberturvalisuse testimine ja rünnakute leviku analüüs
2
artikkel ajakirjas
Ahlswede, R. Ahlswede, A. (ed.); Althöfer, I. (ed.); Deppe, C. (ed.); Tamm, Ulrich (ed.). Identification and other probabilistic models. Rudolf Ahlswede’s lectures on information theory 6. Edited by Alexander Ahlswede, Ingo Althöfer, Christian Deppe and Ulrich Tamm : [review]
Henno, Jaak
Zentralblatt MATH
2021
/
1 p
https://zbmath.org/?q=an%3A7349483
artikkel ajakirjas
3
artikkel kogumikus
Analyzing side-channel attack vulnerabilities at RTL
Lai, Xinhui
;
Jenihhin, Maksim
2023 IEEE 24th Latin American Test Symposium (LATS)
2023
/
2 p. : ill
https://doi.org/10.1109/LATS58125.2023.10154497
artikkel kogumikus
4
artikkel kogumikus EST
/
artikkel kogumikus ENG
Assessment of aviation security risk management for airline turnaround processes
Matulevičius, Raimundas
;
Norta, Alexander
;
Udokwu, Chibuzor
;
Nõukas, Rein
Transactions on large-scale data- and knowledge-centered systems XXXVI : special issue on data and security engineering
2017
/
p. 109-141 : ill
https://doi.org/10.1007/978-3-662-56266-6_6
Conference proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Between sustainability, social cohesion and security regional development in Northeastern Estonia
Prause, Gunnar Klaus
;
Tuisk, Tarmo
;
Olaniyi, Eunice Omolola
Entrepreneurship and sustainability issues
2019
/
p. 1235-1254
https://doi.org/10.9770/jesi.2019.6.3(13)
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
6
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Blockchain-based medical decision support system
Hovorushchenko, Tetiana
;
Hnatchuk, Yelyzaveta
;
Osyadlyi, Vitaliy
;
Kapustian, Mariia
;
Boyarchuk, Artem
Journal of cyber security and mobility
2023
/
p. 253-274 : ill
https://doi.org/10.13052/jcsm2245-1439.123.1
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
7
artikkel ajakirjas
Chia, N-H.; Chung, K-M.; Yamakawa, T. A black-box approach to post-quantum zero-knowledge in constant rounds : [review]
Henno, Jaak
zbMATH Open
2022
/
1 p
https://zbmath.org/1486.94089
artikkel ajakirjas
8
artikkel kogumikus
Comparative analysis of pattern mining algorithms for event logs
Gasimov, Orkhan
;
Vaarandi, Risto
;
Pihelgas, Mauno
2023 IEEE International Conference on Cyber Security and Resilience (CSR) : Venice, Italy, 2023
2023
/
7 p
https://doi.org//10.1109/CSR57506.2023.10224996
artikkel kogumikus
9
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A comprehensive survey on digital twin for future networks and emerging Internet of Things industry
Hakiri, Akram
;
Gokhale, Aniruddha
;
Ben Yahia, Sadok
;
Mellouli, Nedra
Computer Networks
2024
/
art. 110350
https://doi.org/10.1016/j.comnet.2024.110350
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
10
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A comprehensive survey on revolutionizing connectivity through artificial intelligence-enabled digital twin network in 6G
Sheraz, Muhammad
;
Chuah, Teong Chee
;
Lee, Ying Loong
;
Alam, Muhammad Mahtab
;
Al-Habashna, Ala'a
;
Han, Zhu
IEEE Access
2024
/
p. 49184-49215
https://doi.org/10.1109/ACCESS.2024.3384272
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
11
artikkel ajakirjas
Current problems related to energy policy and law in European Union
Kerikmäe, Tanel
;
Dutt, Pawan Kumar
L'Europe unie = United Europe
2013
/
p. 112-120 : ill
artikkel ajakirjas
12
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
DADS : decentralized attestation for device swarms
Wedaj, Samuel
;
Paul, Kolin
;
Ribeiro, Vinay J.
ACM Transactions on Privacy and Security
2019
/
Art. 19
https://doi.org/10.1145/3325822
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
13
artikkel kogumikus
Design and verification of secure cache wrapper against access-driven side-channel attacks
Niazmand, Behrad
;
Azad, Siavoosh Payandeh
;
Jervan, Gert
;
Sepulveda, Johanna
Euromicro Conference on Digital System Design : DSD 2019 : 28 - 30 August 2019 Kallithea, Chalkidiki, Greece : proceedings
2019
/
p. 672-676 : ill
https://doi.org/10.1109/DSD.2019.00108
artikkel kogumikus
14
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
DoS attack detection and path collision localization in NoC-based MPSoC architectures
Chaves Arroyave, Cesar Giovanni
;
Azad, Siavoosh Payandeh
;
Hollstein, Thomas
;
Sepulveda, Johanna
Journal of low power electronics and applications
2019
/
art. 7, 20 p. : ill
https://doi.org/10.3390/jlpea9010007
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
Bandwidth Reduction DoS attacks in Multi-Tenant NoC-based MPSoCs : detection and avoidance strategies = Ribalaiuse vähendamise DoS-rünnakud mitme rentnikuga NoC-põhiste MPSoC-de puhul : tuvastamise ja vältimise strateegiad
15
artikkel kogumikus EST
/
artikkel kogumikus ENG
Dynamic and distributed security management for NoC Based MPSoCs
Azad, Siavoosh Payandeh
;
Jervan, Gert
;
Sepulveda, Johanna
Computational Science - ICCS 2019 : 19th International Conference, Faro, Portugal, June 12-14, 2019 : Proceedings, Part II
2019
/
p. 649–662 : ill
https://doi.org/10.1007/978-3-030-22741-8_4
Conference proceeding at Scopus
Article at Scopus
Conference proceeding at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
16
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
An efficient authentication and key agreement scheme for secure smart grid communication services
Hammami, Hamza
;
Obaidat, Mohammad S.
;
Ben Yahia, Sadok
International journal of communication systems
2020
/
art. e4558, p. 1−13
https://doi.org/10.1002/dac.4558
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
17
artikkel kogumikus
An enhanced lightweight authentication scheme for secure access to cloud data
Hammami, Hamza
;
Obaidat, Mohammad S.
;
Ben Yahia, Sadok
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 2020
2020
/
p. 110-117
https://doi.org/10.5220/0009824301100117
artikkel kogumikus
18
artikkel ajakirjas
Europe's refugee crisis in 2015 and security threats from the Baltic perspective
Veebel, Viljar
;
Markus, Raul
Journal of politics and law
2015
/
p. 254-262 : ill
http://dx.doi.org/10.5539/jpl.v8n4p254
artikkel ajakirjas
19
artikkel kogumikus EST
/
artikkel kogumikus ENG
Framework for peer-to-peer data sharing over Web browsers
Pattanaik, Vishwajeet
;
Sharvadze, Ioane
;
Draheim, Dirk
Future Data and Security Engineering : 6th International Conference, FDSE 2019Nha Trang City, Vietnam, November 27–29, 2019 : proceedings
2019
/
p. 207-225 : ill
https://doi.org/10.1007/978-3-030-35653-8_14
Conference proceeding at Scopus
Article at Scopus
Conference proceeding at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Seotud publikatsioonid
1
Robust Web annotations in support of knowledge co-creation = Töökindlad veebiannotatsioonid teadmiste ühisloome toetamiseks
20
artikkel kogumikus
The governance of safety and security risks in connected healthcare
Skierka-Canton, Isabel
Living in the Internet of Things : Cybersecurity of the IoT - 2018, London
2018
/
12 p
https://doi.org/10.1049/cp.2018.0002
artikkel kogumikus
Seotud publikatsioonid
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
21
artikkel kogumikus
IaaS platforms : how secure are they?
Astrova, Irina
;
Koschel, Arne
;
Henke, Mats Lennart
IEEE 30th International Conference on Advanced Information Networking and Applications Workshops : WAINA 2016 : 23-25 March 2016, Crans-Montana, Switzerland : proceedings
2016
/
p. 843-848 : ill
https://doi.org/10.1109/WAINA.2016.22
artikkel kogumikus
22
artikkel ajakirjas
Ideological networks and security in the two-speed world - Venia Legendi [Electronic resource]
Erne, Jaanika
SSRN working paper series
2013
/
[26] p
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2285465
artikkel ajakirjas
23
artikkel kogumikus
The impact of perceived security on intention to use E-learning among students
Farooq, Ali
;
Ahmad, Farhan
;
Khadam, Nyla
;
Lorenz, Birgy
;
Isoaho, Jouni
Proceedings IEEE 20th International Conference on Advanced Learning Technologies, ICALT 2020 : 6–9 July 2020, Online
2020
/
p. 360-364
https://doi.org/10.1109/ICALT49669.2020.00115
artikkel kogumikus
24
artikkel kogumikus
Improving Security and Privacy with Raspberry Pi Devices
Džankic, Radoje
;
Bulatovic, Zvonko
;
Bauk, Sanja
Maritime Cybersecurity
2025
/
p. 217-233
https://doi.org/10.1007/978-3-031-87290-7_12
artikkel kogumikus
25
artikkel kogumikus
Improving the technical functionality of children's tracking watches
Jennings, Luke
;
Singh, Inderbir
;
Sorell, Matthew
;
Hovhannisyan, Kristine
Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018
2018
/
p. 57-59
https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
artikkel kogumikus
Kirjeid leitud 55, kuvan
1 - 25
eelmine
1
2
3
järgmine
võtmesõna
125
1.
ad-hoc sensor networks security
2.
Automatic Security Verification
3.
Blockchain security
4.
cache security
5.
cloud security
6.
communication system security
7.
comprehensive system of economic security
8.
computer security
9.
cooperative security dilemma
10.
cyber security
11.
cyber security education
12.
cyber security exercises
13.
cyber security monitoring
14.
cyber security strategies
15.
cyber-security
16.
data and information security
17.
data security
18.
development of security cameras
19.
digital security practices
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
Estonian information security standard
27.
graded security
28.
hardware security
29.
hardware security primitive
30.
high level of security
31.
Homeland security
32.
human security
33.
information security
34.
information security and privacy
35.
initial level of security
36.
internal security
37.
international security
38.
investment and innovation security
39.
IPv6 security
40.
IT security
41.
IT security management
42.
job security
43.
long-term security
44.
maritime cyber security
45.
maritime cyber security operations centers
46.
Maritime Security Operations Center (M-SOC)
47.
medium level of security
48.
metadata model for security measures
49.
Middle Eastern security
50.
Mobile security
51.
national cyber security strategy
52.
national security
53.
NATO. Science for Peace and Security Program
54.
network security
55.
network security monitoring
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
Safety and Security in Sea Transportation
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion
76.
Security Assertion Mining
77.
security closure
78.
Security Coverage
79.
security dataset
80.
security dilemma
81.
Security evaluation
82.
security evaluation instruments
83.
Security Level Evaluation
84.
Security limitations
85.
security log analysis
86.
security management
87.
security model
88.
security monitoring
89.
security notion
90.
security objectives
91.
security of data
92.
security of supply
93.
security operation center
94.
security operations center
95.
security patterns
96.
security policy
97.
security problem definition
98.
security proof
99.
security protocols
100.
security requirements
101.
security requirements engineering
102.
security research
103.
security risk assessment
104.
security risk management
105.
security risks
106.
security science and technology
107.
security strategies
108.
security systems for military objects
109.
security testing
110.
security training
111.
security verification
112.
security-by-design
113.
social security planning
114.
societal security
115.
software security
116.
software security level
117.
software security subcharacteristics
118.
sufficient level of security
119.
system of economic security
120.
system security
121.
terrorism security
122.
transmission System Security
123.
voting privacy and security
124.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
125.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT