Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Information and information security (pealkiri)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(3/254)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Information and information security
Henno, Jaak
Third Workshop on Software Quality Analysis, Monitoring, Improvement and Applications SQAMIA 2014 : Lovran, Croatia, September 19-22, 2014 : proceedings
2014
/
p. 23-28 : ill
https://ceur-ws.org/Vol-1266/SQAMIA2014Proceedings.pdf
Conference proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
Information and information security
Henno, Jaak
Information modelling and knowledge bases XXVII
2016
/
p. 103-120
https://doi.org/10.3233/978-1-61499-611-8-103
Article collection metrics at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
251
1.
data and information security
2.
Estonian information security standard
3.
information security and privacy
4.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
5.
information security
6.
access to information
7.
age of information
8.
banking information
9.
building information modelling
10.
building information modeling
11.
Building Information Modeling (BIM)
12.
building information modelling
13.
Building Information Modelling (BIM)
14.
Building Information Modelling (BIM) adoption
15.
business information technology
16.
city information modelling (CIM)
17.
communication channels (information theory)
18.
Community Statistics on Information Society (CSIS)
19.
court information system
20.
critical information infrastructure
21.
Data-information-knowledgewisdom (DIKW)
22.
discrete information bottle-neck
23.
dissemination of information
24.
enterprise information systems
25.
Estonian National Health Information System
26.
estonian national health information system (ENHIS)
27.
Estonian nationwide Health Information System (EHIS)
28.
evolutionary information systems
29.
financial information
30.
general theory of information transfer
31.
Geographic Information System (GIS)
32.
geographical information system
33.
health information exchange
34.
health information purpose
35.
health information sharing maturity
36.
health information systems
37.
Healthcare information systems
38.
high-performance computing systems, Information processing
39.
HL7 Version 3: Reference Information Model (RIM)
40.
ICT (information and communication technology)
41.
information
42.
information analysis
43.
information and communication technologies
44.
Information and Communication Technologies (ICT)
45.
Information and communication technologies (ICT) digitalisation
46.
Information and Communication Technologies (ICT) laws
47.
Information and Communication Technologies (ICTs)
48.
Information and Communication Technologies for Development
49.
information and communication technology
50.
information and communication technology (ICT)
51.
information and communications technology
52.
information and consultation
53.
information architecture
54.
information asymmetry
55.
information commons
56.
information communication technology
57.
information content
58.
information control
59.
information dissemination
60.
information economy
61.
information entropy
62.
information exchange
63.
information extraction
64.
information filtering
65.
information flow control
66.
information fusion
67.
information governance
68.
information integration
69.
information literacy
70.
information literacy cooperation
71.
information logistics
72.
information management
73.
information measures
74.
information model
75.
information model-based urban planning
76.
information polity
77.
information potential
78.
information preprocessing
79.
information processing
80.
information processing system
81.
information rate
82.
information realities
83.
information retrieval
84.
information revolution
85.
information seeking behaviour
86.
information sharing
87.
information society
88.
Information sufficiency
89.
information system
90.
Information System Authority (RIA)
91.
information systems
92.
information systems development
93.
Information Systems research
94.
information technologies
95.
Information technology
96.
information technology (IT)
97.
information theory
98.
information to individual consumers
99.
information tool
100.
information use
101.
information value
102.
information war
103.
information warfare
104.
information visualization
105.
information volume
106.
Information-seeking activity
107.
intelligent information technology
108.
interoperability and evolutionary criteria of information systems
109.
laboratory information management system (LIMS)
110.
laboratory information management systems
111.
LIMS (laboratory information management systems)
112.
medical information
113.
Medical information policy
114.
middleware (for subscription and distribution of situational information)
115.
mobile information system
116.
multilingual information retrieval
117.
multimodal information
118.
open architecture for information exchange
119.
perception of visual information
120.
performance information
121.
performance information use
122.
philosophy of information
123.
process modeling and information systems within the extended enterprise
124.
provision of information to workers
125.
quality evaluation of scientific information
126.
real time information
127.
real-time information
128.
Reaxys Chemistry database information
129.
scientific information
130.
SIS II (Schengen Information System II)
131.
tactile information
132.
traffic information system (TIS)
133.
tree information database
134.
website information
135.
VIS (Visa Information System)
136.
ad-hoc sensor networks security
137.
Automatic Security Verification
138.
Blockchain security
139.
cache security
140.
communication system security
141.
comprehensive system of economic security
142.
computer security
143.
cooperative security dilemma
144.
cyber security
145.
cyber security education
146.
cyber security exercises
147.
cyber security monitoring
148.
cyber security strategies
149.
cyber-security
150.
data security
151.
development of security cameras
152.
digital security practices
153.
drinking water security
154.
economic security
155.
economic security of enterprise
156.
emotional security
157.
energy security
158.
energy security indicator
159.
graded security
160.
hardware security
161.
hardware security primitive
162.
high level of security
163.
Homeland security
164.
human security
165.
initial level of security
166.
internal security
167.
international security
168.
investment and innovation security
169.
IPv6 security
170.
IT security
171.
IT security management
172.
job security
173.
long-term security
174.
maritime cyber security
175.
maritime cyber security operations centers
176.
Maritime Security Operations Center (M-SOC)
177.
medium level of security
178.
metadata model for security measures
179.
Middle Eastern security
180.
Mobile security
181.
national cyber security strategy
182.
national security
183.
NATO. Science for Peace and Security Program
184.
network security
185.
network security monitoring
186.
OSCE (Organization for Security and Co-operation in Europe)
187.
passenger’s security
188.
policy-based routing security
189.
political and security cultures
190.
post-quantum security
191.
power system security
192.
quantitative security
193.
regional security
194.
RISC-V Security Verification
195.
Safety and Security in Sea Transportation
196.
safety and security testing
197.
security
198.
security adaptation
199.
security alert prioritization
200.
security analysis
201.
security and justice (AFSJ)
202.
Security and political science
203.
security and privacy
204.
security and privacy in smart grids
205.
Security Assertion Mining
206.
security closure
207.
Security Coverage
208.
security dataset
209.
security dilemma
210.
Security evaluation
211.
security evaluation instruments
212.
Security limitations
213.
security log analysis
214.
security management
215.
security model
216.
security monitoring
217.
security notion
218.
security objectives
219.
security of data
220.
security of supply
221.
security operation center
222.
security operations center
223.
security patterns
224.
security policy
225.
security problem definition
226.
security proof
227.
security protocols
228.
security requirements
229.
security requirements engineering
230.
security research
231.
security risk assessment
232.
security risk management
233.
security risks
234.
security science and technology
235.
security strategies
236.
security systems for military objects
237.
security testing
238.
security training
239.
security verification
240.
security-by-design
241.
social security planning
242.
societal security
243.
software security
244.
software security level
245.
software security subcharacteristics
246.
sufficient level of security
247.
system of economic security
248.
system security
249.
terrorism security
250.
transmission System Security
251.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ märksõna
1
1.
Building Information Modeling
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT