Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
information security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
5
Vaata veel..
(3/238)
Ekspordi
ekspordi kõik päringu tulemused
(5)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
artikkel kogumikus
2
artikkel kogumikus
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
artikkel kogumikus
3
artikkel kogumikus EST
/
artikkel kogumikus ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 5, kuvan
1 - 5
võtmesõna
235
1.
Estonian information security standard
2.
information security
3.
information security and privacy
4.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security strategies
18.
cyber-security
19.
data security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
human security
32.
internal security
33.
international security
34.
investment and innovation security
35.
IPv6 security
36.
IT security
37.
IT security management
38.
job security
39.
long-term security
40.
metadata model for security measures
41.
Middle Eastern security
42.
Mobile security
43.
national cyber security strategy
44.
national security
45.
NATO. Science for Peace and Security Program
46.
network security
47.
network security monitoring
48.
OSCE (Organization for Security and Co-operation in Europe)
49.
passenger’s security
50.
policy-based routing security
51.
political and security cultures
52.
post-quantum security
53.
power system security
54.
quantitative security
55.
regional security
56.
RISC-V Security Verification
57.
safety and security testing
58.
security
59.
security adaptation
60.
security alert prioritization
61.
security analysis
62.
security and justice (AFSJ)
63.
Security and political science
64.
security and privacy
65.
security and privacy in smart grids
66.
Security Assertion Mining
67.
security closure
68.
Security Coverage
69.
security dataset
70.
security dilemma
71.
Security evaluation
72.
security evaluation instruments
73.
Security limitations
74.
security log analysis
75.
security management
76.
security model
77.
security monitoring
78.
security notion
79.
security objectives
80.
security of data
81.
security of supply
82.
security operation center
83.
security operations center
84.
security patterns
85.
security policy
86.
security problem definition
87.
security proof
88.
security protocols
89.
security requirements
90.
security requirements engineering
91.
security risk assessment
92.
security risk management
93.
security risks
94.
security science and technology
95.
security strategies
96.
security systems for military objects
97.
security testing
98.
security training
99.
security verification
100.
security-by-design
101.
social security planning
102.
societal security
103.
system of economic security
104.
system security
105.
terrorism security
106.
transmission System Security
107.
voting privacy and security
108.
access to information
109.
age of information
110.
banking information
111.
building information modelling
112.
building information modeling
113.
Building Information Modeling (BIM)
114.
building information modelling
115.
Building Information Modelling (BIM)
116.
Building Information Modelling (BIM) adoption
117.
business information technology
118.
city information modelling (CIM)
119.
communication channels (information theory)
120.
Community Statistics on Information Society (CSIS)
121.
court information system
122.
critical information infrastructure
123.
Data-information-knowledgewisdom (DIKW)
124.
discrete information bottle-neck
125.
dissemination of information
126.
enterprise information systems
127.
Estonian National Health Information System
128.
estonian national health information system (ENHIS)
129.
Estonian nationwide Health Information System (EHIS)
130.
evolutionary information systems
131.
financial information
132.
general theory of information transfer
133.
Geographic Information System (GIS)
134.
geographical information system
135.
health information exchange
136.
health information purpose
137.
health information sharing maturity
138.
health information systems
139.
Healthcare information systems
140.
high-performance computing systems, Information processing
141.
HL7 Version 3: Reference Information Model (RIM)
142.
ICT (information and communication technology)
143.
information
144.
information analysis
145.
information and communication technologies
146.
Information and Communication Technologies (ICT)
147.
Information and communication technologies (ICT) digitalisation
148.
Information and Communication Technologies (ICT) laws
149.
Information and Communication Technologies (ICTs)
150.
Information and Communication Technologies for Development
151.
information and communication technology
152.
information and communication technology (ICT)
153.
information and communications technology
154.
information and consultation
155.
information architecture
156.
information asymmetry
157.
information commons
158.
information communication technology
159.
information content
160.
information control
161.
information dissemination
162.
information economy
163.
information entropy
164.
information exchange
165.
information extraction
166.
information filtering
167.
information flow control
168.
information fusion
169.
information governance
170.
information integration
171.
information literacy
172.
information literacy cooperation
173.
information logistics
174.
information management
175.
information measures
176.
information model
177.
information model-based urban planning
178.
information polity
179.
information potential
180.
information preprocessing
181.
information processing
182.
information processing system
183.
information rate
184.
information realities
185.
information retrieval
186.
information revolution
187.
information seeking behaviour
188.
information sharing
189.
information society
190.
Information sufficiency
191.
information system
192.
Information System Authority (RIA)
193.
information systems
194.
information systems development
195.
Information Systems research
196.
information technologies
197.
Information technology
198.
information technology (IT)
199.
information theory
200.
information to individual consumers
201.
information tool
202.
information value
203.
information warfare
204.
information visualization
205.
information volume
206.
Information-seeking activity
207.
intelligent information technology
208.
interoperability and evolutionary criteria of information systems
209.
laboratory information management system (LIMS)
210.
laboratory information management systems
211.
LIMS (laboratory information management systems)
212.
medical information
213.
Medical information policy
214.
middleware (for subscription and distribution of situational information)
215.
mobile information system
216.
multilingual information retrieval
217.
multimodal information
218.
open architecture for information exchange
219.
perception of visual information
220.
performance information
221.
performance information use
222.
philosophy of information
223.
process modeling and information systems within the extended enterprise
224.
provision of information to workers
225.
quality evaluation of scientific information
226.
real time information
227.
real-time information
228.
Reaxys Chemistry database information
229.
scientific information
230.
SIS II (Schengen Information System II)
231.
tactile information
232.
traffic information system (TIS)
233.
tree information database
234.
website information
235.
VIS (Visa Information System)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ märksõna
1
1.
Building Information Modeling
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT