Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
information security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
5
Vaata veel..
(3/213)
Ekspordi
ekspordi kõik päringu tulemused
(5)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Condition monitoring of electrical machines and its relation to industrial internet
Belahcen, Anouar
;
Gyftakis, Konstantinos N.
;
Martinez, Javier
;
Climente-Alarcon, Vicente
;
Vaimann, Toomas
2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 2015
2015
/
p. 233-241 : ill
http://dx.doi.org/10.1109/WEMDCD.2015.7194535
artikkel kogumikus
2
artikkel kogumikus
European Union strategy and capabilities to Counter Hostile Influence Operations
Loik, Ramon
;
Madeira, Victor
The Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood
2021
/
p. 247–264
https://doi.org/10.1007/978-3-030-73955-3_13
https://www.ester.ee/record=b5434182*est
artikkel kogumikus
3
artikkel kogumikus EST
/
artikkel kogumikus ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 5, kuvan
1 - 5
võtmesõna
210
1.
information security
2.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security strategies
15.
cyber-security
16.
data security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
graded security
25.
hardware security
26.
hardware security primitive
27.
human security
28.
internal security
29.
international security
30.
investment and innovation security
31.
IPv6 security
32.
IT security
33.
IT security management
34.
job security
35.
long-term security
36.
metadata model for security measures
37.
Middle Eastern security
38.
Mobile security
39.
national cyber security strategy
40.
national security
41.
NATO. Science for Peace and Security Program
42.
network security
43.
network security monitoring
44.
OSCE (Organization for Security and Co-operation in Europe)
45.
passenger’s security
46.
policy-based routing security
47.
political and security cultures
48.
post-quantum security
49.
power system security
50.
quantitative security
51.
regional security
52.
RISC-V Security Verification
53.
security
54.
security and justice (AFSJ)
55.
security and privacy
56.
security and privacy in smart grids
57.
Security Assertion Mining
58.
security closure
59.
Security Coverage
60.
security dataset
61.
security dilemma
62.
Security evaluation
63.
security log analysis
64.
security management
65.
security model
66.
security monitoring
67.
security notion
68.
security objectives
69.
security of data
70.
security of supply
71.
security operation center
72.
security patterns
73.
security policy
74.
security problem definition
75.
security proof
76.
security protocols
77.
security requirements
78.
security requirements engineering
79.
security risk assessment
80.
security risk management
81.
security strategies
82.
security systems for military objects
83.
security testing
84.
security training
85.
security verification
86.
social security planning
87.
societal security
88.
system of economic security
89.
system security
90.
terrorism security
91.
transmission System Security
92.
voting privacy and security
93.
access to information
94.
age of information
95.
banking information
96.
building information modelling
97.
building information modeling
98.
Building Information Modeling (BIM)
99.
building information modelling
100.
Building Information Modelling (BIM)
101.
Building Information Modelling (BIM) adoption
102.
business information technology
103.
city information modelling (CIM)
104.
communication channels (information theory)
105.
Community Statistics on Information Society (CSIS)
106.
court information system
107.
critical information infrastructure
108.
Data-information-knowledgewisdom (DIKW)
109.
discrete information bottle-neck
110.
dissemination of information
111.
enterprise information systems
112.
Estonian National Health Information System
113.
Estonian nationwide Health Information System (EHIS)
114.
evolutionary information systems
115.
financial information
116.
general theory of information transfer
117.
Geographic Information System (GIS)
118.
Geographic Information Systems (GIS)
119.
geographical information system
120.
health information exchange
121.
health information systems
122.
Healthcare information systems
123.
high-performance computing systems, Information processing
124.
HL7 Version 3: Reference Information Model (RIM)
125.
ICT (information and communication technology)
126.
information
127.
information and communication technologies
128.
Information and communication technologies (ICT) digitalisation
129.
Information and Communication Technologies (ICT) laws
130.
Information and Communication Technologies (ICTs)
131.
Information and Communication Technologies for Development
132.
information and communication technology
133.
information and communication technology (ICT)
134.
information and communications technology
135.
information architecture
136.
information asymmetry
137.
information commons
138.
information communication technology
139.
information content
140.
information control
141.
information dissemination
142.
information economy
143.
information entropy
144.
information exchange
145.
information extraction
146.
information flow control
147.
information fusion
148.
information governance
149.
information integration
150.
information literacy
151.
information literacy cooperation
152.
information logistics
153.
information management
154.
information measures
155.
information model
156.
information model-based urban planning
157.
information polity
158.
information potential
159.
information processing
160.
information processing system
161.
information rate
162.
information realities
163.
information retrieval
164.
information revolution
165.
information seeking behaviour
166.
information sharing
167.
information society
168.
Information sufficiency
169.
information system
170.
Information System Authority (RIA)
171.
information systems
172.
information systems development
173.
Information Systems research
174.
information technologies
175.
Information technology
176.
information technology (IT)
177.
information theory
178.
information to individual consumers
179.
information tool
180.
information value
181.
information warfare
182.
information visualization
183.
Information-seeking activity
184.
intelligent information technology
185.
interoperability and evolutionary criteria of information systems
186.
laboratory information management system (LIMS)
187.
laboratory information management systems
188.
LIMS (laboratory information management systems)
189.
medical information
190.
Medical information policy
191.
middleware (for subscription and distribution of situational information)
192.
mobile information system
193.
multilingual information retrieval
194.
multimodal information
195.
open architecture for information exchange
196.
perception of visual information
197.
performance information
198.
performance information use
199.
philosophy of information
200.
process modeling and information systems within the extended enterprise
201.
quality evaluation of scientific information
202.
real time information
203.
real-time information
204.
Reaxys Chemistry database information
205.
scientific information
206.
SIS II (Schengen Information System II)
207.
traffic information system (TIS)
208.
tree information database
209.
website information
210.
VIS (Visa Information System)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ märksõna
1
1.
Building Information Modeling
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT