Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security model (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/454)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Enterprise security analysis and training experience
Ojamaa, Andres
;
Tõugu, Enn
Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers
2016
/
p. 200-208 : ill
https://doi.org/10.1007/978-3-319-31664-2_21
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
450
1.
security model
2.
metadata model for security measures
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security strategies
15.
cyber-security
16.
data security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
graded security
25.
hardware security
26.
hardware security primitive
27.
human security
28.
information security
29.
internal security
30.
international security
31.
investment and innovation security
32.
IPv6 security
33.
IT security
34.
job security
35.
long-term security
36.
Middle Eastern security
37.
Mobile security
38.
national cyber security strategy
39.
national security
40.
NATO. Science for Peace and Security Program
41.
network security
42.
network security monitoring
43.
OSCE (Organization for Security and Co-operation in Europe)
44.
passenger’s security
45.
policy-based routing security
46.
political and security cultures
47.
post-quantum security
48.
power system security
49.
quantitative security
50.
regional security
51.
RISC-V Security Verification
52.
security
53.
security and privacy
54.
security and privacy in smart grids
55.
Security Assertion Mining
56.
security closure
57.
Security Coverage
58.
security dataset
59.
security dilemma
60.
Security evaluation
61.
security log analysis
62.
security management
63.
security monitoring
64.
security notion
65.
security objectives
66.
security of data
67.
security of supply
68.
security operation center
69.
security patterns
70.
security problem definition
71.
security proof
72.
security protocols
73.
security requirements
74.
security requirements engineering
75.
security risk assessment
76.
security risk management
77.
security strategies
78.
security systems for military objects
79.
security testing
80.
security training
81.
security verification
82.
social security planning
83.
societal security
84.
system of economic security
85.
system security
86.
terrorism security
87.
transmission System Security
88.
voting privacy and security
89.
acoustic model
90.
adjusted DuPont model
91.
agent-based model
92.
analysis model
93.
analytical lumped parameter model
94.
analytical model
95.
analytical thermal model approach
96.
APARHC model
97.
APICS competence model
98.
armature current model
99.
asymmetric model
100.
attack model
101.
automatic GUI model generation
102.
automatic model creation
103.
Bass model
104.
Bayesian model averaging
105.
beyond standard model
106.
bicycle model
107.
business model
108.
business model archetypes
109.
business model attributes
110.
business model canvas
111.
business model classification
112.
business model generation
113.
business model innovation
114.
Business Model Innovation (BMI)
115.
business model reconfiguration
116.
business model research
117.
business network model
118.
Caco2 model cells
119.
Capability Maturity Model Integration for Development
120.
cartesian system model
121.
CERC model
122.
chain model
123.
channel model
124.
charging planning model
125.
Coalitional game model
126.
communication model
127.
compact empirical model
128.
company analyze model
129.
competence model
130.
competency model
131.
Comprehensive Situation Awareness Model
132.
conceptual data model
133.
conceptual model
134.
conceptual model of curriculum for accounting specialization
135.
condenser model
136.
constitutive model
137.
Context model
138.
corrosion model
139.
country analysis model
140.
coupled coils model
141.
crop model
142.
data generative model
143.
data quality maturity model
144.
decentralized model predictive control
145.
deep learning model
146.
default company model
147.
design model
148.
design-driven business model
149.
designing a teaching model
150.
detailed model
151.
didactic model
152.
digital surface model (DSM)
153.
disease model
154.
distributed activation energy model
155.
Dodd–Deeds model
156.
domain model
157.
domain model and domain modelling
158.
dq0 model
159.
DSGE model
160.
DSL meta-model ontology
161.
Ducoffe’s advertisement value model
162.
Ducoffe’s advertising model
163.
dynamic factor model
164.
dynamic model
165.
Dynamical vegetation model
166.
Ecological Regional Ocean Model (ERGOM)
167.
economic model
168.
Economic optimization model
169.
EES model
170.
EES Model-2
171.
elaboration likelihood model
172.
electricity demand model
173.
Electronic Education System Model-2
174.
empirical energy consumption model
175.
empirical model
176.
end member mixing model
177.
endogenous growth model
178.
energy system model
179.
enzyme-constrained genome-scale model
180.
enterprise analysis model (EAM)
181.
entrepreneurial intention transformation model “EITM”
182.
equivalent circuit model
183.
Eringen model
184.
Estonian sustainability model
185.
Eulerian model
186.
European Charring Model
187.
EV load model
188.
Event Processing Network Model
189.
experience pyramid model
190.
Experimental model
191.
explainable AI model
192.
exponential load model
193.
exponential model
194.
fault analysis model
195.
Felder-Silverman model
196.
FEM-model
197.
field tests model validation
198.
finite control set-model predictive control (FCS-MPC)
199.
finite element model
200.
finite-element (FE) model
201.
finite-element model
202.
fire design model
203.
fixed country-effect model
204.
FOPDT model
205.
friction model
206.
functional fault model
207.
fuzzy logic model
208.
gaussian mixture model
209.
Gaussian model
210.
genome model
211.
Genome-scale metabolic model
212.
geoid model
213.
GIS model
214.
Global climate model
215.
goal model
216.
gravity model
217.
grey box model
218.
GTAP model
219.
GUI model
220.
habitat model
221.
habitat suitability model
222.
Hammerstein-Wiener model
223.
HBM model
224.
Hidden Markov Model (HMM)
225.
high-frequency model
226.
high-level control fault model
227.
high-level fault model
228.
high-level functional fault model
229.
HIROMB-BOOS-Model (HBM)
230.
HL7 Version 3: Reference Information Model (RIM)
231.
holistic M&A model
232.
holistic merger and acquisition model
233.
hot/cold pressing and finite element model simulation
234.
hydraulic model
235.
hydraulic network model
236.
hydrodynamic model
237.
Ice history model
238.
inductive model
239.
information model
240.
input-output model
241.
integrated quadruple instructional model
242.
integrated waste management model
243.
integrative pedagogy model
244.
interpretive structural model (ISM)
245.
Jiles–Atherton (JA) model
246.
joint model
247.
Kano model
248.
KPI selection model
249.
KPIs selection model
250.
laboratory domain model
251.
Lagrangian model
252.
logistic model
253.
logistics competence model
254.
loss model
255.
LSV model
256.
lumped model
257.
lumped-parameter model
258.
Machine Learning Explainable model
259.
machine-learning predictive model
260.
MACRO model
261.
Markov-switching model
262.
mathematical model
263.
maturity model
264.
measurement model
265.
mental model
266.
meta-model
267.
MGARCH model
268.
microscopic traffic flow model
269.
model
270.
model amphipathic peptide
271.
model averaging
272.
model based testing
273.
model building
274.
model calibration
275.
model checking
276.
model communities
277.
model compression
278.
model construction
279.
model description
280.
Model Driven Architecture
281.
model driven engineering
282.
model ensemble
283.
model evaluation
284.
model identification
285.
model learning
286.
model matching problem
287.
model of fracture mechanism
288.
model of fracturemechanism
289.
model of friction
290.
model of non-technical engineering competences
291.
model order estimation
292.
model order reduction
293.
model order reduction (MOR)
294.
model predictive control
295.
model predictive control (MPC)
296.
model reanalysis
297.
model reduction
298.
model reference adaptive control
299.
model reference controller
300.
model refinement
301.
model smell
302.
Model test
303.
model transformation
304.
model transformations
305.
Model validation
306.
model verification
307.
model-based control
308.
model-based development
309.
Model-Based Engineering (MBE)
310.
model-based mutation testing
311.
model-based patterns
312.
model-based software development
313.
Model-Based Systems Engineering (MBSE)
314.
model-based testing
315.
model-based verification
316.
model-checking
317.
model-driven design
318.
model-driven development
319.
model-free control
320.
model-free methods
321.
model-scale experiments
322.
modified winding function‐based model
323.
modulated finite control set-model predictive control
324.
multi model ensemble (MME)
325.
multiagent-based microscopic traffic assignment model (MMTAM)
326.
multidomain language model
327.
multi-loop model reference control
328.
multiplicative neuron model
329.
multi-pole mathematical model
330.
multi-pole model
331.
multi-pole model design
332.
natural background model
333.
Neyman-Pearson model
334.
NKG2015 geoid model
335.
NN-ANARX model
336.
nonlinear model identification
337.
nonlinear model predictive control
338.
nonlinear time-varying factor model
339.
non-thermal model
340.
Nonthermal model
341.
NSPT model
342.
object model
343.
ocean-sea-ice model
344.
open architecture model
345.
open-economy dynamic general equilibrium model
346.
openEHR RM (Reference Model)
347.
optimal model
348.
panel threshold model
349.
panel vector autoregressive model (VAR)
350.
parallel reaction model
351.
path loss model
352.
Peirce’s triadic model
353.
Peirce's model
354.
photodiode model
355.
PLM maturity model
356.
plume model
357.
POM model
358.
population balance model
359.
Porter’s diamond model
360.
power loss model
361.
power market model
362.
prediction model
363.
predictive model
364.
pre-trained model
365.
price-sensitive model of flexible equipment
366.
Princeton Ocean Model
367.
Probabilistic Graph Model (PGM)
368.
probabilistic model
369.
process model
370.
Quadruple Helix Model
371.
recurrent neural network language model
372.
reduced order model
373.
reference model
374.
regression based model
375.
regulatory model
376.
reputation model
377.
residential electricity consumption model
378.
Residual Terrain Model (RTM) anomaly
379.
residual terrain model anomaly
380.
retaining research financing, changes in salary rules; new academic career model
381.
Reynolds stress turbulence model
382.
Richardson Maturity Model
383.
risk evaluation model
384.
risk evaluation model development
385.
risk management model
386.
scalar model
387.
Scott-Kennel model
388.
shared mental model
389.
SHEL model
390.
ship model basin
391.
simplified model
392.
simulating waves nearshore (SWAN) model
393.
simulation model
394.
simulink model
395.
Simultaneous model-based optimization
396.
single-cell model
397.
sliding model control
398.
small-signal model
399.
SOILN model
400.
specific energy model
401.
standard cost model
402.
statistical model residuals
403.
Storm Water Management Model (SWMM5)
404.
Straussian theory model
405.
structural model
406.
stuck-at fault model
407.
supply chain model framework
408.
supply chain operations reference (SCOR) model
409.
surrogate model
410.
sustainability model framework
411.
SWAN model
412.
Zimbabwe agro-pastoral management model
413.
ZIP model
414.
zonal model
415.
teaching model
416.
technology acceptance model
417.
Technology Acceptance Model (TAM)
418.
tender evaluation model
419.
test model design
420.
The Baltic Sea Model Intercomparison Project (BMIP)
421.
the model of non-technical competences
422.
thermal model
423.
tobit regression model
424.
trade gravity model
425.
transnational model
426.
transport model
427.
transportation model
428.
tunnelling‐percolation model
429.
turn model
430.
two-dimensional model
431.
two-factor model
432.
Ulrich HR roles model
433.
ultra-local model
434.
ultralocal model (ULM) control
435.
Uppaal model-checker
436.
user behavioral model
437.
user dialogue model
438.
utility model
439.
validation of simulation model
440.
value-centric model
441.
wave model
442.
Vector Error Correction Model
443.
vector space model
444.
Wells-Riley model
445.
verification by model checking
446.
whole-cell model
447.
Viable Systems Model
448.
wind force model
449.
VRH model
450.
3D model
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Fit Model
4.
General Estuarine Transport Model (GETM)
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT