Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
computer security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
7
Vaata veel..
(2/155)
Ekspordi
ekspordi kõik päringu tulemused
(7)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
artikkel kogumikus
Are the current system engineering practices sufficient to meet cyber crime?
Buldas, Ahto
;
Saarepera, Märt
Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017 : held as part of HCI International 2017, Vancouver, BC, Canada, July 9–14, 2017 : proceedings
2017
/
p. 451-463
http://doi.org/10.1007/978-3-319-58460-7_31
artikkel kogumikus
3
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
4
artikkel kogumikus
EU cybersecurity governance – stakeholders and normative intentions towards integration
Kasper, Agnes
The future of the European Union : demisting the debate
2020
/
p. 166−185
https://www.um.edu.mt/library/oar/handle/123456789/52308
https://www.um.edu.mt/library/oar/bitstream/123456789/52308/1/EU_cybersecurity_governance%e2%80%93stakeholders_and_normative_intentions_towards_integration_2020.pdf
artikkel kogumikus
5
artikkel kogumikus
Preface
Bellatreche, Ladjel
;
Chernishev, George
;
Corral, Antonio
;
Ouchani, Samir
;
Vain, Jüri
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
/
p. v-vii
https://doi.org/10.1007/978-3-030-87657-9
artikkel kogumikus
6
artikkel kogumikus
The becoming of cyber-military capabilities
Salminen, Mikko
;
Kerttunen, Mika
Routledge handbook of international cybersecurity
2020
/
p. 94-107
https://www.ester.ee/record=b5308475*est
artikkel kogumikus
7
artikkel kogumikus
Towards a Cyber Maastricht : two steps forward, one step back
Kasper, Agnes
;
Vernygora, Vlad Alex
The future of the European Union : demisting the debate
2020
/
p. 186-210
https://www.um.edu.mt/library/oar/handle/123456789/52310
https://www.um.edu.mt/library/oar/bitstream/123456789/52310/1/Towards_a_%e2%80%98Cyber_Maastricht%e2%80%99_two_steps_forward_one_step_back_2020.pdf
artikkel kogumikus
Kirjeid leitud 7, kuvan
1 - 7
võtmesõna
151
1.
computer security
2.
ad-hoc sensor networks security
3.
Blockchain security
4.
cache security
5.
communication system security
6.
comprehensive system of economic security
7.
cooperative security dilemma
8.
cyber security
9.
cyber security education
10.
cyber security exercises
11.
cyber security strategies
12.
cyber-security
13.
data security
14.
drinking water security
15.
economic security
16.
economic security of enterprise
17.
energy security
18.
energy security indicator
19.
graded security
20.
hardware security
21.
hardware security primitive
22.
human security
23.
information security
24.
internal security
25.
international security
26.
investment and innovation security
27.
IPv6 security
28.
IT security
29.
job security
30.
long-term security
31.
metadata model for security measures
32.
Middle Eastern security
33.
Mobile security
34.
national cyber security strategy
35.
national security
36.
NATO. Science for Peace and Security Program
37.
network security
38.
network security monitoring
39.
OSCE (Organization for Security and Co-operation in Europe)
40.
passenger’s security
41.
policy-based routing security
42.
political and security cultures
43.
post-quantum security
44.
power system security
45.
quantitative security
46.
regional security
47.
security
48.
security and privacy
49.
security and privacy in smart grids
50.
security closure
51.
Security Coverage
52.
security dataset
53.
security dilemma
54.
Security evaluation
55.
security log analysis
56.
security management
57.
security model
58.
security monitoring
59.
security notion
60.
security objectives
61.
security of data
62.
security of supply
63.
security operation center
64.
security patterns
65.
security problem definition
66.
security proof
67.
security protocols
68.
security requirements
69.
security requirements engineering
70.
security risk assessment
71.
security risk management
72.
security strategies
73.
security testing
74.
security training
75.
security verification
76.
social security planning
77.
societal security
78.
system of economic security
79.
system security
80.
terrorism security
81.
transmission System Security
82.
voting privacy and security
83.
computer
84.
computer aided design
85.
computer aided diagnosis
86.
computer aided diagnostics
87.
computer aided instruction
88.
computer aided manufacturing
89.
computer aided testing
90.
computer algebra
91.
computer algebra system
92.
computer and education
93.
computer anxiety
94.
computer architecture
95.
computer assisted language learning
96.
computer based learning
97.
computer control
98.
computer education
99.
computer engineering
100.
computer engineerng
101.
computer game
102.
computer graphics
103.
computer hardware
104.
computer integrated manufacturing
105.
computer network management
106.
computer network operations
107.
computer networks
108.
computer pipelines
109.
computer programming
110.
computer programs
111.
computer science
112.
computer science basics
113.
computer science education
114.
computer simulation
115.
computer simulation environments
116.
computer simulations
117.
computer softwaregraph theory
118.
computer systems
119.
computer terminals
120.
computer vision
121.
computer workers
122.
computer-aided anthropometry
123.
computer-aided architectural design (CAAD)
124.
computer‐aided assessment
125.
computer-aided design
126.
computer-aided detection
127.
computer‐aided detection
128.
computer-aided diagnosis
129.
computer-aided drawing (CAD)
130.
computer-aided engineering
131.
computer-aided teaching
132.
computer-assisted language learning (CALL)
133.
computer-supported decision-making
134.
computer-use
135.
control engineering computer applications
136.
distributed computer systems
137.
education in computer engineering
138.
fifth generation computer
139.
gateways (computer networks)
140.
high-performance computer systems
141.
human computer interaction
142.
human computer interaction (HCI)
143.
human-computer interaction
144.
Human-Computer Interaction (HCI)
145.
interactive computer graphics
146.
laptop computer
147.
logic in computer science
148.
single board computer
149.
structure computer analysis
150.
ubiquitous computer technology
151.
Web and computer-based learning
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Computer Systems
4.
Estonian Summer School on Computer and Systems Science, 2023
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT