Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Information and computer security (allikas)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(3/324)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
The cyber-insurance market in Norway
Bahsi, Hayretdin
;
Franke, Ulrik
;
Langfeldt Friberg, Even
Information and computer security
2020
/
p. 54−67
https://doi.org/10.1108/ICS-01-2019-0012
Journal metrics at Scopud
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
319
1.
computer security
2.
Estonian information security standard
3.
information security
4.
information security and privacy
5.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security strategies
18.
cyber-security
19.
data security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
human security
32.
internal security
33.
international security
34.
investment and innovation security
35.
IPv6 security
36.
IT security
37.
IT security management
38.
job security
39.
long-term security
40.
metadata model for security measures
41.
Middle Eastern security
42.
Mobile security
43.
national cyber security strategy
44.
national security
45.
NATO. Science for Peace and Security Program
46.
network security
47.
network security monitoring
48.
OSCE (Organization for Security and Co-operation in Europe)
49.
passenger’s security
50.
policy-based routing security
51.
political and security cultures
52.
post-quantum security
53.
power system security
54.
quantitative security
55.
regional security
56.
RISC-V Security Verification
57.
safety and security testing
58.
security
59.
security adaptation
60.
security alert prioritization
61.
security analysis
62.
security and justice (AFSJ)
63.
Security and political science
64.
security and privacy
65.
security and privacy in smart grids
66.
Security Assertion Mining
67.
security closure
68.
Security Coverage
69.
security dataset
70.
security dilemma
71.
Security evaluation
72.
security evaluation instruments
73.
Security limitations
74.
security log analysis
75.
security management
76.
security model
77.
security monitoring
78.
security notion
79.
security objectives
80.
security of data
81.
security of supply
82.
security operation center
83.
security operations center
84.
security patterns
85.
security policy
86.
security problem definition
87.
security proof
88.
security protocols
89.
security requirements
90.
security requirements engineering
91.
security risk assessment
92.
security risk management
93.
security risks
94.
security strategies
95.
security systems for military objects
96.
security testing
97.
security training
98.
security verification
99.
security-by-design
100.
social security planning
101.
societal security
102.
system of economic security
103.
system security
104.
terrorism security
105.
transmission System Security
106.
voting privacy and security
107.
computer
108.
computer aided design
109.
computer aided diagnosis
110.
computer aided diagnostics
111.
computer aided instruction
112.
computer aided language translation
113.
computer aided manufacturing
114.
computer aided methods
115.
computer aided software engineering
116.
computer aided testing
117.
computer algebra
118.
computer algebra system
119.
computer and education
120.
computer anxiety
121.
computer architecture
122.
computer assisted language learning
123.
computer based learning
124.
computer circuits
125.
computer control
126.
Computer crime
127.
computer education
128.
computer engineering
129.
computer engineerng
130.
computer game
131.
computer graphics
132.
computer hardware
133.
computer integrated manufacturing
134.
computer network management
135.
computer network operations
136.
computer networks
137.
computer pipelines
138.
computer programming
139.
computer programming languages
140.
computer programs
141.
computer science
142.
computer science basics
143.
computer science education
144.
computer simulation
145.
computer simulation environments
146.
computer simulations
147.
computer software
148.
Computer software and hardware
149.
computer softwaregraph theory
150.
computer systems
151.
Computer systems organization
152.
computer terminals
153.
computer vision
154.
computer vision-based methods
155.
computer workers
156.
computer-aided anthropometry
157.
computer-aided architectural design (CAAD)
158.
computer‐aided assessment
159.
computer-aided design
160.
computer-aided design (CAD)
161.
computer-aided detection
162.
computer‐aided detection
163.
computer-aided diagnosis
164.
computer-aided drawing (CAD)
165.
computer-aided engineering
166.
computer-aided teaching
167.
Computer-Aided Tuning
168.
computer-aided tuning (CAT)
169.
computer-assisted language learning (CALL)
170.
computer-oriented technologies
171.
computer-supported decision-making
172.
computer-use
173.
computer-workers
174.
control engineering computer applications
175.
distributed computer systems
176.
education in computer engineering
177.
fifth generation computer
178.
gateways (computer networks)
179.
high-performance computer systems
180.
human computer interaction
181.
human computer interaction (HCI)
182.
human-computer interaction
183.
human–computer interaction
184.
Human-Computer Interaction (HCI)
185.
human-computer trust
186.
interactive computer graphics
187.
laptop computer
188.
logic in computer science
189.
single board computer
190.
single-board computer
191.
structure computer analysis
192.
ubiquitous computer technology
193.
Web and computer-based learning
194.
access to information
195.
age of information
196.
banking information
197.
building information modelling
198.
building information modeling
199.
Building Information Modeling (BIM)
200.
building information modelling
201.
Building Information Modelling (BIM)
202.
Building Information Modelling (BIM) adoption
203.
business information technology
204.
city information modelling (CIM)
205.
communication channels (information theory)
206.
Community Statistics on Information Society (CSIS)
207.
court information system
208.
critical information infrastructure
209.
Data-information-knowledgewisdom (DIKW)
210.
discrete information bottle-neck
211.
dissemination of information
212.
enterprise information systems
213.
Estonian National Health Information System
214.
estonian national health information system (ENHIS)
215.
Estonian nationwide Health Information System (EHIS)
216.
evolutionary information systems
217.
financial information
218.
general theory of information transfer
219.
Geographic Information System (GIS)
220.
geographical information system
221.
health information exchange
222.
health information purpose
223.
health information sharing maturity
224.
health information systems
225.
Healthcare information systems
226.
high-performance computing systems, Information processing
227.
HL7 Version 3: Reference Information Model (RIM)
228.
ICT (information and communication technology)
229.
information
230.
information analysis
231.
information and communication technologies
232.
Information and Communication Technologies (ICT)
233.
Information and communication technologies (ICT) digitalisation
234.
Information and Communication Technologies (ICT) laws
235.
Information and Communication Technologies (ICTs)
236.
Information and Communication Technologies for Development
237.
information and communication technology
238.
information and communication technology (ICT)
239.
information and communications technology
240.
information and consultation
241.
information architecture
242.
information asymmetry
243.
information commons
244.
information communication technology
245.
information content
246.
information control
247.
information dissemination
248.
information economy
249.
information entropy
250.
information exchange
251.
information extraction
252.
information filtering
253.
information flow control
254.
information fusion
255.
information governance
256.
information integration
257.
information literacy
258.
information literacy cooperation
259.
information logistics
260.
information management
261.
information measures
262.
information model
263.
information model-based urban planning
264.
information polity
265.
information potential
266.
information processing
267.
information processing system
268.
information rate
269.
information realities
270.
information retrieval
271.
information revolution
272.
information seeking behaviour
273.
information sharing
274.
information society
275.
Information sufficiency
276.
information system
277.
Information System Authority (RIA)
278.
information systems
279.
information systems development
280.
Information Systems research
281.
information technologies
282.
Information technology
283.
information technology (IT)
284.
information theory
285.
information to individual consumers
286.
information tool
287.
information value
288.
information warfare
289.
information visualization
290.
information volume
291.
Information-seeking activity
292.
intelligent information technology
293.
interoperability and evolutionary criteria of information systems
294.
laboratory information management system (LIMS)
295.
laboratory information management systems
296.
LIMS (laboratory information management systems)
297.
medical information
298.
Medical information policy
299.
middleware (for subscription and distribution of situational information)
300.
mobile information system
301.
multilingual information retrieval
302.
multimodal information
303.
open architecture for information exchange
304.
perception of visual information
305.
performance information
306.
performance information use
307.
philosophy of information
308.
process modeling and information systems within the extended enterprise
309.
provision of information to workers
310.
quality evaluation of scientific information
311.
real time information
312.
real-time information
313.
Reaxys Chemistry database information
314.
scientific information
315.
SIS II (Schengen Information System II)
316.
traffic information system (TIS)
317.
tree information database
318.
website information
319.
VIS (Visa Information System)
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Computer Systems
4.
Estonian Summer School on Computer and Systems Science, 2023
TTÜ märksõna
1
1.
Building Information Modeling
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT