Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Information and computer security (allikas)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(3/344)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
The cyber-insurance market in Norway
Bahsi, Hayretdin
;
Franke, Ulrik
;
Langfeldt Friberg, Even
Information and computer security
2020
/
p. 54−67
https://doi.org/10.1108/ICS-01-2019-0012
Journal metrics at Scopud
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
339
1.
computer security
2.
data and information security
3.
Estonian information security standard
4.
information security
5.
information security and privacy
6.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
7.
ad-hoc sensor networks security
8.
Automatic Security Verification
9.
Blockchain security
10.
cache security
11.
communication system security
12.
comprehensive system of economic security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
data security
21.
development of security cameras
22.
digital security practices
23.
drinking water security
24.
economic security
25.
economic security of enterprise
26.
emotional security
27.
energy security
28.
energy security indicator
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
initial level of security
36.
internal security
37.
international security
38.
investment and innovation security
39.
IPv6 security
40.
IT security
41.
IT security management
42.
job security
43.
long-term security
44.
maritime cyber security
45.
maritime cyber security operations centers
46.
Maritime Security Operations Center (M-SOC)
47.
medium level of security
48.
metadata model for security measures
49.
Middle Eastern security
50.
Mobile security
51.
national cyber security strategy
52.
national security
53.
NATO. Science for Peace and Security Program
54.
network security
55.
network security monitoring
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
Safety and Security in Sea Transportation
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion Mining
76.
security closure
77.
Security Coverage
78.
security dataset
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security Level Evaluation
83.
Security limitations
84.
security log analysis
85.
security management
86.
security model
87.
security monitoring
88.
security notion
89.
security objectives
90.
security of data
91.
security of supply
92.
security operation center
93.
security operations center
94.
security patterns
95.
security policy
96.
security problem definition
97.
security proof
98.
security protocols
99.
security requirements
100.
security requirements engineering
101.
security research
102.
security risk assessment
103.
security risk management
104.
security risks
105.
security science and technology
106.
security strategies
107.
security systems for military objects
108.
security testing
109.
security training
110.
security verification
111.
security-by-design
112.
social security planning
113.
societal security
114.
software security
115.
software security level
116.
software security subcharacteristics
117.
sufficient level of security
118.
system of economic security
119.
system security
120.
terrorism security
121.
transmission System Security
122.
voting privacy and security
123.
computer
124.
computer aided design
125.
computer aided diagnosis
126.
computer aided diagnostics
127.
computer aided instruction
128.
computer aided language translation
129.
computer aided manufacturing
130.
computer aided methods
131.
computer aided software engineering
132.
computer aided testing
133.
computer algebra
134.
computer algebra system
135.
computer and education
136.
computer anxiety
137.
computer architecture
138.
computer assisted language learning
139.
computer based learning
140.
computer circuits
141.
computer control
142.
Computer crime
143.
computer education
144.
computer engineering
145.
computer engineerng
146.
computer game
147.
computer graphics
148.
computer hardware
149.
computer integrated manufacturing
150.
computer network management
151.
computer network operations
152.
computer networks
153.
computer pipelines
154.
computer programming
155.
computer programming languages
156.
computer programs
157.
computer science
158.
computer science basics
159.
computer science education
160.
computer simulation
161.
computer simulation environments
162.
computer simulations
163.
computer software
164.
Computer software and hardware
165.
computer softwaregraph theory
166.
computer systems
167.
Computer systems organization
168.
computer terminals
169.
computer vision
170.
computer vision-based methods
171.
computer workers
172.
computer-aided anthropometry
173.
computer-aided architectural design (CAAD)
174.
computer‐aided assessment
175.
computer-aided design
176.
computer-aided design (CAD)
177.
computer-aided detection
178.
computer‐aided detection
179.
computer-aided diagnosis
180.
computer-aided drawing (CAD)
181.
computer-aided engineering
182.
computer-aided teaching
183.
Computer-Aided Tuning
184.
computer-aided tuning (CAT)
185.
computer-assisted language learning (CALL)
186.
computer-oriented technologies
187.
computer-supported decision-making
188.
computer-use
189.
computer-workers
190.
control engineering computer applications
191.
distributed computer systems
192.
education in computer engineering
193.
fifth generation computer
194.
gateways (computer networks)
195.
high-performance computer systems
196.
human computer interaction
197.
human computer interaction (HCI)
198.
human-computer interaction
199.
human–computer interaction
200.
Human-Computer Interaction (HCI)
201.
human-computer trust
202.
interactive computer graphics
203.
laptop computer
204.
logic in computer science
205.
single board computer
206.
single-board computer
207.
structure computer analysis
208.
ubiquitous computer technology
209.
Web and computer-based learning
210.
access to information
211.
age of information
212.
banking information
213.
building information modelling
214.
building information modeling
215.
Building Information Modeling (BIM)
216.
building information modelling
217.
Building Information Modelling (BIM)
218.
Building Information Modelling (BIM) adoption
219.
business information technology
220.
city information modelling (CIM)
221.
communication channels (information theory)
222.
Community Statistics on Information Society (CSIS)
223.
court information system
224.
critical information infrastructure
225.
Data-information-knowledgewisdom (DIKW)
226.
discrete information bottle-neck
227.
dissemination of information
228.
enterprise information systems
229.
Estonian National Health Information System
230.
estonian national health information system (ENHIS)
231.
Estonian nationwide Health Information System (EHIS)
232.
evolutionary information systems
233.
financial information
234.
general theory of information transfer
235.
Geographic Information System (GIS)
236.
geographical information system
237.
health information exchange
238.
health information purpose
239.
health information sharing maturity
240.
health information systems
241.
Healthcare information systems
242.
high-performance computing systems, Information processing
243.
HL7 Version 3: Reference Information Model (RIM)
244.
ICT (information and communication technology)
245.
information
246.
information analysis
247.
information and communication technologies
248.
Information and Communication Technologies (ICT)
249.
Information and communication technologies (ICT) digitalisation
250.
Information and Communication Technologies (ICT) laws
251.
Information and Communication Technologies (ICTs)
252.
Information and Communication Technologies for Development
253.
information and communication technology
254.
information and communication technology (ICT)
255.
information and communications technology
256.
information and consultation
257.
information architecture
258.
information asymmetry
259.
information commons
260.
information communication technology
261.
information content
262.
information control
263.
information dissemination
264.
information economy
265.
information entropy
266.
information exchange
267.
information extraction
268.
information filtering
269.
information flow control
270.
information fusion
271.
information governance
272.
information integration
273.
information literacy
274.
information literacy cooperation
275.
information logistics
276.
information management
277.
information measures
278.
information model
279.
information model-based urban planning
280.
information polity
281.
information potential
282.
information preprocessing
283.
information processing
284.
information processing system
285.
information rate
286.
information realities
287.
information retrieval
288.
information revolution
289.
information seeking behaviour
290.
information sharing
291.
information society
292.
Information sufficiency
293.
information system
294.
Information System Authority (RIA)
295.
information systems
296.
information systems development
297.
Information Systems research
298.
information technologies
299.
Information technology
300.
information technology (IT)
301.
information theory
302.
information to individual consumers
303.
information tool
304.
information use
305.
information value
306.
information war
307.
information warfare
308.
information visualization
309.
information volume
310.
Information-seeking activity
311.
intelligent information technology
312.
interoperability and evolutionary criteria of information systems
313.
laboratory information management system (LIMS)
314.
laboratory information management systems
315.
LIMS (laboratory information management systems)
316.
medical information
317.
Medical information policy
318.
middleware (for subscription and distribution of situational information)
319.
mobile information system
320.
multilingual information retrieval
321.
multimodal information
322.
open architecture for information exchange
323.
perception of visual information
324.
performance information
325.
performance information use
326.
philosophy of information
327.
process modeling and information systems within the extended enterprise
328.
provision of information to workers
329.
quality evaluation of scientific information
330.
real time information
331.
real-time information
332.
Reaxys Chemistry database information
333.
scientific information
334.
SIS II (Schengen Information System II)
335.
tactile information
336.
traffic information system (TIS)
337.
tree information database
338.
website information
339.
VIS (Visa Information System)
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Computer Systems
4.
Estonian Summer School on Computer and Systems Science, 2023
TTÜ märksõna
1
1.
Building Information Modeling
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT