Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security problem definition (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/171)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Towards a healthcare cybersecurity certification scheme
Hovhannisyan, Kristine
;
Bogacki, Piotr
;
Colabuono, Consuelo Assunta
;
Lofu, Domenico
;
Marabello, Maria Vittoria
;
Maxwell, Brady Eugen
2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
2021
/
p. 1-9
https://doi.org/10.1109/CyberSA52016.2021.9478255
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
169
1.
security problem definition
2.
cost function definition
3.
definition
4.
legal definition
5.
market definition
6.
project definition
7.
REHVA nZEB technical definition
8.
strategy definition
9.
Urban area definition
10.
boundary problem
11.
boundary value problem
12.
Calderon problem
13.
Calderón problem
14.
class imbalance problem
15.
decoration problem
16.
elastica problem
17.
ethical problem
18.
finite basis problem
19.
free rider problem
20.
initial solution to the linear programming problem
21.
inventory routing problem
22.
inventory routing problem (IRP)
23.
inverse conductivity problem
24.
inverse problem
25.
inverse problem theory/applications
26.
inverse shape problem
27.
inverse source problem
28.
last mile problem
29.
matrix nearness problem
30.
model matching problem
31.
multicriteria decisionmaking problem
32.
non-local Riemann-Hilbert problem
33.
one more discrete logarithm problem
34.
overheating problem
35.
plane stress problem
36.
problem solving
37.
problem-based learning
38.
Problem-based learning (PBL)
39.
problem-oriented languages
40.
problem-oriented programming languages
41.
realisation problem
42.
realization problem
43.
SIS problem, learning with errors
44.
the inverse problem
45.
the problem of elimination
46.
theory of inventive problem solving (TRIZ)
47.
traveling salesman problem
48.
ad-hoc sensor networks security
49.
Automatic Security Verification
50.
Blockchain security
51.
cache security
52.
cloud security
53.
communication system security
54.
comprehensive system of economic security
55.
computer security
56.
cooperative security dilemma
57.
cyber security
58.
cyber security education
59.
cyber security exercises
60.
cyber security monitoring
61.
cyber security strategies
62.
cyber-security
63.
data and information security
64.
data security
65.
development of security cameras
66.
digital security practices
67.
drinking water security
68.
economic security
69.
economic security of enterprise
70.
emotional security
71.
energy security
72.
energy security indicator
73.
Estonian information security standard
74.
graded security
75.
hardware security
76.
hardware security primitive
77.
high level of security
78.
Homeland security
79.
human security
80.
information security
81.
information security and privacy
82.
initial level of security
83.
internal security
84.
international security
85.
investment and innovation security
86.
IPv6 security
87.
IT security
88.
IT security management
89.
job security
90.
long-term security
91.
maritime cyber security
92.
maritime cyber security operations centers
93.
Maritime Security Operations Center (M-SOC)
94.
medium level of security
95.
metadata model for security measures
96.
Middle Eastern security
97.
Mobile security
98.
national cyber security strategy
99.
national security
100.
NATO. Science for Peace and Security Program
101.
network security
102.
network security monitoring
103.
OSCE (Organization for Security and Co-operation in Europe)
104.
passenger’s security
105.
policy-based routing security
106.
political and security cultures
107.
post-quantum security
108.
power system security
109.
quantitative security
110.
regional security
111.
RISC-V Security Verification
112.
Safety and Security in Sea Transportation
113.
safety and security testing
114.
security
115.
security adaptation
116.
security alert prioritization
117.
security analysis
118.
security and justice (AFSJ)
119.
Security and political science
120.
security and privacy
121.
security and privacy in smart grids
122.
Security Assertion
123.
Security Assertion Mining
124.
security closure
125.
Security Coverage
126.
security dataset
127.
security dilemma
128.
Security evaluation
129.
security evaluation instruments
130.
Security Level Evaluation
131.
Security limitations
132.
security log analysis
133.
security management
134.
security model
135.
security monitoring
136.
security notion
137.
security objectives
138.
security of data
139.
security of supply
140.
security operation center
141.
security operations center
142.
security patterns
143.
security policy
144.
security proof
145.
security protocols
146.
security requirements
147.
security requirements engineering
148.
security research
149.
security risk assessment
150.
security risk management
151.
security risks
152.
security science and technology
153.
security strategies
154.
security systems for military objects
155.
security testing
156.
security training
157.
security verification
158.
security-by-design
159.
social security planning
160.
societal security
161.
software security
162.
software security level
163.
software security subcharacteristics
164.
sufficient level of security
165.
system of economic security
166.
system security
167.
terrorism security
168.
transmission System Security
169.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT