Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security monitoring (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/243)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
How to build a SOC on a budget
Vaarandi, Risto
;
Mäses, Sten
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
2022
/
p. 171-177 : ill
https://doi.org/10.1109/CSR54599.2022.9850281
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
236
1.
cyber security monitoring
2.
network security monitoring
3.
security monitoring
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
cloud security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
data and information security
19.
data security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
maritime cyber security
47.
maritime cyber security operations centers
48.
Maritime Security Operations Center (M-SOC)
49.
medium level of security
50.
metadata model for security measures
51.
Middle Eastern security
52.
Mobile security
53.
national cyber security strategy
54.
national security
55.
NATO. Science for Peace and Security Program
56.
network security
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion
77.
Security Assertion Mining
78.
security closure
79.
Security Coverage
80.
security dataset
81.
security dilemma
82.
Security evaluation
83.
security evaluation instruments
84.
Security Level Evaluation
85.
Security limitations
86.
security log analysis
87.
security management
88.
security model
89.
security notion
90.
security objectives
91.
security of data
92.
security of supply
93.
security operation center
94.
security operations center
95.
security patterns
96.
security policy
97.
security problem definition
98.
security proof
99.
security protocols
100.
security requirements
101.
security requirements engineering
102.
security research
103.
security risk assessment
104.
security risk management
105.
security risks
106.
security science and technology
107.
security strategies
108.
security systems for military objects
109.
security testing
110.
security training
111.
security verification
112.
security-by-design
113.
social security planning
114.
societal security
115.
software security
116.
software security level
117.
software security subcharacteristics
118.
sufficient level of security
119.
system of economic security
120.
system security
121.
terrorism security
122.
transmission System Security
123.
voting privacy and security
124.
ambulatory blood pressure monitoring
125.
automated decision and monitoring mechanisms
126.
Baltic-wide HELCOM COMBINE monitoring program
127.
bi-directional fault monitoring devices
128.
biological monitoring
129.
biomedical monitoring
130.
biosignal monitoring
131.
cardiac monitoring
132.
CO2 monitoring
133.
coastal monitoring
134.
condition monitoring
135.
condition monitoring system
136.
continuous monitoring
137.
Copernicus Marine Environment Monitoring Service
138.
corporate performance monitoring system
139.
corrosion monitoring
140.
data-driven condition monitoring
141.
deformation monitoring
142.
diagnosis and performance monitoring
143.
Distributed flow monitoring
144.
distributed monitoring
145.
distributed online monitoring
146.
disturbance monitoring
147.
drone-based traffic monitoring
148.
drug monitoring
149.
e-monitoring
150.
Environmental compliance monitoring
151.
environmental monitoring
152.
fault monitoring
153.
field monitoring
154.
fish monitoring
155.
GHB monitoring
156.
groundwater monitoring
157.
haemodialysis monitoring
158.
health monitoring
159.
healthcare monitoring
160.
hemodialysis monitoring
161.
home blood pressure monitoring
162.
home monitoring
163.
industrial monitoring
164.
infrastructure monitoring
165.
in-situ monitoring
166.
integrated hemodynamic monitoring
167.
interactive monitoring
168.
IoT-based monitoring
169.
laboratory monitoring
170.
landfill monitoring
171.
load monitoring
172.
long term monitoring
173.
long-term monitoring
174.
machine condition monitoring
175.
machinery monitoring
176.
Magnetic induction monitoring
177.
marine microplastic monitoring
178.
marine monitoring
179.
monitoring
180.
monitoring and application design
181.
monitoring and detection
182.
monitoring and prognosis
183.
monitoring deformations
184.
monitoring program
185.
monitoring RIS3 observatory
186.
monitoring system
187.
monitoring the health patients
188.
NetFlow based network monitoring
189.
network monitoring
190.
Non-intrusive load monitoring
191.
non-intrusive load monitoring (NILM)
192.
ocean monitoring
193.
online monitoring
194.
on-line monitoring
195.
optical monitoring
196.
passive acoustic monitoring
197.
patient monitoring
198.
performance monitoring
199.
periodic monitoring
200.
pollen monitoring
201.
power quality monitoring
202.
PQM (Power Quality Monitoring)
203.
process monitoring
204.
production monitoring
205.
production monitoring system
206.
production monitoring system (PLM)
207.
production monitoring system (PMS)
208.
production monitoring systems (PMS)
209.
project-monitoring
210.
quality monitoring
211.
real time monitoring process
212.
real-time collision monitoring
213.
real-time monitoring
214.
remote monitoring
215.
remote patient monitoring
216.
respiratory monitoring
217.
RIS3 evaluation and monitoring
218.
road surface condition monitoring
219.
sea monitoring
220.
sensor respiratory monitoring
221.
smart materials with structural health monitoring capabilities
222.
SoC health monitoring
223.
stormwater monitoring
224.
structural health monitoring
225.
surface water monitoring
226.
susceptibility monitoring
227.
system monitoring
228.
terms—production environment monitoring
229.
the accuracy of monitoring in analysis of impact impulses
230.
The Baltic Monitoring and Forecasting Centre (BAL MFC)
231.
traffic behavior monitoring
232.
treatment monitoring
233.
water pollution monitoring
234.
water quality monitoring
235.
wearable health monitoring
236.
wide area monitoring
märksõna
7
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
4.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
5.
Baltic Monitoring and Forecasting Center (BALMFC)
6.
Copernicus Marine Environment Monitoring Service (CMEMS)
7.
MyOcean Baltic Sea Monitoring and Forecasting Centre
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT