Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security operation center (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/170)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
How to build a SOC on a budget
Vaarandi, Risto
;
Mäses, Sten
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
2022
/
p. 171-177 : ill
https://doi.org/10.1109/CSR54599.2022.9850281
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
163
1.
security operation center
2.
Maritime Security Operations Center (M-SOC)
3.
security operations center
4.
maritime cyber security operations centers
5.
OSCE (Organization for Security and Co-operation in Europe)
6.
autoservice center
7.
center-tapped coupled inductor
8.
data center
9.
data center (DC)
10.
data center applications
11.
daycare center
12.
Municipal Operations Center
13.
Non-emergency Contact Center
14.
shared service center
15.
shared service center (SSC)
16.
underwater data center
17.
urban learning center
18.
alternate operation
19.
boiler transient operation
20.
buckboost operation
21.
buck–boost operation
22.
co-operation
23.
co-operation between member states
24.
cyber operation
25.
cyber operation officer
26.
dynamic operation of heating systems
27.
fault tolerant operation
28.
influence operation
29.
islanded operation
30.
judicial co-operation
31.
maintenance and efficient operation
32.
morphological operation
33.
operation
34.
operation and maintenance
35.
operation costs
36.
operation management
37.
optimal operation strategy
38.
pick-and-place operation
39.
power system operation
40.
protection non operation
41.
regional co-operation
42.
remote operation of vehicles
43.
safe operation
44.
transmission system operation
45.
wide voltage range operation
46.
ad-hoc sensor networks security
47.
Automatic Security Verification
48.
Blockchain security
49.
cache security
50.
cloud security
51.
communication system security
52.
comprehensive system of economic security
53.
computer security
54.
cooperative security dilemma
55.
cyber security
56.
cyber security education
57.
cyber security exercises
58.
cyber security monitoring
59.
cyber security strategies
60.
cyber-security
61.
data and information security
62.
data security
63.
development of security cameras
64.
digital security practices
65.
drinking water security
66.
economic security
67.
economic security of enterprise
68.
emotional security
69.
energy security
70.
energy security indicator
71.
Estonian information security standard
72.
graded security
73.
hardware security
74.
hardware security primitive
75.
high level of security
76.
Homeland security
77.
human security
78.
information security
79.
information security and privacy
80.
initial level of security
81.
internal security
82.
international security
83.
investment and innovation security
84.
IPv6 security
85.
IT security
86.
IT security management
87.
job security
88.
long-term security
89.
maritime cyber security
90.
medium level of security
91.
metadata model for security measures
92.
Middle Eastern security
93.
Mobile security
94.
national cyber security strategy
95.
national security
96.
NATO. Science for Peace and Security Program
97.
network security
98.
network security monitoring
99.
passenger’s security
100.
policy-based routing security
101.
political and security cultures
102.
post-quantum security
103.
power system security
104.
quantitative security
105.
regional security
106.
RISC-V Security Verification
107.
Safety and Security in Sea Transportation
108.
safety and security testing
109.
security
110.
security adaptation
111.
security alert prioritization
112.
security analysis
113.
security and justice (AFSJ)
114.
Security and political science
115.
security and privacy
116.
security and privacy in smart grids
117.
Security Assertion
118.
Security Assertion Mining
119.
security closure
120.
Security Coverage
121.
security dataset
122.
security dilemma
123.
Security evaluation
124.
security evaluation instruments
125.
Security Level Evaluation
126.
Security limitations
127.
security log analysis
128.
security management
129.
security model
130.
security monitoring
131.
security notion
132.
security objectives
133.
security of data
134.
security of supply
135.
security patterns
136.
security policy
137.
security problem definition
138.
security proof
139.
security protocols
140.
security requirements
141.
security requirements engineering
142.
security research
143.
security risk assessment
144.
security risk management
145.
security risks
146.
security science and technology
147.
security strategies
148.
security systems for military objects
149.
security testing
150.
security training
151.
security verification
152.
security-by-design
153.
social security planning
154.
societal security
155.
software security
156.
software security level
157.
software security subcharacteristics
158.
sufficient level of security
159.
system of economic security
160.
system security
161.
terrorism security
162.
transmission System Security
163.
voting privacy and security
märksõna
7
1.
Baltic Monitoring and Forecasting Center (BALMFC)
2.
Estonian Center for Safe and Trustworthy Artificial Intelligence (ECSTAI)
3.
FinEst Center for Smart Cities
4.
The Center for European Integration Studies
5.
UNDP Urban Learning Center
6.
National Computer Security Incident Response Teams (N-CSIRTs)
7.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT