Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
41
Vaata veel..
(2/84)
Ekspordi
ekspordi kõik päringu tulemused
(41)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Ahlswede, R. Ahlswede, A. (ed.); Althöfer, I. (ed.); Deppe, C. (ed.); Tamm, Ulrich (ed.). Identification and other probabilistic models. Rudolf Ahlswede’s lectures on information theory 6. Edited by Alexander Ahlswede, Ingo Althöfer, Christian Deppe and Ulrich Tamm : [review]
Henno, Jaak
Zentralblatt MATH
2021
/
1 p
https://zbmath.org/?q=an%3A7349483
artikkel ajakirjas
2
artikkel kogumikus
An enhanced lightweight authentication scheme for secure access to cloud data
Hammami, Hamza
;
Obaidat, Mohammad S.
;
Ben Yahia, Sadok
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 2020
2020
/
p. 110-117
https://doi.org/10.5220/0009824301100117
artikkel kogumikus
3
artikkel kogumikus
Assessment of aviation security risk management for airline turnaround processes
Matulevičius, Raimundas
;
Norta, Alexander
;
Udokwu, Chibuzor
;
Nõukas, Rein
Transactions on large-scale data- and knowledge-centered systems XXXVI : special issue on data and security engineering
2017
/
p. 109-141 : ill
https://doi.org/10.1007/978-3-662-56266-6_6
artikkel kogumikus
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Between sustainability, social cohesion and security regional development in northeastern estonia
Prause, Gunnar Klaus
;
Tuisk, Tarmo
;
Olaniyi, Eunice Omolola
Entrepreneurship and sustainability issues
2019
/
p. 1235-1254
http://doi.org/10.9770/jesi.2019.6.3(13)
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
5
artikkel ajakirjas
Chia, N-H.; Chung, K-M.; Yamakawa, T. A black-box approach to post-quantum zero-knowledge in constant rounds : [review]
Henno, Jaak
zbMATH Open
2022
/
1 p.
https://zbmath.org/1486.94089
artikkel ajakirjas
6
artikkel ajakirjas
Current problems related to energy policy and law in European Union
Kerikmäe, Tanel
;
Dutt, Pawan Kumar
L'Europe unie = United Europe
2013
/
p. 112-120 : ill
artikkel ajakirjas
7
artikkel kogumikus
Design and verification of secure cache wrapper against access-driven side-channel attacks
Niazmand, Behrad
;
Azad, Siavoosh Payandeh
;
Jervan, Gert
;
Sepulveda, Johanna
Euromicro Conference on Digital System Design : DSD 2019 : 28 - 30 August 2019 Kallithea, Chalkidiki, Greece : proceedings
2019
/
p. 672-676 : ill
https://doi.org/10.1109/DSD.2019.00108
artikkel kogumikus
8
artikkel ajakirjas
DoS attack detection and path collision localization in NoC-based MPSoC architectures
Chaves Arroyave, Cesar Giovanni
;
Azad, Siavoosh Payandeh
;
Hollstein, Thomas
;
Sepulveda, Johanna
Journal of low power electronics and applications
2019
/
art. 7, 20 p. : ill
https://doi.org/10.3390/jlpea9010007
artikkel ajakirjas
9
artikkel kogumikus
Dynamic and distributed security management for NoC Based MPSoCs
Azad, Siavoosh Payandeh
;
Jervan, Gert
;
Sepulveda, Johanna
Computational Science - ICCS 2019 : 19th International Conference, Faro, Portugal, June 12-14, 2019 : Proceedings, Part II
2019
/
p. 649–662 : ill
https://doi.org/10.1007/978-3-030-22741-8_4
artikkel kogumikus
10
artikkel ajakirjas
An efficient authentication and key agreement scheme for secure smart grid communication services
Hammami, Hamza
;
Obaidat, Mohammad S.
;
Ben Yahia, Sadok
International journal of communication systems
2020
/
art. e4558, p. 1−13
https://doi.org/10.1002/dac.4558
artikkel ajakirjas
11
artikkel ajakirjas
Europe's refugee crisis in 2015 and security threats from the Baltic perspective
Veebel, Viljar
;
Markus, Raul
Journal of politics and law
2015
/
p. 254-262 : ill
http://dx.doi.org/10.5539/jpl.v8n4p254
artikkel ajakirjas
12
artikkel kogumikus
Framework for peer-to-peer data sharing over Web browsers
Pattanaik, Vishwajeet
;
Sharvadze, Ioane
;
Draheim, Dirk
Future Data and Security Engineering : 6th International Conference, FDSE 2019 Nha Trang City, Vietnam, November 27–29, 2019 : proceedings
2019
/
p. 207-225 : ill
https://doi.org/10.1007/978-3-030-35653-8_14
artikkel kogumikus
Seotud publikatsioonid
1
Robust Web annotations in support of knowledge co-creation = Töökindlad veebiannotatsioonid teadmiste ühisloome toetamiseks
13
artikkel kogumikus
IaaS platforms : how secure are they?
Astrova, Irina
;
Koschel, Arne
;
Henke, Mats Lennart
IEEE 30th International Conference on Advanced Information Networking and Applications Workshops : WAINA 2016 : 23-25 March 2016, Crans-Montana, Switzerland : proceedings
2016
/
p. 843-848 : ill
https://doi.org/10.1109/WAINA.2016.22
artikkel kogumikus
14
artikkel ajakirjas
Ideological networks and security in the two-speed world - Venia Legendi [Electronic resource]
Erne, Jaanika
SSRN working paper series
2013
/
[26] p
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2285465
artikkel ajakirjas
15
artikkel kogumikus
Improving the technical functionality of children's tracking watches
Jennings, Luke
;
Singh, Inderbir
;
Sorell, Matthew
;
Hovhannisyan, Kristine
Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018
2018
/
p. 57-59
https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
artikkel kogumikus
16
artikkel kogumikus
Latch-Based logic locking
Sweeney, J.
;
Mohammed Zackriya, V.
;
Pagliarini, Samuel Nascimento
;
Pileggi, Larry
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020
2020
/
p. 132−141 : ill
http://doi.org/10.1109/HOST45689.2020.9300256
artikkel kogumikus
17
artikkel kogumikus
Latest trends in hardware security and privacy
Di Natale, Giorgio
;
Regazzoni, Francesco
;
Albanese, Vincent
;
Lhermet, Frank
;
Loisel, Yann
;
Sensaoui, Abderrahmane
;
Pagliarini, Samuel Nascimento
33rd IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) : ESA-ESRIN, Italy (On-line Virtual Event), October 19–21, 2020
2020
/
4 p. : ill
http://doi.org/10.1109/DFT50435.2020.9250816
artikkel kogumikus
18
artikkel ajakirjas
A lightweight anonymous authentication scheme for secure cloud computing services
Hammami, Hamza
;
Ben Yahia, Sadok
;
Obaidat, Mohammad S.
The Journal of Supercomputing
2021
/
p. 1693-1713
https://doi.org/10.1007/s11227-020-03313-y
artikkel ajakirjas
19
artikkel ajakirjas
Limited statehood and its security implications on the fragmentation political order in the Middle East and North Africa
Polese, Abel
;
Hanau Santini, Ruth
Small wars & insurgencies
2018
/
p. 379-390
https://www.tandfonline.com/doi/full/10.1080/09592318.2018.1456815#
artikkel ajakirjas
20
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Machine learning meets communication networks: current trends and future challenges
Ahmad, Ijaz
;
Shahabuddin, Shariar
;
Malik, Hassan
;
Leppänen, Teemu
;
Loven, Lauri
;
Anttonen, Antti
;
Sodhro, Ali Hassan
;
Alam, Muhammad Mahtab
;
Juntti, Markku
;
Yla-Jääski, Antti
IEEE Access
2020
/
art. 9274307, p. 223418-223460
https://doi.org/10.1109/ACCESS.2020.3041765
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
21
artikkel ajakirjas
Maksukuulekus ja selle tähendus sisejulgeoleku teoreetilises käsitluses
Randlane, Kerly
Sisekaitseakadeemia toimetised
2011
/
lk. 284-301
artikkel ajakirjas
22
artikkel kogumikus
Mapping requirements specifications into a formalized blockchain-enabled authentication protocol for secured personal identity assurance
Leiding, Benjamin
;
Norta, Alexander
Future Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017 : proceedings
2017
/
p. 181-196 : ill
https://doi.org/10.1007/978-3-319-70004-5_13
artikkel kogumikus
23
artikkel ajakirjas
Maritime cyber-insurance : The Norwegian case : [abstract]
Franke, Ulrik
;
Langfeldt Friberg, Even
;
Bahsi, Hayretdin
International Journal of Critical Infrastructures
2022
/
1 p
https://doi.org/10.1504/IJCIS.2022.10046729
https://doi.org/10.1504/IJCIS.2022.10046164
artikkel ajakirjas
24
artikkel ajakirjas
Maritime cyber-insurance : the Norwegian case
Franke, Ulrik
;
Langfeldt Friberg, Even
;
Bahşi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267-286
https://doi.org/10.1504/IJCIS.2022.125816
artikkel ajakirjas
25
artikkel ajakirjas
Maritime cyber-insurance: the Norwegian case
Franke, Ulrik
;
Friberg, Even Langfeldt
;
Bahşi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267-286
http://doi.org/10.1504/ijcis.2022.125816
artikkel ajakirjas
Kirjeid leitud 41, kuvan
1 - 25
eelmine
1
2
järgmine
võtmesõna
82
1.
ad-hoc sensor networks security
2.
Blockchain security
3.
cache security
4.
communication system security
5.
comprehensive system of economic security
6.
computer security
7.
cooperative security dilemma
8.
cyber security
9.
cyber security education
10.
cyber security exercises
11.
cyber security strategies
12.
cyber-security
13.
data security
14.
drinking water security
15.
economic security
16.
economic security of enterprise
17.
energy security
18.
energy security indicator
19.
graded security
20.
hardware security
21.
hardware security primitive
22.
human security
23.
information security
24.
internal security
25.
international security
26.
investment and innovation security
27.
IPv6 security
28.
IT security
29.
job security
30.
long-term security
31.
metadata model for security measures
32.
Middle Eastern security
33.
Mobile security
34.
national cyber security strategy
35.
national security
36.
NATO. Science for Peace and Security Program
37.
network security
38.
network security monitoring
39.
OSCE (Organization for Security and Co-operation in Europe)
40.
passenger’s security
41.
policy-based routing security
42.
post-quantum security
43.
power system security
44.
quantitative security
45.
regional security
46.
security
47.
security and privacy
48.
security and privacy in smart grids
49.
security closure
50.
Security Coverage
51.
security dataset
52.
security dilemma
53.
Security evaluation
54.
security log analysis
55.
security management
56.
security model
57.
security monitoring
58.
security notion
59.
security objectives
60.
security of data
61.
security of supply
62.
security operation center
63.
security patterns
64.
security problem definition
65.
security proof
66.
security protocols
67.
security requirements
68.
security requirements engineering
69.
security risk assessment
70.
security risk management
71.
security strategies
72.
security testing
73.
security training
74.
security verification
75.
societal security
76.
system of economic security
77.
system security
78.
terrorism security
79.
transmission System Security
80.
voting privacy and security
81.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
82.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT