Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
55
Vaata veel..
(2/113)
Ekspordi
ekspordi kõik päringu tulemused
(55)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
26
artikkel kogumikus EST
/
artikkel kogumikus ENG
Information and information security
Henno, Jaak
Information modelling and knowledge bases XXVII
2016
/
p. 103-120
https://doi.org/10.3233/978-1-61499-611-8-103
Article collection metrics at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
27
artikkel kogumikus
Latch-Based logic locking
Sweeney, J.
;
Mohammed Zackriya, V.
;
Pagliarini, Samuel Nascimento
;
Pileggi, Larry
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020
2020
/
p. 132−141 : ill
https://doi.org/10.1109/HOST45689.2020.9300256
artikkel kogumikus
28
artikkel kogumikus
Latest trends in hardware security and privacy
Di Natale, Giorgio
;
Regazzoni, Francesco
;
Albanese, Vincent
;
Lhermet, Frank
;
Loisel, Yann
;
Sensaoui, Abderrahmane
;
Pagliarini, Samuel Nascimento
33rd IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) : ESA-ESRIN, Italy (On-line Virtual Event),October 19–21, 2020
2020
/
4 p. : ill
https://doi.org/10.1109/DFT50435.2020.9250816
artikkel kogumikus
29
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A lightweight anonymous authentication scheme for secure cloud computing services
Hammami, Hamza
;
Ben Yahia, Sadok
;
Obaidat, Mohammad S.
The Journal of Supercomputing
2021
/
p. 1693-1713
https://doi.org/10.1007/s11227-020-03313-y
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
30
artikkel ajakirjas
Limited statehood and its security implications on the fragmentation political order in the Middle East and North Africa
Polese, Abel
;
Hanau Santini, Ruth
Small wars & insurgencies
2018
/
p. 379-390
https://www.tandfonline.com/doi/full/10.1080/09592318.2018.1456815#
artikkel ajakirjas
31
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Machine learning meets communication networks : current trends and future challenges
Ahmad, Ijaz
;
Shahabuddin, Shariar
;
Malik, Hassan
;
Leppänen, Teemu
;
Loven, Lauri
;
Anttonen, Antti
;
Sodhro, Ali Hassan
;
Alam, Muhammad Mahtab
;
Juntti, Markku
;
Yla-Jääski, Antti
IEEE Access
2020
/
art. 9274307, p. 223418-223460
https://doi.org/10.1109/ACCESS.2020.3041765
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
32
artikkel ajakirjas
Maksukuulekus ja selle tähendus sisejulgeoleku teoreetilises käsitluses
Randlane, Kerly
Sisekaitseakadeemia toimetised
2011
/
lk. 284-301
artikkel ajakirjas
33
artikkel kogumikus EST
/
artikkel kogumikus ENG
Mapping requirements specifications into a formalized blockchain-enabled authentication protocol for secured personal identity assurance
Leiding, Benjamin
;
Norta, Alexander
Future Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017 : proceedings
2017
/
p. 181-196 : ill
https://doi.org/10.1007/978-3-319-70004-5_13
Conference proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
34
artikkel ajakirjas
Maritime cyber-insurance : The Norwegian case : [abstract]
Franke, Ulrik
;
Langfeldt Friberg, Even
;
Bahsi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267–286
https://doi.org/10.1504/IJCIS.2022.10046729
artikkel ajakirjas
35
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Maritime cyber-insurance: the Norwegian case
Franke, Ulrik
;
Friberg, Even Langfeldt
;
Bahşi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267-286
https://doi.org/10.1504/ijcis.2022.125816
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
36
artikkel ajakirjas
A modern empire and its public diplomacy : on Russia’s communication with Estonia
Vernygora, Vlad Alex
;
Belonosova, Elizaveta
The New Zealand Slavonic Journal
2019
/
p. 59-94
https://resolver.scholarsportal.info/resolve/00288683/v53-54inone/59_ameaipd.xml
artikkel ajakirjas
37
artikkel kogumikus
Multi-modal biometric system security and privacy
Essen, Akim
;
Sorell, Matthew
;
Maennel, Olaf Manuel
Proceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology
2019
/
p. 30-32
https://www.ester.ee/record=b5238490*est
artikkel kogumikus
38
artikkel ajakirjas
Nord Stream project : ecopolitical, economical and security field considerations
Värk, Juhan
;
Nutt, Mart
;
Martin, Jüri
Social and natural sciences journal
2011
/
p. 18-27
https://ojs.journals.cz/index.php/SNSJ/article/view/270
artikkel ajakirjas
39
artikkel kogumikus
A novel anonymous authentication and key agreement scheme for smart grid
Hammami, Hamza
;
Obaidat, Mohammad S.
;
Ben Yahia, Sadok
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 2020
2020
/
p. 357-362
https://doi.org/10.5220/0009824203570362
artikkel kogumikus
40
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A novel efficient and lightweight authentication scheme for secure smart grid communication systems
Hammami, Hamza
;
Ben Yahia, Sadok
;
Obaidat, Mohammad S.
The Journal of Supercomputing
2023
/
p. 7360 - 7376
https://doi.org/10.1007/s11227-022-04944-z
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
41
artikkel kogumikus
Origin and definition of the category of economic security of enterprise [Online resource]
Ianioglo, Alina
;
Põlajeva, Tatjana
9th International Scientific Conference "Business and Management 2016" : May 12-13, 2016, Vilnius, Lithuania
2016
/
p. 1-8 : ill
http://dx.doi.org/10.3846/bm.2016.46
artikkel kogumikus
42
artikkel ajakirjas
A peer-to-peer data sharing framework for Web browsers : analysis and evaluation
Pattanaik, Vishwajeet
;
Sharvadze, Ioane
;
Draheim, Dirk
SN Computer Science
2020
/
art. 214, 10 p
https://doi.org/10.1007/s42979-020-00236-6
artikkel ajakirjas
Seotud publikatsioonid
1
Robust Web annotations in support of knowledge co-creation = Töökindlad veebiannotatsioonid teadmiste ühisloome toetamiseks
43
raamat
Producing cultural change in political communities : the impact of populism and extremism on the international security environment
2023
https://doi.org/10.1007/978-3-031-43440-2
raamat
44
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
REACT: Autonomous intrusion response system for intelligent vehicles
Hamad, Mohammad
;
Finkenzeller, Andreas
;
Kühr, Michael
;
Roberts, Andrew James
;
Maennel, Olaf Manuel
;
Steinhorst, Sebastian
;
Prevelakis, Vassilis
Computers and security
2024
/
art. 104008, 17 p. : ill
https://doi.org/10.1016/j.cose.2024.104008
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
Cybersecurity testing and attack propagation analysis of autonomous driving software = Autonoomse sõiduki juhtimistarkvara küberturvalisuse testimine ja rünnakute leviku analüüs
45
artikkel kogumikus
RESCUE EDA Toolset for interdependent aspects of reliability, security and quality in nanoelectronic systems design
Gürsoy, Cemil Cem
;
Cardoso Medeiros, Guilherme
;
Chen, Juanho
;
Balakrishnan, Aneesh
;
Lai, Xinhui
;
Bagbaba, Ahmet Cagri
;
Raik, Jaan
;
Jenihhin, Maksim
DATE 2019
2019
/
1 p. : ill
https://doi.org/10.5281/zenodo.3362529
https://past.date-conference.com/
artikkel kogumikus
46
artikkel kogumikus
RESCUE: interdependent challenges of reliability, security and quality in nanoelectronic systems
Jenihhin, Maksim
;
Raik, Jaan
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE) : proceedings
2020
/
art. 19690741 , 6 p
https://doi.org/10.23919/DATE48585.2020.9116558
artikkel kogumikus
47
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns
Norta, Alexander
;
Matulevičius, Raimundas
;
Leiding, Benjamin
Computers & Security
2019
/
p. 253−269
https://doi.org/10.1016/j.cose.2019.05.017
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
48
artikkel kogumikus
A Scope Review of Secure Broadcasting Protocols for the Automatic Identification System
Tsiopoulos, Leonidas
;
Vaarandi, Risto
Maritime Cybersecurity
2025
/
p. 103-121
https://doi.org/10.1007/978-3-031-87290-7_6
artikkel kogumikus
49
artikkel kogumikus EST
/
artikkel kogumikus ENG
Securing self-aware cyber-physical systems using digital twins
Meeran, Mohammad Tariq
2024 19th Biennial Baltic Electronics Conference (BEC)
2024
/
5 p. : ill
https://doi.org/10.1109/BEC61458.2024.10737954
Conference proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
50
artikkel kogumikus EST
/
artikkel kogumikus ENG
Security risk management in the aviation turnaround sector
Matulevičius, Raimundas
;
Norta, Alexander
;
Udokwu, Chibuzor
;
Nõukas, Rein
Future Data and Security Engineering : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016 : proceedings
2016
/
p. 119-140 : ill
https://doi.org/10.1007/978-3-319-48057-2_8
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 55, kuvan
26 - 50
eelmine
1
2
3
järgmine
võtmesõna
111
1.
ad-hoc sensor networks security
2.
Automatic Security Verification
3.
Blockchain security
4.
cache security
5.
communication system security
6.
comprehensive system of economic security
7.
computer security
8.
cooperative security dilemma
9.
cyber security
10.
cyber security education
11.
cyber security exercises
12.
cyber security monitoring
13.
cyber security strategies
14.
cyber-security
15.
data and information security
16.
data security
17.
development of security cameras
18.
digital security practices
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
Homeland security
30.
human security
31.
information security
32.
information security and privacy
33.
internal security
34.
international security
35.
investment and innovation security
36.
IPv6 security
37.
IT security
38.
IT security management
39.
job security
40.
long-term security
41.
metadata model for security measures
42.
Middle Eastern security
43.
Mobile security
44.
national cyber security strategy
45.
national security
46.
NATO. Science for Peace and Security Program
47.
network security
48.
network security monitoring
49.
OSCE (Organization for Security and Co-operation in Europe)
50.
passenger’s security
51.
policy-based routing security
52.
political and security cultures
53.
post-quantum security
54.
power system security
55.
quantitative security
56.
regional security
57.
RISC-V Security Verification
58.
Safety and Security in Sea Transportation
59.
safety and security testing
60.
security
61.
security adaptation
62.
security alert prioritization
63.
security analysis
64.
security and justice (AFSJ)
65.
Security and political science
66.
security and privacy
67.
security and privacy in smart grids
68.
Security Assertion Mining
69.
security closure
70.
Security Coverage
71.
security dataset
72.
security dilemma
73.
Security evaluation
74.
security evaluation instruments
75.
Security limitations
76.
security log analysis
77.
security management
78.
security model
79.
security monitoring
80.
security notion
81.
security objectives
82.
security of data
83.
security of supply
84.
security operation center
85.
security operations center
86.
security patterns
87.
security policy
88.
security problem definition
89.
security proof
90.
security protocols
91.
security requirements
92.
security requirements engineering
93.
security risk assessment
94.
security risk management
95.
security risks
96.
security science and technology
97.
security strategies
98.
security systems for military objects
99.
security testing
100.
security training
101.
security verification
102.
security-by-design
103.
social security planning
104.
societal security
105.
system of economic security
106.
system security
107.
terrorism security
108.
transmission System Security
109.
voting privacy and security
110.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
111.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT