Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
55
Vaata veel..
(2/128)
Ekspordi
ekspordi kõik päringu tulemused
(55)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
51
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Split-chip design to prevent IP reverse engineering
Pagliarini, Samuel Nascimento
;
Sweeney, Joseph
;
Mai, Ken
;
Blanton, Shawn
;
Mitra, Subhasish
;
Pileggi, Larry
IEEE Design and Test
2020
/
p. 109-118
https://doi.org/10.1109/MDAT.2020.3033255
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
52
artikkel kogumikus
The invisible front : a cyber resilience perspective
Bahsi, Hayretdin
The geopolitics of power grids : political and security aspects of Baltic electricity synchronization : March 2018
2018
/
p. 53–68 : ill
https://www.ester.ee/record=b5053315*est
artikkel kogumikus
53
artikkel kogumikus EST
/
artikkel kogumikus ENG
TOOP trust architecture
Boldrin, Luca
;
Sellitto, Giovanni Paolo
;
Tepandi, Jaak
The once-only principle : The TOOP project
2021
/
p. 126–140
https://doi.org/10.1007/978-3-030-79851-2_7
Article collection metrics at Scopus
Article at Scopus
Article collection metrics at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
54
artikkel kogumikus
Using Incremental Inductive Logic Programming for Learning Spoofing Attacks on Maritime Automatic Identification System Data
Benterki, Aboubaker Seddiq
;
Visky, Gabor
;
Vain, Jüri
;
Tsiopoulos, Leonidas
Maritime Cybersecurity
2025
/
p. 123-141
https://doi.org/10.1007/978-3-031-87290-7_7
artikkel kogumikus
Seotud publikatsioonid
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
55
artikkel kogumikus
Wearable wireless sensor networks for emergency response in public safety networks
Alam, Muhammad Mahtab
;
Ben Arbia, Dhafer
;
Ben Hamida, Elyes
Wireless public safety networks 2 : a systematic approach
2016
/
p. 63-94 : ill
https://doi.org/10.1016/B978-1-78548-052-2.50003-7
artikkel kogumikus
Kirjeid leitud 55, kuvan
51 - 55
eelmine
1
2
3
järgmine
võtmesõna
126
1.
ad-hoc sensor networks security
2.
Automatic Security Verification
3.
Blockchain security
4.
cache security
5.
cloud security
6.
communication system security
7.
comprehensive system of economic security
8.
computer security
9.
cooperative security dilemma
10.
cyber security
11.
cyber security education
12.
cyber security exercises
13.
cyber security monitoring
14.
cyber security strategies
15.
cyber-physical system security
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
high level of security
32.
Homeland security
33.
human security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
maritime cyber security
46.
maritime cyber security operations centers
47.
Maritime Security Operations Center (M-SOC)
48.
medium level of security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion
77.
Security Assertion Mining
78.
security closure
79.
Security Coverage
80.
security dataset
81.
security dilemma
82.
Security evaluation
83.
security evaluation instruments
84.
Security Level Evaluation
85.
Security limitations
86.
security log analysis
87.
security management
88.
security model
89.
security monitoring
90.
security notion
91.
security objectives
92.
security of data
93.
security of supply
94.
security operation center
95.
security operations center
96.
security patterns
97.
security policy
98.
security problem definition
99.
security proof
100.
security protocols
101.
security requirements
102.
security requirements engineering
103.
security research
104.
security risk assessment
105.
security risk management
106.
security risks
107.
security science and technology
108.
security strategies
109.
security systems for military objects
110.
security testing
111.
security training
112.
security verification
113.
security-by-design
114.
social security planning
115.
societal security
116.
software security
117.
software security level
118.
software security subcharacteristics
119.
sufficient level of security
120.
system of economic security
121.
system security
122.
terrorism security
123.
transmission System Security
124.
voting privacy and security
125.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
126.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT