Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security evaluation instruments (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/220)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Create your own MUSE : a method for updating security level evaluation instruments
Seeba, Mari
;
Affia, Abasi-amefon Obot
;
Mäses, Sten
;
Matulevičius, Raimundas
Computer Standards and Interface
2024
/
art. 103776
https://doi.org/10.1016/j.csi.2023.103776
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
217
1.
security evaluation instruments
2.
Security evaluation
3.
Security Level Evaluation
4.
coordination instruments
5.
debt instruments
6.
decision support instruments
7.
embedded instruments
8.
financial instruments
9.
innovative financial instruments
10.
instruments
11.
interchangeable virtual instruments
12.
musical instruments
13.
optics/refraction/instruments
14.
organizational learning measurement instruments
15.
policy instruments
16.
spread and development of new policy instruments (environmental taxes and charges system)
17.
string instruments
18.
types of measuring instruments
19.
ad-hoc sensor networks security
20.
Automatic Security Verification
21.
Blockchain security
22.
cache security
23.
cloud security
24.
communication system security
25.
comprehensive system of economic security
26.
computer security
27.
cooperative security dilemma
28.
cyber security
29.
cyber security education
30.
cyber security exercises
31.
cyber security monitoring
32.
cyber security strategies
33.
cyber-security
34.
data and information security
35.
data security
36.
development of security cameras
37.
digital security practices
38.
drinking water security
39.
economic security
40.
economic security of enterprise
41.
emotional security
42.
energy security
43.
energy security indicator
44.
Estonian information security standard
45.
graded security
46.
hardware security
47.
hardware security primitive
48.
high level of security
49.
Homeland security
50.
human security
51.
information security
52.
information security and privacy
53.
initial level of security
54.
internal security
55.
international security
56.
investment and innovation security
57.
IPv6 security
58.
IT security
59.
IT security management
60.
job security
61.
long-term security
62.
maritime cyber security
63.
maritime cyber security operations centers
64.
Maritime Security Operations Center (M-SOC)
65.
medium level of security
66.
metadata model for security measures
67.
Middle Eastern security
68.
Mobile security
69.
national cyber security strategy
70.
national security
71.
NATO. Science for Peace and Security Program
72.
network security
73.
network security monitoring
74.
OSCE (Organization for Security and Co-operation in Europe)
75.
passenger’s security
76.
policy-based routing security
77.
political and security cultures
78.
post-quantum security
79.
power system security
80.
quantitative security
81.
regional security
82.
RISC-V Security Verification
83.
Safety and Security in Sea Transportation
84.
safety and security testing
85.
security
86.
security adaptation
87.
security alert prioritization
88.
security analysis
89.
security and justice (AFSJ)
90.
Security and political science
91.
security and privacy
92.
security and privacy in smart grids
93.
Security Assertion
94.
Security Assertion Mining
95.
security closure
96.
Security Coverage
97.
security dataset
98.
security dilemma
99.
Security limitations
100.
security log analysis
101.
security management
102.
security model
103.
security monitoring
104.
security notion
105.
security objectives
106.
security of data
107.
security of supply
108.
security operation center
109.
security operations center
110.
security patterns
111.
security policy
112.
security problem definition
113.
security proof
114.
security protocols
115.
security requirements
116.
security requirements engineering
117.
security research
118.
security risk assessment
119.
security risk management
120.
security risks
121.
security science and technology
122.
security strategies
123.
security systems for military objects
124.
security testing
125.
security training
126.
security verification
127.
security-by-design
128.
social security planning
129.
societal security
130.
software security
131.
software security level
132.
software security subcharacteristics
133.
sufficient level of security
134.
system of economic security
135.
system security
136.
terrorism security
137.
transmission System Security
138.
voting privacy and security
139.
accuracy evaluation
140.
answer evaluation
141.
Automated Bonding Evaluation System
142.
automatic evaluation
143.
binding evaluation
144.
clinical evaluation
145.
cohesion policy evaluation
146.
comprehensive evaluation
147.
compression method evaluation
148.
critical evaluation
149.
decision-making trial and evaluation laboratory
150.
descriptive sensory evaluation
151.
design evaluation
152.
empirical evaluation
153.
Energy-based evaluation
154.
enhanced economy evaluation
155.
environmental evaluation
156.
environmental hazard evaluation
157.
ethical evaluation
158.
evaluation
159.
evaluation framework
160.
evaluation metrics
161.
evaluation of companies
162.
Evaluation of Explainability
163.
evaluation of explainable AI intrusion detection
164.
evaluation of the results of environmental innovations
165.
experimental evaluation
166.
feasibility evaluation
167.
financial evaluation
168.
function evaluation
169.
hazard evaluation
170.
Integrated hedonic-utilitarian evaluation
171.
investment effectiveness evaluation
172.
investment evaluation
173.
investments profitability evaluation
174.
life cycle evaluation
175.
meta-evaluation
176.
microstructure evaluation
177.
model evaluation
178.
multi-criteria evaluation
179.
non destructive evaluation
180.
non-destructive evaluation
181.
numerical evaluation of the order of convergence
182.
Organizational performance evaluation
183.
parameter evaluation
184.
performance evaluation
185.
performance evaluation and comparison
186.
petroleum reservoir evaluation
187.
Platform Evaluation
188.
point of evaluation
189.
policy evaluation
190.
process evaluation
191.
production performance evaluation system
192.
qualitative evaluation
193.
quality evaluation of scientific information
194.
reliability evaluation
195.
RIS3 evaluation and monitoring
196.
risk evaluation model
197.
risk evaluation model development
198.
self-evaluation
199.
sensory evaluation
200.
shelter design evaluation
201.
Software engineering methodology evaluation
202.
source rock evaluation
203.
student evaluation
204.
students' evaluation and feedback
205.
system evaluation
206.
system-level evaluation
207.
tender evaluation model
208.
test and evaluation platform
209.
total evaluation of complexity
210.
total evaluation of performance
211.
trajectory evaluation
212.
ultrasonic nondestructive evaluation
213.
urban environmental evaluation
214.
user evaluation
215.
web usability evaluation
216.
visualization design and evaluation methods
217.
“Evaluation-hesitance”
märksõna
3
1.
Laser Diagnostic Instruments
2.
National Computer Security Incident Response Teams (N-CSIRTs)
3.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT