Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
information security and privacy (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(3/268)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Guest editorial: Smart cities 2.0 : how artificial intelligence and internet of things are transforming urban living
Chai, Zheng-Yi
;
Shah, Syed Attique
;
Draheim, Dirk
;
Hameed, Sufian
;
Rathore, Muhammad Mazhar Ullah
IET Smart Cities
2024
/
p. 129-131
https://doi.org/10.1049/smc2.12091
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
265
1.
information security and privacy
2.
security and privacy
3.
security and privacy in smart grids
4.
voting privacy and security
5.
data and information security
6.
Estonian information security standard
7.
information security
8.
data privacy
9.
differential privacy
10.
human privacy
11.
posthumous privacy
12.
post-mortem privacy
13.
privacy
14.
privacy by design
15.
privacy coins
16.
privacy concerns
17.
privacy of participants
18.
privacy policy
19.
privacy-enhancing technologies
20.
Privacy-preserving
21.
user awareness of privacy threats
22.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
23.
ad-hoc sensor networks security
24.
Automatic Security Verification
25.
Blockchain security
26.
cache security
27.
communication system security
28.
comprehensive system of economic security
29.
computer security
30.
cooperative security dilemma
31.
cyber security
32.
cyber security education
33.
cyber security exercises
34.
cyber security monitoring
35.
cyber security strategies
36.
cyber-security
37.
data security
38.
development of security cameras
39.
digital security practices
40.
drinking water security
41.
economic security
42.
economic security of enterprise
43.
emotional security
44.
energy security
45.
energy security indicator
46.
graded security
47.
hardware security
48.
hardware security primitive
49.
high level of security
50.
Homeland security
51.
human security
52.
initial level of security
53.
internal security
54.
international security
55.
investment and innovation security
56.
IPv6 security
57.
IT security
58.
IT security management
59.
job security
60.
long-term security
61.
maritime cyber security
62.
maritime cyber security operations centers
63.
Maritime Security Operations Center (M-SOC)
64.
medium level of security
65.
metadata model for security measures
66.
Middle Eastern security
67.
Mobile security
68.
national cyber security strategy
69.
national security
70.
NATO. Science for Peace and Security Program
71.
network security
72.
network security monitoring
73.
OSCE (Organization for Security and Co-operation in Europe)
74.
passenger’s security
75.
policy-based routing security
76.
political and security cultures
77.
post-quantum security
78.
power system security
79.
quantitative security
80.
regional security
81.
RISC-V Security Verification
82.
Safety and Security in Sea Transportation
83.
safety and security testing
84.
security
85.
security adaptation
86.
security alert prioritization
87.
security analysis
88.
security and justice (AFSJ)
89.
Security and political science
90.
Security Assertion Mining
91.
security closure
92.
Security Coverage
93.
security dataset
94.
security dilemma
95.
Security evaluation
96.
security evaluation instruments
97.
Security limitations
98.
security log analysis
99.
security management
100.
security model
101.
security monitoring
102.
security notion
103.
security objectives
104.
security of data
105.
security of supply
106.
security operation center
107.
security operations center
108.
security patterns
109.
security policy
110.
security problem definition
111.
security proof
112.
security protocols
113.
security requirements
114.
security requirements engineering
115.
security research
116.
security risk assessment
117.
security risk management
118.
security risks
119.
security science and technology
120.
security strategies
121.
security systems for military objects
122.
security testing
123.
security training
124.
security verification
125.
security-by-design
126.
social security planning
127.
societal security
128.
software security
129.
software security level
130.
software security subcharacteristics
131.
sufficient level of security
132.
system of economic security
133.
system security
134.
terrorism security
135.
transmission System Security
136.
access to information
137.
age of information
138.
banking information
139.
building information modelling
140.
building information modeling
141.
Building Information Modeling (BIM)
142.
building information modelling
143.
Building Information Modelling (BIM)
144.
Building Information Modelling (BIM) adoption
145.
business information technology
146.
city information modelling (CIM)
147.
communication channels (information theory)
148.
Community Statistics on Information Society (CSIS)
149.
court information system
150.
critical information infrastructure
151.
Data-information-knowledgewisdom (DIKW)
152.
discrete information bottle-neck
153.
dissemination of information
154.
enterprise information systems
155.
Estonian National Health Information System
156.
estonian national health information system (ENHIS)
157.
Estonian nationwide Health Information System (EHIS)
158.
evolutionary information systems
159.
financial information
160.
general theory of information transfer
161.
Geographic Information System (GIS)
162.
geographical information system
163.
health information exchange
164.
health information purpose
165.
health information sharing maturity
166.
health information systems
167.
Healthcare information systems
168.
high-performance computing systems, Information processing
169.
HL7 Version 3: Reference Information Model (RIM)
170.
ICT (information and communication technology)
171.
information
172.
information analysis
173.
information and communication technologies
174.
Information and Communication Technologies (ICT)
175.
Information and communication technologies (ICT) digitalisation
176.
Information and Communication Technologies (ICT) laws
177.
Information and Communication Technologies (ICTs)
178.
Information and Communication Technologies for Development
179.
information and communication technology
180.
information and communication technology (ICT)
181.
information and communications technology
182.
information and consultation
183.
information architecture
184.
information asymmetry
185.
information commons
186.
information communication technology
187.
information content
188.
information control
189.
information dissemination
190.
information economy
191.
information entropy
192.
information exchange
193.
information extraction
194.
information filtering
195.
information flow control
196.
information fusion
197.
information governance
198.
information integration
199.
information literacy
200.
information literacy cooperation
201.
information logistics
202.
information management
203.
information measures
204.
information model
205.
information model-based urban planning
206.
information polity
207.
information potential
208.
information preprocessing
209.
information processing
210.
information processing system
211.
information rate
212.
information realities
213.
information retrieval
214.
information revolution
215.
information seeking behaviour
216.
information sharing
217.
information society
218.
Information sufficiency
219.
information system
220.
Information System Authority (RIA)
221.
information systems
222.
information systems development
223.
Information Systems research
224.
information technologies
225.
Information technology
226.
information technology (IT)
227.
information theory
228.
information to individual consumers
229.
information tool
230.
information use
231.
information value
232.
information war
233.
information warfare
234.
information visualization
235.
information volume
236.
Information-seeking activity
237.
intelligent information technology
238.
interoperability and evolutionary criteria of information systems
239.
laboratory information management system (LIMS)
240.
laboratory information management systems
241.
LIMS (laboratory information management systems)
242.
medical information
243.
Medical information policy
244.
middleware (for subscription and distribution of situational information)
245.
mobile information system
246.
multilingual information retrieval
247.
multimodal information
248.
open architecture for information exchange
249.
perception of visual information
250.
performance information
251.
performance information use
252.
philosophy of information
253.
process modeling and information systems within the extended enterprise
254.
provision of information to workers
255.
quality evaluation of scientific information
256.
real time information
257.
real-time information
258.
Reaxys Chemistry database information
259.
scientific information
260.
SIS II (Schengen Information System II)
261.
tactile information
262.
traffic information system (TIS)
263.
tree information database
264.
website information
265.
VIS (Visa Information System)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
TTÜ märksõna
1
1.
Building Information Modeling
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT