Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
software security level (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(3/359)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Method for determining the security level of software
Hovorushchenko, Tetiana
;
Voichur, Yurii
;
Medzatyi, Dmytro
;
Boyarchuk, Artem
;
Hnatchuk, Alina
IntelITSIS 2024 : 5th International Workshop on Intelligent Information Technologies and Systems of Information Security, March 28, 2024 : proceedings
2024
/
p. 72-85 : ill
https://ceur-ws.org/Vol-3675/
Article at Scopus
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
356
1.
software security level
2.
software security
3.
software security subcharacteristics
4.
high level of security
5.
initial level of security
6.
medium level of security
7.
Security Level Evaluation
8.
sufficient level of security
9.
software level TMR
10.
logic level and high level BDDs
11.
ad-hoc sensor networks security
12.
Automatic Security Verification
13.
Blockchain security
14.
cache security
15.
cloud security
16.
communication system security
17.
comprehensive system of economic security
18.
computer security
19.
cooperative security dilemma
20.
cyber security
21.
cyber security education
22.
cyber security exercises
23.
cyber security monitoring
24.
cyber security strategies
25.
cyber-security
26.
data and information security
27.
data security
28.
development of security cameras
29.
digital security practices
30.
drinking water security
31.
economic security
32.
economic security of enterprise
33.
emotional security
34.
energy security
35.
energy security indicator
36.
Estonian information security standard
37.
graded security
38.
hardware security
39.
hardware security primitive
40.
Homeland security
41.
human security
42.
information security
43.
information security and privacy
44.
internal security
45.
international security
46.
investment and innovation security
47.
IPv6 security
48.
IT security
49.
IT security management
50.
job security
51.
long-term security
52.
maritime cyber security
53.
maritime cyber security operations centers
54.
Maritime Security Operations Center (M-SOC)
55.
metadata model for security measures
56.
Middle Eastern security
57.
Mobile security
58.
national cyber security strategy
59.
national security
60.
NATO. Science for Peace and Security Program
61.
network security
62.
network security monitoring
63.
OSCE (Organization for Security and Co-operation in Europe)
64.
passenger’s security
65.
policy-based routing security
66.
political and security cultures
67.
post-quantum security
68.
power system security
69.
quantitative security
70.
regional security
71.
RISC-V Security Verification
72.
Safety and Security in Sea Transportation
73.
safety and security testing
74.
security
75.
security adaptation
76.
security alert prioritization
77.
security analysis
78.
security and justice (AFSJ)
79.
Security and political science
80.
security and privacy
81.
security and privacy in smart grids
82.
Security Assertion
83.
Security Assertion Mining
84.
security closure
85.
Security Coverage
86.
security dataset
87.
security dilemma
88.
Security evaluation
89.
security evaluation instruments
90.
Security limitations
91.
security log analysis
92.
security management
93.
security model
94.
security monitoring
95.
security notion
96.
security objectives
97.
security of data
98.
security of supply
99.
security operation center
100.
security operations center
101.
security patterns
102.
security policy
103.
security problem definition
104.
security proof
105.
security protocols
106.
security requirements
107.
security requirements engineering
108.
security research
109.
security risk assessment
110.
security risk management
111.
security risks
112.
security science and technology
113.
security strategies
114.
security systems for military objects
115.
security testing
116.
security training
117.
security verification
118.
security-by-design
119.
social security planning
120.
societal security
121.
system of economic security
122.
system security
123.
terrorism security
124.
transmission System Security
125.
voting privacy and security
126.
advanced programming and software
127.
agent software architecture
128.
agent-oriented software engineering
129.
Agile software engineering
130.
AI based CAD software
131.
analysis software
132.
Anonymization software
133.
ARIS software
134.
Automated Synthesis of Software-based Self-test
135.
bernese software
136.
business software
137.
CFD (computational fluid dynamics) software
138.
client-vendor relationship in software development
139.
communicating hardware/software systems
140.
communicating software/hardware systems
141.
computer aided software engineering
142.
computer software
143.
Computer software and hardware
144.
COMSOL software
145.
educational software
146.
embedded software
147.
energy simulation software
148.
free software
149.
GIS software
150.
hardware/software co-design
151.
interoperability and evolution of healthcare models and software systems
152.
invasive software
153.
large software projects
154.
learning software agents
155.
model-based software development
156.
model-driven software engineering
157.
ontology driven software development
158.
ontology-based software engineering
159.
open source software
160.
optimization software
161.
plagiarism software
162.
public domain software
163.
RETScreen software
164.
self learning software
165.
sensor software
166.
simulation software "Delphin"
167.
simulations with software
168.
social software
169.
software
170.
software architecture
171.
software architecture improvement
172.
software based self-test
173.
software companies
174.
software complexity
175.
software containers
176.
software defined networking
177.
software defined networking (SDN)
178.
software defined networks (SDN)
179.
software defined radio
180.
software defined radio (SDR)
181.
software design
182.
software development
183.
software development concepts
184.
software documentation
185.
software engineering
186.
software engineering education
187.
Software engineering methodology evaluation
188.
software engineering practises
189.
software factory
190.
software for measurements
191.
software implementation
192.
software modeling
193.
software outsourcing
194.
Software packages
195.
software project management
196.
software qualification
197.
software quality
198.
software quality attributes
199.
software quality characteristics
200.
software refactoring
201.
software sector
202.
software testing
203.
software/hardware partitioning
204.
software/hardware systems
205.
software-based self-test
206.
software-based self-test (SBST)
207.
software-defined network
208.
software-defined networking
209.
software-defined networking (SDN)
210.
software-in-the-loop (SIL) testing
211.
SOLIDWORKS software
212.
SysML modeling software
213.
system-to-software integrity
214.
triptych software engineering
215.
absolute sea level
216.
airport level of service
217.
arousal level
218.
assurance level
219.
behaviour level test generation
220.
bi-level optimization
221.
CO2 level in classrooms
222.
CO2 level in classrooms and kindergartens
223.
confidence level
224.
country-level logistics
225.
Cross-level Modeling of Faults in Digital Systems
226.
customer compatibility level
227.
deep level
228.
deep level traps
229.
determination of the CO2 level
230.
determining the level of creatine
231.
digitalisation level
232.
distribution-level phasor measurement units (D-PMUs)
233.
education level
234.
exposure level
235.
extreme penetration level of non synchronous generation
236.
extreme sea-level prediction
237.
extreme water level
238.
gate-level analysis
239.
gate-level circuit abstraction
240.
gate-level netlist
241.
graduate level
242.
Hierarchical Multi-level Test Generation
243.
hierarchical two-level analysis
244.
high level DD (HLDD)
245.
high level synthesis
246.
high-level control fault model
247.
high-level control faults
248.
high-level decision diagram
249.
high-level decision diagrams
250.
high-level decision diagrams (HLDD) synthesis
251.
High-level Decision Diagrams for Modeling Digital Systems
252.
high-level expert group on AI
253.
high-level fault coverage
254.
high-level fault model
255.
high-level fault simulation
256.
high-level functional fault model
257.
high-level synthesis
258.
High-Level Synthesis (HLS)
259.
high-level synthesis for test
260.
high-level test data generation
261.
improvement of safety level at enterprises
262.
improvement of safety level at SMEs
263.
lake level
264.
level control
265.
level crossing
266.
level ice
267.
Level of paranoia
268.
level set
269.
level(s) methodology
270.
level-crossing ADC
271.
level-crossing analog-to-digital converters
272.
level-crossing analogue-to-digital converters (ADC)
273.
logic level
274.
lower trophic level models
275.
low-level control system transportation
276.
low-level fault redundancy
277.
low-level radiation
278.
Low-level RF EMF
279.
macro-level industry influences
280.
mean sea level
281.
module level power electronics (MLPE)
282.
module-level power electronics (MLPE)
283.
multi-level governance
284.
multi-level inverter
285.
multi-level leadership
286.
multi-level modeling
287.
multi-level perspective
288.
multi-level perspective of sustainability transitions
289.
multi-level selection and processing environment
290.
noise level
291.
operational level (OL)
292.
Price level
293.
Process/Product Sigma Performance Level (PSPL)
294.
PV module level power electronics
295.
register transfer and gate level simulation
296.
Register Transfer Level - RTL
297.
register transfer level modeling decision diagams
298.
register-transfer level
299.
Register-Transfer Level (RTL)
300.
relative sea level
301.
relative sea level changes
302.
relative sea-level change
303.
RH level
304.
school-level policies
305.
sea level
306.
sea level forecasting
307.
sea level prediction
308.
sea level rise
309.
sea level series
310.
sea level trend
311.
sea level: variations and mean
312.
sea-level
313.
sea-level changes
314.
sea-level equation
315.
Sea-level indicator
316.
sea-level prediction
317.
sea-level rise
318.
sea-level trend
319.
service-level agreements
320.
seven-level multilevel
321.
Sigma performance level
322.
skin conductance level
323.
steel-level bureaucracy
324.
strategic level decision makers
325.
system level
326.
system level hazards
327.
system level simulation
328.
system level test
329.
system planning level
330.
system-level analysis
331.
system-level evaluation
332.
task-level uninterrupted presence
333.
three-level
334.
three-level converter
335.
three-level inverter
336.
three-level neutral-point-clamped inverter
337.
three-level NPC inverter
338.
three-level T-type
339.
three-level T-type inverter
340.
three-level T-type quasi-impedance-source inverter (3L-T-type qZSI)
341.
three-level voltage inverter
342.
Tool Confidence Level
343.
top-level domain
344.
transaction-level modeling
345.
treatment level
346.
two-level inverter
347.
undergraduate level
348.
university level informatics education
349.
water level
350.
water level fluctuation
351.
water level measurements
352.
water level reconstruction
353.
water-level changes
354.
voltage level
355.
voltage level optimisation
356.
3-level T-type inverter
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
autor
1
1.
Department of Software Science, Tallinn University of Technology
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT