Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
initial level of security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/277)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Method for determining the security level of software
Hovorushchenko, Tetiana
;
Voichur, Yurii
;
Medzatyi, Dmytro
;
Boyarchuk, Artem
;
Hnatchuk, Alina
IntelITSIS 2024 : 5th International Workshop on Intelligent Information Technologies and Systems of Information Security, March 28, 2024 : proceedings
2024
/
p. 72-85 : ill
https://ceur-ws.org/Vol-3675/
Article at Scopus
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
275
1.
initial level of security
2.
high level of security
3.
medium level of security
4.
software security level
5.
sufficient level of security
6.
logic level and high level BDDs
7.
initial commitment
8.
initial conditions
9.
initial data
10.
initial data for AI
11.
initial data model
12.
initial moisture content
13.
initial planning or design stage
14.
initial settings
15.
initial solution to the linear programming problem
16.
Initial state
17.
method of initial parameters
18.
method of initial parameters in differential form
19.
ad-hoc sensor networks security
20.
Automatic Security Verification
21.
Blockchain security
22.
cache security
23.
communication system security
24.
comprehensive system of economic security
25.
computer security
26.
cooperative security dilemma
27.
cyber security
28.
cyber security education
29.
cyber security exercises
30.
cyber security monitoring
31.
cyber security strategies
32.
cyber-security
33.
data and information security
34.
data security
35.
development of security cameras
36.
digital security practices
37.
drinking water security
38.
economic security
39.
economic security of enterprise
40.
emotional security
41.
energy security
42.
energy security indicator
43.
Estonian information security standard
44.
graded security
45.
hardware security
46.
hardware security primitive
47.
Homeland security
48.
human security
49.
information security
50.
information security and privacy
51.
internal security
52.
international security
53.
investment and innovation security
54.
IPv6 security
55.
IT security
56.
IT security management
57.
job security
58.
long-term security
59.
maritime cyber security
60.
maritime cyber security operations centers
61.
Maritime Security Operations Center (M-SOC)
62.
metadata model for security measures
63.
Middle Eastern security
64.
Mobile security
65.
national cyber security strategy
66.
national security
67.
NATO. Science for Peace and Security Program
68.
network security
69.
network security monitoring
70.
OSCE (Organization for Security and Co-operation in Europe)
71.
passenger’s security
72.
policy-based routing security
73.
political and security cultures
74.
post-quantum security
75.
power system security
76.
quantitative security
77.
regional security
78.
RISC-V Security Verification
79.
Safety and Security in Sea Transportation
80.
safety and security testing
81.
security
82.
security adaptation
83.
security alert prioritization
84.
security analysis
85.
security and justice (AFSJ)
86.
Security and political science
87.
security and privacy
88.
security and privacy in smart grids
89.
Security Assertion Mining
90.
security closure
91.
Security Coverage
92.
security dataset
93.
security dilemma
94.
Security evaluation
95.
security evaluation instruments
96.
Security limitations
97.
security log analysis
98.
security management
99.
security model
100.
security monitoring
101.
security notion
102.
security objectives
103.
security of data
104.
security of supply
105.
security operation center
106.
security operations center
107.
security patterns
108.
security policy
109.
security problem definition
110.
security proof
111.
security protocols
112.
security requirements
113.
security requirements engineering
114.
security research
115.
security risk assessment
116.
security risk management
117.
security risks
118.
security science and technology
119.
security strategies
120.
security systems for military objects
121.
security testing
122.
security training
123.
security verification
124.
security-by-design
125.
social security planning
126.
societal security
127.
software security
128.
software security subcharacteristics
129.
system of economic security
130.
system security
131.
terrorism security
132.
transmission System Security
133.
voting privacy and security
134.
absolute sea level
135.
airport level of service
136.
arousal level
137.
assurance level
138.
behaviour level test generation
139.
bi-level optimization
140.
CO2 level in classrooms
141.
CO2 level in classrooms and kindergartens
142.
confidence level
143.
country-level logistics
144.
Cross-level Modeling of Faults in Digital Systems
145.
customer compatibility level
146.
deep level
147.
deep level traps
148.
determination of the CO2 level
149.
determining the level of creatine
150.
digitalisation level
151.
distribution-level phasor measurement units (D-PMUs)
152.
education level
153.
exposure level
154.
extreme penetration level of non synchronous generation
155.
extreme sea-level prediction
156.
extreme water level
157.
gate-level analysis
158.
gate-level circuit abstraction
159.
gate-level netlist
160.
graduate level
161.
Hierarchical Multi-level Test Generation
162.
hierarchical two-level analysis
163.
high level DD (HLDD)
164.
high level synthesis
165.
high-level control fault model
166.
high-level control faults
167.
high-level decision diagram
168.
high-level decision diagrams
169.
high-level decision diagrams (HLDD) synthesis
170.
High-level Decision Diagrams for Modeling Digital Systems
171.
high-level expert group on AI
172.
high-level fault coverage
173.
high-level fault model
174.
high-level fault simulation
175.
high-level functional fault model
176.
high-level synthesis
177.
High-Level Synthesis (HLS)
178.
high-level synthesis for test
179.
high-level test data generation
180.
improvement of safety level at enterprises
181.
improvement of safety level at SMEs
182.
lake level
183.
level control
184.
level crossing
185.
level ice
186.
Level of paranoia
187.
level set
188.
level(s) methodology
189.
level-crossing ADC
190.
level-crossing analog-to-digital converters
191.
level-crossing analogue-to-digital converters (ADC)
192.
logic level
193.
lower trophic level models
194.
low-level control system transportation
195.
low-level fault redundancy
196.
low-level radiation
197.
Low-level RF EMF
198.
macro-level industry influences
199.
mean sea level
200.
module level power electronics (MLPE)
201.
module-level power electronics (MLPE)
202.
multi-level governance
203.
multi-level inverter
204.
multi-level leadership
205.
multi-level modeling
206.
multi-level perspective
207.
multi-level perspective of sustainability transitions
208.
multi-level selection and processing environment
209.
noise level
210.
operational level (OL)
211.
Price level
212.
Process/Product Sigma Performance Level (PSPL)
213.
PV module level power electronics
214.
register transfer and gate level simulation
215.
Register Transfer Level - RTL
216.
register transfer level modeling decision diagams
217.
register-transfer level
218.
relative sea level
219.
relative sea level changes
220.
relative sea-level change
221.
RH level
222.
school-level policies
223.
sea level
224.
sea level forecasting
225.
sea level prediction
226.
sea level rise
227.
sea level series
228.
sea level trend
229.
sea level: variations and mean
230.
sea-level
231.
sea-level changes
232.
sea-level equation
233.
Sea-level indicator
234.
sea-level prediction
235.
sea-level rise
236.
sea-level trend
237.
service-level agreements
238.
seven-level multilevel
239.
Sigma performance level
240.
skin conductance level
241.
software level TMR
242.
steel-level bureaucracy
243.
strategic level decision makers
244.
system level
245.
system level hazards
246.
system level simulation
247.
system level test
248.
system planning level
249.
system-level analysis
250.
system-level evaluation
251.
task-level uninterrupted presence
252.
three-level
253.
three-level converter
254.
three-level inverter
255.
three-level neutral-point-clamped inverter
256.
three-level NPC inverter
257.
three-level T-type
258.
three-level T-type inverter
259.
three-level T-type quasi-impedance-source inverter (3L-T-type qZSI)
260.
three-level voltage inverter
261.
Tool Confidence Level
262.
top-level domain
263.
transaction-level modeling
264.
treatment level
265.
two-level inverter
266.
undergraduate level
267.
university level informatics education
268.
water level
269.
water level fluctuation
270.
water level measurements
271.
water level reconstruction
272.
water-level changes
273.
voltage level
274.
voltage level optimisation
275.
3-level T-type inverter
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT