Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Security Level Evaluation (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/347)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Toward NIS2 compliance for multiple stakeholders with security level evaluation framework
Seeba, Mari
;
Oja, Tarmo
;
Mäses, Sten
;
Murumaa, Maria Pibilota
;
Matulevičius, Raimundas
Complex Systems Informatics and Modeling Quarterly
2025
/
p. 136-159
https://doi.org/10.7250/csimq.2025-45.07
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
345
1.
Security Level Evaluation
2.
Security evaluation
3.
security evaluation instruments
4.
high level of security
5.
initial level of security
6.
medium level of security
7.
software security level
8.
sufficient level of security
9.
system-level evaluation
10.
logic level and high level BDDs
11.
ad-hoc sensor networks security
12.
Automatic Security Verification
13.
Blockchain security
14.
cache security
15.
cloud security
16.
communication system security
17.
comprehensive system of economic security
18.
computer security
19.
cooperative security dilemma
20.
cyber security
21.
cyber security education
22.
cyber security exercises
23.
cyber security monitoring
24.
cyber security strategies
25.
cyber-security
26.
data and information security
27.
data security
28.
development of security cameras
29.
digital security practices
30.
drinking water security
31.
economic security
32.
economic security of enterprise
33.
emotional security
34.
energy security
35.
energy security indicator
36.
Estonian information security standard
37.
graded security
38.
hardware security
39.
hardware security primitive
40.
Homeland security
41.
human security
42.
information security
43.
information security and privacy
44.
internal security
45.
international security
46.
investment and innovation security
47.
IPv6 security
48.
IT security
49.
IT security management
50.
job security
51.
long-term security
52.
maritime cyber security
53.
maritime cyber security operations centers
54.
Maritime Security Operations Center (M-SOC)
55.
metadata model for security measures
56.
Middle Eastern security
57.
Mobile security
58.
national cyber security strategy
59.
national security
60.
NATO. Science for Peace and Security Program
61.
network security
62.
network security monitoring
63.
OSCE (Organization for Security and Co-operation in Europe)
64.
passenger’s security
65.
policy-based routing security
66.
political and security cultures
67.
post-quantum security
68.
power system security
69.
quantitative security
70.
regional security
71.
RISC-V Security Verification
72.
Safety and Security in Sea Transportation
73.
safety and security testing
74.
security
75.
security adaptation
76.
security alert prioritization
77.
security analysis
78.
security and justice (AFSJ)
79.
Security and political science
80.
security and privacy
81.
security and privacy in smart grids
82.
Security Assertion
83.
Security Assertion Mining
84.
security closure
85.
Security Coverage
86.
security dataset
87.
security dilemma
88.
Security limitations
89.
security log analysis
90.
security management
91.
security model
92.
security monitoring
93.
security notion
94.
security objectives
95.
security of data
96.
security of supply
97.
security operation center
98.
security operations center
99.
security patterns
100.
security policy
101.
security problem definition
102.
security proof
103.
security protocols
104.
security requirements
105.
security requirements engineering
106.
security research
107.
security risk assessment
108.
security risk management
109.
security risks
110.
security science and technology
111.
security strategies
112.
security systems for military objects
113.
security testing
114.
security training
115.
security verification
116.
security-by-design
117.
social security planning
118.
societal security
119.
software security
120.
software security subcharacteristics
121.
system of economic security
122.
system security
123.
terrorism security
124.
transmission System Security
125.
voting privacy and security
126.
accuracy evaluation
127.
answer evaluation
128.
Automated Bonding Evaluation System
129.
automatic evaluation
130.
binding evaluation
131.
clinical evaluation
132.
cohesion policy evaluation
133.
comprehensive evaluation
134.
compression method evaluation
135.
critical evaluation
136.
decision-making trial and evaluation laboratory
137.
descriptive sensory evaluation
138.
design evaluation
139.
empirical evaluation
140.
Energy-based evaluation
141.
enhanced economy evaluation
142.
environmental evaluation
143.
environmental hazard evaluation
144.
ethical evaluation
145.
evaluation
146.
evaluation framework
147.
evaluation metrics
148.
evaluation of companies
149.
Evaluation of Explainability
150.
evaluation of explainable AI intrusion detection
151.
evaluation of the results of environmental innovations
152.
experimental evaluation
153.
feasibility evaluation
154.
financial evaluation
155.
function evaluation
156.
hazard evaluation
157.
Integrated hedonic-utilitarian evaluation
158.
investment effectiveness evaluation
159.
investment evaluation
160.
investments profitability evaluation
161.
life cycle evaluation
162.
meta-evaluation
163.
microstructure evaluation
164.
model evaluation
165.
multi-criteria evaluation
166.
non destructive evaluation
167.
non-destructive evaluation
168.
numerical evaluation of the order of convergence
169.
Organizational performance evaluation
170.
parameter evaluation
171.
performance evaluation
172.
performance evaluation and comparison
173.
petroleum reservoir evaluation
174.
Platform Evaluation
175.
point of evaluation
176.
policy evaluation
177.
process evaluation
178.
production performance evaluation system
179.
qualitative evaluation
180.
quality evaluation of scientific information
181.
reliability evaluation
182.
RIS3 evaluation and monitoring
183.
risk evaluation model
184.
risk evaluation model development
185.
self-evaluation
186.
sensory evaluation
187.
shelter design evaluation
188.
Software engineering methodology evaluation
189.
source rock evaluation
190.
student evaluation
191.
students' evaluation and feedback
192.
system evaluation
193.
tender evaluation model
194.
test and evaluation platform
195.
total evaluation of complexity
196.
total evaluation of performance
197.
trajectory evaluation
198.
ultrasonic nondestructive evaluation
199.
urban environmental evaluation
200.
user evaluation
201.
web usability evaluation
202.
visualization design and evaluation methods
203.
“Evaluation-hesitance”
204.
absolute sea level
205.
airport level of service
206.
arousal level
207.
assurance level
208.
behaviour level test generation
209.
bi-level optimization
210.
CO2 level in classrooms
211.
CO2 level in classrooms and kindergartens
212.
confidence level
213.
country-level logistics
214.
Cross-level Modeling of Faults in Digital Systems
215.
customer compatibility level
216.
deep level
217.
deep level traps
218.
determination of the CO2 level
219.
determining the level of creatine
220.
digitalisation level
221.
distribution-level phasor measurement units (D-PMUs)
222.
education level
223.
exposure level
224.
extreme penetration level of non synchronous generation
225.
extreme sea-level prediction
226.
extreme water level
227.
gate-level analysis
228.
gate-level circuit abstraction
229.
gate-level netlist
230.
graduate level
231.
Hierarchical Multi-level Test Generation
232.
hierarchical two-level analysis
233.
high level DD (HLDD)
234.
high level synthesis
235.
high-level control fault model
236.
high-level control faults
237.
high-level decision diagram
238.
high-level decision diagrams
239.
high-level decision diagrams (HLDD) synthesis
240.
High-level Decision Diagrams for Modeling Digital Systems
241.
high-level expert group on AI
242.
high-level fault coverage
243.
high-level fault model
244.
high-level fault simulation
245.
high-level functional fault model
246.
high-level synthesis
247.
High-Level Synthesis (HLS)
248.
high-level synthesis for test
249.
high-level test data generation
250.
improvement of safety level at enterprises
251.
improvement of safety level at SMEs
252.
lake level
253.
level control
254.
level crossing
255.
level ice
256.
Level of paranoia
257.
level set
258.
level(s) methodology
259.
level-crossing ADC
260.
level-crossing analog-to-digital converters
261.
level-crossing analogue-to-digital converters (ADC)
262.
logic level
263.
lower trophic level models
264.
low-level control system transportation
265.
low-level fault redundancy
266.
low-level radiation
267.
Low-level RF EMF
268.
macro-level industry influences
269.
mean sea level
270.
module level power electronics (MLPE)
271.
module-level power electronics (MLPE)
272.
multi-level governance
273.
multi-level inverter
274.
multi-level leadership
275.
multi-level modeling
276.
multi-level perspective
277.
multi-level perspective of sustainability transitions
278.
multi-level selection and processing environment
279.
noise level
280.
operational level (OL)
281.
Price level
282.
Process/Product Sigma Performance Level (PSPL)
283.
PV module level power electronics
284.
register transfer and gate level simulation
285.
Register Transfer Level - RTL
286.
register transfer level modeling decision diagams
287.
register-transfer level
288.
Register-Transfer Level (RTL)
289.
relative sea level
290.
relative sea level changes
291.
relative sea-level change
292.
RH level
293.
school-level policies
294.
sea level
295.
sea level forecasting
296.
sea level prediction
297.
sea level rise
298.
sea level series
299.
sea level trend
300.
sea level: variations and mean
301.
sea-level
302.
sea-level changes
303.
sea-level equation
304.
Sea-level indicator
305.
sea-level prediction
306.
sea-level rise
307.
sea-level trend
308.
service-level agreements
309.
seven-level multilevel
310.
Sigma performance level
311.
skin conductance level
312.
software level TMR
313.
steel-level bureaucracy
314.
strategic level decision makers
315.
system level
316.
system level hazards
317.
system level simulation
318.
system level test
319.
system planning level
320.
system-level analysis
321.
task-level uninterrupted presence
322.
three-level
323.
three-level converter
324.
three-level inverter
325.
three-level neutral-point-clamped inverter
326.
three-level NPC inverter
327.
three-level T-type
328.
three-level T-type inverter
329.
three-level T-type quasi-impedance-source inverter (3L-T-type qZSI)
330.
three-level voltage inverter
331.
Tool Confidence Level
332.
top-level domain
333.
transaction-level modeling
334.
treatment level
335.
two-level inverter
336.
undergraduate level
337.
university level informatics education
338.
water level
339.
water level fluctuation
340.
water level measurements
341.
water level reconstruction
342.
water-level changes
343.
voltage level
344.
voltage level optimisation
345.
3-level T-type inverter
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT