Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Functional reliability of security systems (pealkiri)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/213)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Functional reliability of security systems
Varbola, Erki
;
Reedik, Vello
Proceedings of the 2nd International Conference, 27-29th April 2000, Tallinn, Estonia / DAAAM International Vienna, DAAAM National Estonia
2000
/
p. 69-72 : ill
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
211
1.
security systems for military objects
2.
cross-layer reliability
3.
engineering reliability operational probabilities
4.
framework of reliability estimation
5.
hardware reliability
6.
high reliability
7.
high reliability leadership
8.
high reliability management
9.
high reliability organizations
10.
materials reliability
11.
Network reliability
12.
power reliability
13.
power system reliability
14.
process reliability
15.
reliability
16.
reliability analysis
17.
reliability assessment
18.
reliability assessment and enhancement
19.
Reliability engineering
20.
reliability evaluation
21.
reliability optimization
22.
reliability prediction
23.
reliability verification
24.
reliability-performance trade-off
25.
semiconductor device reliability
26.
soft-error reliability
27.
substation reliability
28.
system reliability
29.
cross-functional teams
30.
density functional calculations
31.
density functional theory
32.
density functional theory (DFT)
33.
extra-functional verification
34.
FIM (functional independence measure)
35.
FIM + FAM (functional assessment measure)
36.
functional diversity
37.
functional approximation
38.
functional biomaterials
39.
functional BIST
40.
functional capacity of cooperation
41.
functional capacity of integration
42.
functional complexes
43.
functional components
44.
functional connectivity
45.
functional data analysis
46.
functional derating
47.
functional de-rating
48.
functional dispersion
49.
functional diversity
50.
functional equivalence principle
51.
Functional Failure Rate (FFR)
52.
functional fault model
53.
functional food
54.
functional food ingredients
55.
functional gene analysis
56.
functional groups
57.
functional imaging
58.
functional institutional analysis
59.
functional ionic liquids
60.
functional iteration
61.
functional material
62.
functional materials
63.
functional models
64.
functional morphology
65.
functional polymer
66.
functional power plants
67.
functional power-plants
68.
functional prediction
69.
functional profiling
70.
functional properties
71.
functional reactive programming
72.
functional recovery
73.
functional requirements
74.
functional safety
75.
functional self-test
76.
functional smoothie
77.
Functional specialist in AI for public services
78.
functional state of the muscles -tiredness
79.
functional stress programs
80.
functional test generation
81.
functional trait diversity
82.
functional verification
83.
functional-safety
84.
high-level functional fault model
85.
hybrid functional
86.
mathematical structures in functional programming
87.
non-robust and functional sensitization
88.
non-robust and functional sensitization of delay faults
89.
plant-functional types
90.
size of functional groups
91.
time-dependent density functional theory (TD-DFT)
92.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
93.
ad-hoc sensor networks security
94.
Automatic Security Verification
95.
Blockchain security
96.
cache security
97.
communication system security
98.
comprehensive system of economic security
99.
computer security
100.
cooperative security dilemma
101.
cyber security
102.
cyber security education
103.
cyber security exercises
104.
cyber security monitoring
105.
cyber security strategies
106.
cyber-security
107.
data and information security
108.
data security
109.
development of security cameras
110.
digital security practices
111.
drinking water security
112.
economic security
113.
economic security of enterprise
114.
emotional security
115.
energy security
116.
energy security indicator
117.
Estonian information security standard
118.
graded security
119.
hardware security
120.
hardware security primitive
121.
high level of security
122.
Homeland security
123.
human security
124.
information security
125.
information security and privacy
126.
initial level of security
127.
internal security
128.
international security
129.
investment and innovation security
130.
IPv6 security
131.
IT security
132.
IT security management
133.
job security
134.
long-term security
135.
maritime cyber security
136.
maritime cyber security operations centers
137.
Maritime Security Operations Center (M-SOC)
138.
medium level of security
139.
metadata model for security measures
140.
Middle Eastern security
141.
Mobile security
142.
national cyber security strategy
143.
national security
144.
NATO. Science for Peace and Security Program
145.
network security
146.
network security monitoring
147.
OSCE (Organization for Security and Co-operation in Europe)
148.
passenger’s security
149.
policy-based routing security
150.
political and security cultures
151.
post-quantum security
152.
power system security
153.
quantitative security
154.
regional security
155.
RISC-V Security Verification
156.
Safety and Security in Sea Transportation
157.
safety and security testing
158.
security
159.
security adaptation
160.
security alert prioritization
161.
security analysis
162.
security and justice (AFSJ)
163.
Security and political science
164.
security and privacy
165.
security and privacy in smart grids
166.
Security Assertion Mining
167.
security closure
168.
Security Coverage
169.
security dataset
170.
security dilemma
171.
Security evaluation
172.
security evaluation instruments
173.
Security limitations
174.
security log analysis
175.
security management
176.
security model
177.
security monitoring
178.
security notion
179.
security objectives
180.
security of data
181.
security of supply
182.
security operation center
183.
security operations center
184.
security patterns
185.
security policy
186.
security problem definition
187.
security proof
188.
security protocols
189.
security requirements
190.
security requirements engineering
191.
security research
192.
security risk assessment
193.
security risk management
194.
security risks
195.
security science and technology
196.
security strategies
197.
security testing
198.
security training
199.
security verification
200.
security-by-design
201.
social security planning
202.
societal security
203.
software security
204.
software security level
205.
software security subcharacteristics
206.
sufficient level of security
207.
system of economic security
208.
system security
209.
terrorism security
210.
transmission System Security
211.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT