Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/433)
Export
export all inquiry results
(4)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
429
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security strategies
18.
cyber-security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
human security
32.
information security
33.
information security and privacy
34.
internal security
35.
international security
36.
investment and innovation security
37.
IPv6 security
38.
IT security
39.
IT security management
40.
job security
41.
long-term security
42.
Middle Eastern security
43.
Mobile security
44.
national cyber security strategy
45.
national security
46.
NATO. Science for Peace and Security Program
47.
network security
48.
network security monitoring
49.
OSCE (Organization for Security and Co-operation in Europe)
50.
passenger’s security
51.
policy-based routing security
52.
political and security cultures
53.
post-quantum security
54.
power system security
55.
quantitative security
56.
regional security
57.
RISC-V Security Verification
58.
safety and security testing
59.
security
60.
security adaptation
61.
security alert prioritization
62.
security analysis
63.
security and justice (AFSJ)
64.
Security and political science
65.
security and privacy
66.
security and privacy in smart grids
67.
Security Assertion Mining
68.
security closure
69.
Security Coverage
70.
security dilemma
71.
Security evaluation
72.
security evaluation instruments
73.
Security limitations
74.
security log analysis
75.
security management
76.
security model
77.
security monitoring
78.
security notion
79.
security objectives
80.
security of supply
81.
security operation center
82.
security operations center
83.
security patterns
84.
security policy
85.
security problem definition
86.
security proof
87.
security protocols
88.
security requirements
89.
security requirements engineering
90.
security risk assessment
91.
security risk management
92.
security risks
93.
security science and technology
94.
security strategies
95.
security systems for military objects
96.
security testing
97.
security training
98.
security verification
99.
security-by-design
100.
social security planning
101.
societal security
102.
system of economic security
103.
system security
104.
terrorism security
105.
transmission System Security
106.
voting privacy and security
107.
accident data
108.
adversarial data perturbation
109.
AI-based data curation
110.
AIS data
111.
Aligned data
112.
ALS data enhancements
113.
Amazon Kinesis Data Analytics
114.
application data
115.
audio and visual data
116.
big data
117.
big data analysis
118.
big data analytics
119.
big data science
120.
big geo-data
121.
borehole data
122.
building lifecycle data
123.
call data record
124.
catalogue of data sources
125.
cellular phone data
126.
clinical data capture
127.
clinical data exchange
128.
compositional data
129.
conceptual data model
130.
construction data management
131.
control and data path tests
132.
critical data studies
133.
cross-border data exchange
134.
data
135.
data assimilation
136.
data protection
137.
data acquisition
138.
data acquisition system
139.
data acquisition systems
140.
data aggregation
141.
data alignment
142.
data analysis
143.
data analytics
144.
data analytics and machine learning
145.
data anisotropy
146.
data annotation
147.
data assimilation
148.
data attacks
149.
data augmentation
150.
data breach handling
151.
data capabilities
152.
data capture
153.
data center
154.
data center (DC)
155.
data centers
156.
data centre
157.
data centres
158.
data classification
159.
data clustering
160.
data collection
161.
data commons
162.
data compression
163.
data conversion
164.
data copy
165.
data dictionaries
166.
data discovery
167.
Data dissemination
168.
Data distribution structure
169.
data donation
170.
Data drift
171.
data driven planning
172.
data dropouts
173.
data embassy
174.
data engineering
175.
data enrichment
176.
data envelopment analysis
177.
data ethnography
178.
data exchange
179.
data exchange framework
180.
Data exchange layers
181.
data exchange platform
182.
data experts
183.
data filtering
184.
data fitting approach
185.
data flow languages
186.
data flow visualization
187.
data flows
188.
data fusion
189.
data generative model
190.
data governance
191.
data governance act
192.
data hiding
193.
data integration
194.
data integrity
195.
data intermediary
196.
data Interoperability
197.
data justice
198.
data labeling
199.
data limitations in public sector
200.
data lineage
201.
data logger
202.
data logistics
203.
data management
204.
data mappings
205.
Data Mart
206.
Data Mart (DM)
207.
data mesh
208.
data migration
209.
data mining
210.
data modeling
211.
data models
212.
data modem
213.
data movements
214.
data noise
215.
data offloading
216.
data ownership
217.
data platform
218.
data privacy
219.
data processing
220.
data product
221.
data protection
222.
data quality
223.
data quality management
224.
data quality maturity model
225.
data rate
226.
data reuse
227.
data re-use
228.
data routing
229.
data science
230.
data scraping
231.
data set
232.
data set generation
233.
data sets
234.
data sharing
235.
data simulation
236.
data simultaneity
237.
data sort
238.
data sources
239.
data spaces
240.
data storage
241.
data storage systems
242.
data stream mining
243.
data streams
244.
data structures
245.
data studies
246.
data subject
247.
data subjects
248.
data synthesis
249.
data to decision
250.
data types
251.
data validity
252.
data valorization
253.
data warehouse
254.
data warenhouse
255.
data visualization
256.
data-augmentation
257.
data-based computational psychiatry
258.
data-centric construction
259.
data-centric systems
260.
data-controlled circuit partition
261.
data-controlled segmentation
262.
data-driven
263.
data-driven characterization
264.
data-driven condition monitoring
265.
data-driven control
266.
Data-driven decision-making
267.
data-driven imputation
268.
Data-driven method
269.
data-driven model
270.
data-driven modeling
271.
data-driven optimization
272.
data-driven policy
273.
data-driven public services
274.
data-driven techniques
275.
data-exchange infrastructures
276.
data-exchange solutions
277.
data-flow architecture
278.
data‐fusion
279.
data-independent acquisition
280.
Data-information-knowledgewisdom (DIKW)
281.
data-intelligence
282.
data-mining
283.
data-science
284.
diagnostic data
285.
digital data exchange
286.
discrete data
287.
distributed data aggregation
288.
distributed data fusion
289.
distributed data mining
290.
distributed data mining (DDM)
291.
distributional data
292.
DNA microarray data
293.
educational data mining
294.
enterprise data analysis
295.
European Health Data Space
296.
European Health Data Space (EHDS)
297.
eventdriven data
298.
event-driven data
299.
experimental data
300.
exploratory data analysis
301.
false data injection attack
302.
field data
303.
financial data
304.
floating car data (FCD)
305.
flood data platform
306.
FMI open data
307.
functional data analysis
308.
GDPR (General Data Protection Regulation)
309.
general data protection regulation
310.
genome data
311.
global data hub
312.
GNSS-levelling data
313.
GNSS-RO data
314.
GRUAN data
315.
health data
316.
health data accessibility
317.
Health data anonymization
318.
health data custodianship
319.
health data governance
320.
health data integrity and transparency
321.
health data interoperability
322.
health data policy
323.
health data stewardship
324.
healthcare data
325.
heterogeneous sensor data
326.
high-dimensional data
327.
high-frequency data
328.
high-level test data generation
329.
historical data
330.
hyperspectral data
331.
imbalanced data
332.
implications of energy data
333.
initial data
334.
initial data for AI
335.
initial data model
336.
in-network data processing
337.
insurance data
338.
knowledge discovery and data mining
339.
linked data
340.
linked open data
341.
linked open statistical data
342.
linked data
343.
lossless data compression
344.
low-pass data filtering
345.
Master Data Management
346.
medical claims data
347.
medical data
348.
Medical Data Reuse
349.
meta-data
350.
metered data
351.
methods: data analysis
352.
microplastic data uncertainty
353.
mobile data
354.
mobile phone big data
355.
mobile phone data
356.
mobile phone usage data
357.
mobile positioning data
358.
multisource data fusion
359.
multivariate data analysis
360.
Nigeria's National data protection regulation
361.
open data
362.
open data ecosystem
363.
open data format
364.
open data policies
365.
open government data
366.
open government data (OGD)
367.
open-data
368.
open-data platform
369.
OSM data
370.
oversharing personal data
371.
panel data
372.
parallel data processing
373.
passenger data
374.
patient-generated health data (PGHD)
375.
personal data
376.
personal data disclosure
377.
personal data processing
378.
personal data protection
379.
Personal Data Protection Act
380.
plan data
381.
point cloud data
382.
pollen data
383.
process and data modelling
384.
Product Data Management (PDM)
385.
public data-set
386.
random data
387.
real-time data
388.
real-time data collection
389.
reconstruction of gap-free data
390.
reference architecture for global health data space
391.
remote data transmission
392.
satellite data
393.
semantic data modelling
394.
semantic health data
395.
sequential data
396.
small data machine learning
397.
small training data set
398.
smart data analytics
399.
smart meter data
400.
social media data
401.
Spatial data
402.
spatial data analysis
403.
statistical data
404.
stochastic image data
405.
structured data
406.
student data analysis
407.
supervised learning data
408.
supervisory control and data acquisition (SCADA)
409.
surrogate data
410.
sustainable data governance
411.
symbolic data
412.
symbolic data analysis
413.
synthetic data
414.
temperature historical data series
415.
three-way data
416.
time-selective data fusion
417.
training data
418.
Transcriptome data
419.
tree-like data structures
420.
underwater data center
421.
urban data
422.
urban data acquisition
423.
weather data
424.
web traffic data
425.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
426.
virtual data embassy
427.
Virtual Data Explorer
428.
18O data
429.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT