Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/385)
Export
export all inquiry results
(4)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
381
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
internal security
32.
international security
33.
investment and innovation security
34.
IPv6 security
35.
IT security
36.
IT security management
37.
job security
38.
long-term security
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
security and privacy
62.
security and privacy in smart grids
63.
Security Assertion Mining
64.
security closure
65.
Security Coverage
66.
security dilemma
67.
Security evaluation
68.
security evaluation instruments
69.
security log analysis
70.
security management
71.
security model
72.
security monitoring
73.
security notion
74.
security objectives
75.
security of supply
76.
security operation center
77.
security operations center
78.
security patterns
79.
security policy
80.
security problem definition
81.
security proof
82.
security protocols
83.
security requirements
84.
security requirements engineering
85.
security risk assessment
86.
security risk management
87.
security strategies
88.
security systems for military objects
89.
security testing
90.
security training
91.
security verification
92.
security-by-design
93.
social security planning
94.
societal security
95.
system of economic security
96.
system security
97.
terrorism security
98.
transmission System Security
99.
voting privacy and security
100.
accident data
101.
adversarial data perturbation
102.
AI-based data curation
103.
AIS data
104.
Aligned data
105.
ALS data enhancements
106.
Amazon Kinesis Data Analytics
107.
application data
108.
audio and visual data
109.
big data
110.
big data analysis
111.
big data analytics
112.
big data science
113.
big geo-data
114.
borehole data
115.
building lifecycle data
116.
call data record
117.
catalogue of data sources
118.
cellular phone data
119.
clinical data capture
120.
clinical data exchange
121.
compositional data
122.
conceptual data model
123.
control and data path tests
124.
critical data studies
125.
cross-border data exchange
126.
data
127.
data assimilation
128.
data protection
129.
data acquisition
130.
data acquisition system
131.
data acquisition systems
132.
data aggregation
133.
data alignment
134.
data analysis
135.
data analytics
136.
data anisotropy
137.
data annotation
138.
data assimilation
139.
data attacks
140.
data augmentation
141.
data breach handling
142.
data capabilities
143.
data capture
144.
data center
145.
data center (DC)
146.
data centers
147.
data centre
148.
data centres
149.
data classification
150.
data clustering
151.
data collection
152.
data commons
153.
data compression
154.
data conversion
155.
data copy
156.
data dictionaries
157.
data discovery
158.
Data dissemination
159.
Data distribution structure
160.
Data drift
161.
data driven planning
162.
data embassy
163.
data engineering
164.
data envelopment analysis
165.
data ethnography
166.
data exchange
167.
data exchange framework
168.
Data exchange layers
169.
data exchange platform
170.
data experts
171.
data filtering
172.
data fitting approach
173.
data flow languages
174.
data flow visualization
175.
data fusion
176.
data generative model
177.
data governance
178.
data integration
179.
data integrity
180.
data intermediary
181.
data justice
182.
data labeling
183.
data lineage
184.
data logger
185.
data logistics
186.
data management
187.
data mappings
188.
Data Mart
189.
data mesh
190.
data mining
191.
data modeling
192.
data models
193.
data modem
194.
data noise
195.
data offloading
196.
data ownership
197.
data platform
198.
data privacy
199.
data processing
200.
data product
201.
data protection
202.
data quality
203.
data quality management
204.
data quality maturity model
205.
data rate
206.
data reuse
207.
data re-use
208.
data routing
209.
data science
210.
data scraping
211.
data set
212.
data set generation
213.
data sets
214.
data sharing
215.
data simulation
216.
data simultaneity
217.
data sort
218.
data sources
219.
data storage
220.
data storage systems
221.
data stream mining
222.
data streams
223.
data studies
224.
data subject
225.
data synthesis
226.
data to decision
227.
data types
228.
data validity
229.
data valorization
230.
data warehouse
231.
data warenhouse
232.
data visualization
233.
data-based computational psychiatry
234.
data-centric construction
235.
data-centric systems
236.
data-controlled circuit partition
237.
data-controlled segmentation
238.
data-driven
239.
data-driven characterization
240.
Data-driven method
241.
data-driven modeling
242.
data-exchange infrastructures
243.
data-exchange solutions
244.
data‐fusion
245.
data-independent acquisition
246.
Data-information-knowledgewisdom (DIKW)
247.
data-intelligence
248.
data-mining
249.
data-science
250.
diagnostic data
251.
digital data exchange
252.
discrete data
253.
distributed data aggregation
254.
distributed data fusion
255.
distributed data mining
256.
distributed data mining (DDM)
257.
DNA microarray data
258.
educational data mining
259.
enterprise data analysis
260.
European Health Data Space
261.
European Health Data Space (EHDS)
262.
eventdriven data
263.
event-driven data
264.
experimental data
265.
exploratory data analysis
266.
false data injection attack
267.
field data
268.
financial data
269.
floating car data (FCD)
270.
flood data platform
271.
FMI open data
272.
functional data analysis
273.
GDPR (General Data Protection Regulation)
274.
general data protection regulation
275.
genome data
276.
global data hub
277.
GNSS-levelling data
278.
health data
279.
health data accessibility
280.
Health data anonymization
281.
health data custodianship
282.
health data governance
283.
health data interoperability
284.
health data policy
285.
health data stewardship
286.
healthcare data
287.
heterogeneous sensor data
288.
high-dimensional data
289.
high-frequency data
290.
high-level test data generation
291.
historical data
292.
hyperspectral data
293.
imbalanced data
294.
implications of energy data
295.
initial data
296.
in-network data processing
297.
insurance data
298.
knowledge discovery and data mining
299.
linked data
300.
linked open data
301.
linked open statistical data
302.
linked data
303.
lossless data compression
304.
low-pass data filtering
305.
Master Data Management
306.
medical claims data
307.
medical data
308.
Medical Data Reuse
309.
meta-data
310.
metered data
311.
microplastic data uncertainty
312.
mobile data
313.
mobile phone big data
314.
mobile phone data
315.
mobile phone usage data
316.
mobile positioning data
317.
multisource data fusion
318.
multivariate data analysis
319.
Nigeria's National data protection regulation
320.
open data
321.
open data ecosystem
322.
open data format
323.
open data policies
324.
open government data
325.
open government data (OGD)
326.
OSM data
327.
oversharing personal data
328.
panel data
329.
parallel data processing
330.
passenger data
331.
patient-generated health data (PGHD)
332.
personal data
333.
personal data disclosure
334.
personal data processing
335.
personal data protection
336.
Personal Data Protection Act
337.
plan data
338.
point cloud data
339.
pollen data
340.
process and data modelling
341.
public data-set
342.
random data
343.
real-time data
344.
reconstruction of gap-free data
345.
reference architecture for global health data space
346.
remote data transmission
347.
satellite data
348.
semantic health data
349.
sequential data
350.
small data machine learning
351.
small training data set
352.
smart data analytics
353.
smart meter data
354.
social media data
355.
Spatial data
356.
spatial data analysis
357.
statistical data
358.
stochastic image data
359.
structured data
360.
student data analysis
361.
supervised learning data
362.
supervisory control and data acquisition (SCADA)
363.
surrogate data
364.
sustainable data governance
365.
symbolic data
366.
symbolic data analysis
367.
synthetic data
368.
time-selective data fusion
369.
training data
370.
Transcriptome data
371.
tree-like data structures
372.
underwater data center
373.
urban data
374.
urban data acquisition
375.
weather data
376.
web traffic data
377.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
378.
virtual data embassy
379.
Virtual Data Explorer
380.
18O data
381.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT