Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/446)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
442
1.
data security
2.
data and information security
3.
security of data
4.
metadata model for security measures
5.
security dataset
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
computer security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
Homeland security
33.
human security
34.
information security
35.
information security and privacy
36.
internal security
37.
international security
38.
investment and innovation security
39.
IPv6 security
40.
IT security
41.
IT security management
42.
job security
43.
long-term security
44.
Middle Eastern security
45.
Mobile security
46.
national cyber security strategy
47.
national security
48.
NATO. Science for Peace and Security Program
49.
network security
50.
network security monitoring
51.
OSCE (Organization for Security and Co-operation in Europe)
52.
passenger’s security
53.
policy-based routing security
54.
political and security cultures
55.
post-quantum security
56.
power system security
57.
quantitative security
58.
regional security
59.
RISC-V Security Verification
60.
Safety and Security in Sea Transportation
61.
safety and security testing
62.
security
63.
security adaptation
64.
security alert prioritization
65.
security analysis
66.
security and justice (AFSJ)
67.
Security and political science
68.
security and privacy
69.
security and privacy in smart grids
70.
Security Assertion Mining
71.
security closure
72.
Security Coverage
73.
security dilemma
74.
Security evaluation
75.
security evaluation instruments
76.
Security limitations
77.
security log analysis
78.
security management
79.
security model
80.
security monitoring
81.
security notion
82.
security objectives
83.
security of supply
84.
security operation center
85.
security operations center
86.
security patterns
87.
security policy
88.
security problem definition
89.
security proof
90.
security protocols
91.
security requirements
92.
security requirements engineering
93.
security risk assessment
94.
security risk management
95.
security risks
96.
security science and technology
97.
security strategies
98.
security systems for military objects
99.
security testing
100.
security training
101.
security verification
102.
security-by-design
103.
social security planning
104.
societal security
105.
system of economic security
106.
system security
107.
terrorism security
108.
transmission System Security
109.
voting privacy and security
110.
accident data
111.
adversarial data perturbation
112.
AI-based data curation
113.
AIS data
114.
Aligned data
115.
ALS data enhancements
116.
Amazon Kinesis Data Analytics
117.
application data
118.
audio and visual data
119.
big data
120.
big data analysis
121.
big data analytics
122.
big data science
123.
big geo-data
124.
borehole data
125.
building lifecycle data
126.
call data record
127.
catalogue of data sources
128.
cellular phone data
129.
clinical data capture
130.
clinical data exchange
131.
compositional data
132.
conceptual data model
133.
construction data management
134.
control and data path tests
135.
critical data studies
136.
cross-border data exchange
137.
data
138.
data assimilation
139.
data protection
140.
data acquisition
141.
data acquisition system
142.
data acquisition systems
143.
data aggregation
144.
data alignment
145.
Data Altruism
146.
Data Altruism Consent
147.
data analysis
148.
data analytics
149.
data analytics and machine learning
150.
data anisotropy
151.
data annotation
152.
data assimilation
153.
data attacks
154.
data augmentation
155.
data breach handling
156.
data capabilities
157.
data capture
158.
data center
159.
data center (DC)
160.
data center applications
161.
data centers
162.
data centre
163.
data centres
164.
data classification
165.
data clustering
166.
data collection
167.
data commons
168.
data compression
169.
data conversion
170.
data copy
171.
data curation
172.
data dictionaries
173.
data discovery
174.
Data dissemination
175.
Data distribution structure
176.
data donation
177.
Data drift
178.
data driven planning
179.
data dropouts
180.
data embassy
181.
data engineering
182.
data enrichment
183.
data envelopment analysis
184.
data ethnography
185.
data exchange
186.
data exchange framework
187.
Data exchange layers
188.
data exchange platform
189.
data experts
190.
data filtering
191.
data fitting approach
192.
data flow languages
193.
data flow visualization
194.
data flows
195.
data fusion
196.
data generative model
197.
data governance
198.
data governance act
199.
data harmonization
200.
data hiding
201.
data integration
202.
data integrity
203.
data intermediary
204.
data Interoperability
205.
data justice
206.
data labeling
207.
data limitations in public sector
208.
data lineage
209.
data logger
210.
data logistics
211.
data management
212.
data mappings
213.
Data Mart
214.
Data Mart (DM)
215.
data mesh
216.
data migration
217.
data mining
218.
data mining and knowledge discovery
219.
data modeling
220.
data models
221.
data modem
222.
data movements
223.
data noise
224.
data offloading
225.
data ownership
226.
data platform
227.
data privacy
228.
data processing
229.
data product
230.
data protection
231.
data publishing
232.
data quality
233.
data quality management
234.
data quality maturity model
235.
data rate
236.
data representativeness
237.
data reuse
238.
data re-use
239.
data routing
240.
data scarce environments
241.
data science
242.
data scraping
243.
data set
244.
data set generation
245.
data sets
246.
data sharing
247.
data simulation
248.
data simultaneity
249.
data sort
250.
data sources
251.
data spaces
252.
data storage
253.
data storage systems
254.
data stream mining
255.
data streams
256.
data structures
257.
data studies
258.
data subject
259.
data subjects
260.
data synthesis
261.
data to decision
262.
data types
263.
data validity
264.
data valorization
265.
data warehouse
266.
data warenhouse
267.
data visualization
268.
data-augmentation
269.
data-based computational psychiatry
270.
data-centric construction
271.
data-centric systems
272.
data-controlled circuit partition
273.
data-controlled segmentation
274.
data-driven
275.
data-driven characterization
276.
data-driven condition monitoring
277.
data-driven control
278.
Data-driven decision-making
279.
data-driven imputation
280.
Data-driven method
281.
data-driven model
282.
data-driven modeling
283.
data-driven optimization
284.
data-driven policy
285.
data-driven public services
286.
data-driven techniques
287.
data-exchange infrastructures
288.
data-exchange solutions
289.
data-flow architecture
290.
data‐fusion
291.
data-independent acquisition
292.
Data-information-knowledgewisdom (DIKW)
293.
data-intelligence
294.
data-mining
295.
data-science
296.
diagnostic data
297.
digital data exchange
298.
discrete data
299.
distributed data aggregation
300.
distributed data fusion
301.
distributed data mining
302.
distributed data mining (DDM)
303.
distributional data
304.
DNA microarray data
305.
educational data mining
306.
educational data-mining
307.
enterprise data analysis
308.
European Health Data Space
309.
European Health Data Space (EHDS)
310.
eventdriven data
311.
event-driven data
312.
experimental data
313.
exploratory data analysis
314.
false data injection attack
315.
field data
316.
financial data
317.
floating car data (FCD)
318.
flood data platform
319.
FMI open data
320.
functional data analysis
321.
GDPR (General Data Protection Regulation)
322.
general data protection regulation
323.
genome data
324.
global data hub
325.
GNSS-levelling data
326.
GNSS-RO data
327.
GRUAN data
328.
health data
329.
health data accessibility
330.
Health data anonymization
331.
health data custodianship
332.
health data governance
333.
health data integrity and transparency
334.
health data interoperability
335.
health data policy
336.
health data stewardship
337.
healthcare data
338.
heterogeneous sensor data
339.
high-dimensional data
340.
high-frequency data
341.
high-level test data generation
342.
historical data
343.
hyperspectral data
344.
imbalanced data
345.
implications of energy data
346.
initial data
347.
initial data for AI
348.
initial data model
349.
in-network data processing
350.
insurance data
351.
knowledge discovery and data mining
352.
linked data
353.
linked open data
354.
linked open statistical data
355.
linked data
356.
lossless data compression
357.
low-pass data filtering
358.
Master Data Management
359.
medical claims data
360.
medical data
361.
Medical Data Reuse
362.
meta-data
363.
metered data
364.
methods: data analysis
365.
microplastic data uncertainty
366.
mobile data
367.
mobile phone big data
368.
mobile phone data
369.
mobile phone usage data
370.
mobile positioning data
371.
multisource data fusion
372.
multivariate data analysis
373.
Nigeria's National data protection regulation
374.
open data
375.
open data ecosystem
376.
open data format
377.
open data policies
378.
open government data
379.
open government data (OGD)
380.
open-data
381.
open-data platform
382.
OSM data
383.
oversharing personal data
384.
panel data
385.
parallel data processing
386.
passenger data
387.
patient-generated health data (PGHD)
388.
personal data
389.
personal data disclosure
390.
personal data processing
391.
personal data protection
392.
Personal Data Protection Act
393.
plan data
394.
point cloud data
395.
pollen data
396.
process and data modelling
397.
Product Data Management (PDM)
398.
public data-set
399.
random data
400.
real-time data
401.
real-time data collection
402.
reconstruction of gap-free data
403.
reference architecture for global health data space
404.
remote data transmission
405.
satellite data
406.
semantic data modelling
407.
semantic health data
408.
sequential data
409.
small data machine learning
410.
small training data set
411.
smart data analytics
412.
smart meter data
413.
social media data
414.
Spatial data
415.
spatial data analysis
416.
statistical data
417.
stochastic image data
418.
structured data
419.
student data analysis
420.
supervised learning data
421.
supervisory control and data acquisition (SCADA)
422.
surrogate data
423.
sustainable data governance
424.
symbolic data
425.
symbolic data analysis
426.
synthetic data
427.
temperature historical data series
428.
three-way data
429.
time-selective data fusion
430.
training data
431.
Transcriptome data
432.
tree-like data structures
433.
underwater data center
434.
urban data
435.
urban data acquisition
436.
weather data
437.
web traffic data
438.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
439.
virtual data embassy
440.
Virtual Data Explorer
441.
18O data
442.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT