Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/489)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
485
1.
data security
2.
data and information security
3.
security of data
4.
metadata model for security measures
5.
security dataset
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
cloud security
11.
communication system security
12.
comprehensive system of economic security
13.
computer security
14.
cooperative security dilemma
15.
cyber security
16.
cyber security education
17.
cyber security exercises
18.
cyber security monitoring
19.
cyber security monitoring in maritime
20.
cyber security strategies
21.
cyber-physical system security
22.
cyber-security
23.
development of security cameras
24.
digital security practices
25.
drinking water security
26.
economic security
27.
economic security of enterprise
28.
emotional security
29.
energy security
30.
energy security indicator
31.
Estonian information security standard
32.
graded security
33.
hardware security
34.
hardware security primitive
35.
high level of security
36.
Homeland security
37.
human security
38.
information security
39.
information security and privacy
40.
initial level of security
41.
internal security
42.
international security
43.
investment and innovation security
44.
IPv6 security
45.
IT security
46.
IT security management
47.
job security
48.
long-term security
49.
maritime cyber security
50.
maritime cyber security operations centers
51.
Maritime Security Operations Center (M-SOC)
52.
medium level of security
53.
Middle Eastern security
54.
Mobile security
55.
national cyber security strategy
56.
national security
57.
NATO. Science for Peace and Security Program
58.
network security
59.
network security monitoring
60.
OSCE (Organization for Security and Co-operation in Europe)
61.
passenger’s security
62.
policy-based routing security
63.
political and security cultures
64.
post-quantum security
65.
power system security
66.
quantitative security
67.
regional security
68.
RISC-V Security Verification
69.
safety and security in sea transportation
70.
safety and security testing
71.
security
72.
security adaptation
73.
security alert prioritization
74.
security analysis
75.
security and justice (AFSJ)
76.
Security and political science
77.
security and privacy
78.
security and privacy in smart grids
79.
Security Assertion
80.
Security Assertion Mining
81.
security closure
82.
Security Coverage
83.
security dilemma
84.
Security evaluation
85.
security evaluation instruments
86.
Security Level Evaluation
87.
Security limitations
88.
security log analysis
89.
security management
90.
security model
91.
security monitoring
92.
security notion
93.
security objectives
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security research
105.
security risk assessment
106.
security risk management
107.
security risks
108.
security science and technology
109.
security strategies
110.
security systems for military objects
111.
security testing
112.
security training
113.
security verification
114.
security-by-design
115.
social security planning
116.
societal security
117.
software security
118.
software security level
119.
software security subcharacteristics
120.
sufficient level of security
121.
system of economic security
122.
system security
123.
terrorism security
124.
transmission System Security
125.
voting privacy and security
126.
accident data
127.
adversarial data perturbation
128.
AI data centers
129.
AI-based data curation
130.
AIS data
131.
AIS data format optimization
132.
Aligned data
133.
ALS data enhancements
134.
Amazon Kinesis Data Analytics
135.
application data
136.
audio and visual data
137.
big data
138.
big data analysis
139.
big data analytics
140.
big data science
141.
big geo-data
142.
borehole data
143.
building lifecycle data
144.
call data record
145.
catalogue of data sources
146.
cellular phone data
147.
clinical data capture
148.
clinical data exchange
149.
compositional data
150.
conceptual data model
151.
construction data management
152.
consumption data
153.
control and data path tests
154.
critical data studies
155.
cross-border data exchange
156.
data
157.
data assimilation
158.
data protection
159.
data acquisition
160.
data acquisition efficiency
161.
data acquisition system
162.
data acquisition systems
163.
data aggregation
164.
data alignment
165.
Data Altruism
166.
Data Altruism Consent
167.
data analysis
168.
data analytics
169.
data analytics and machine learning
170.
data anisotropy
171.
data annotation
172.
data assimilation
173.
data attacks
174.
data augmentation
175.
Data biases
176.
data breach handling
177.
data capabilities
178.
data capture
179.
data center
180.
data center (DC)
181.
data center applications
182.
data centers
183.
data centre
184.
data centres
185.
data classification
186.
data clustering
187.
data collection
188.
data commons
189.
data compression
190.
data compression and normalization
191.
data conversion
192.
data copy
193.
data curation
194.
data curing
195.
data dictionaries
196.
data discovery
197.
Data dissemination
198.
Data distribution structure
199.
data donation
200.
Data drift
201.
data driven planning
202.
data dropouts
203.
Data Ecosystem
204.
data embassy
205.
data engineering
206.
data enrichment
207.
data envelopment analysis
208.
data ethics
209.
data ethnography
210.
data exchange
211.
data exchange framework
212.
Data exchange layers
213.
data exchange platform
214.
data experts
215.
data filtering
216.
data fitting approach
217.
data flow diagram
218.
data flow languages
219.
data flow visualization
220.
data flows
221.
data fusion
222.
data generative model
223.
data governance
224.
data governance act
225.
data harmonization
226.
data hiding
227.
data integration
228.
data integrity
229.
data intermediary
230.
data Interoperability
231.
data justice
232.
data labeling
233.
data limitations in public sector
234.
data lineage
235.
data literacy
236.
data logger
237.
data logistics
238.
data management
239.
data mappings
240.
Data Mart
241.
Data Mart (DM)
242.
data mesh
243.
data migration
244.
data mining
245.
data mining and knowledge discovery
246.
data modeling
247.
data models
248.
data modem
249.
data movements
250.
data noise
251.
data offloading
252.
data ownership
253.
data platform
254.
data privacy
255.
data processing
256.
data product
257.
data protection
258.
data publishing
259.
data quality
260.
data quality management
261.
data quality maturity model
262.
data rate
263.
data representativeness
264.
data reuse
265.
data re-use
266.
data routing
267.
data scarce environments
268.
data science
269.
data scraping
270.
data set
271.
data set generation
272.
data sets
273.
data sharing
274.
data simulation
275.
data simultaneity
276.
data sort
277.
data sources
278.
data spaces
279.
data storage
280.
data storage systems
281.
data stream mining
282.
data streams
283.
data structures
284.
data studies
285.
data subject
286.
data subjects
287.
data synthesis
288.
data to decision
289.
data types
290.
data validity
291.
data valorization
292.
data warehouse
293.
data warenhouse
294.
data visualization
295.
data-augmentation
296.
data-based computational psychiatry
297.
data-centric construction
298.
data-centric systems
299.
data-controlled circuit partition
300.
data-controlled segmentation
301.
data-driven
302.
data-driven characterization
303.
data-driven condition monitoring
304.
data-driven control
305.
Data-driven decision-making
306.
data-driven diagnostics
307.
data-driven imputation
308.
Data-driven method
309.
data-driven model
310.
data-driven modeling
311.
data-driven optimization
312.
data-driven policy
313.
data-driven public services
314.
data-driven strategic planning
315.
data-driven techniques
316.
data-exchange infrastructures
317.
data-exchange solutions
318.
data-flow architecture
319.
data‐fusion
320.
data-independent acquisition
321.
Data-information-knowledgewisdom (DIKW)
322.
data-intelligence
323.
data-mining
324.
data-science
325.
data-sharing
326.
diagnostic data
327.
digital data exchange
328.
discrete data
329.
distributed data aggregation
330.
distributed data fusion
331.
distributed data mining
332.
distributed data mining (DDM)
333.
distributional data
334.
DNA microarray data
335.
easy data augmentation
336.
educational data mining
337.
educational data-mining
338.
empirical data
339.
enterprise data analysis
340.
European Health Data Space
341.
European Health Data Space (EHDS)
342.
eventdriven data
343.
event-driven data
344.
experimental data
345.
exploratory data analysis
346.
fair data
347.
false data injection attack
348.
field data
349.
financial data
350.
floating car data (FCD)
351.
flood data platform
352.
FMI open data
353.
functional data analysis
354.
GDPR (General Data Protection Regulation)
355.
general data protection regulation
356.
general data protection regulation (GDPR)
357.
genome data
358.
global data hub
359.
global navigation data
360.
GNSS-levelling data
361.
GNSS-RO data
362.
GRUAN data
363.
health data
364.
health data accessibility
365.
Health data anonymization
366.
health data custodianship
367.
health data governance
368.
health data integrity and transparency
369.
health data interoperability
370.
health data policy
371.
health data stewardship
372.
healthcare data
373.
heat meter data
374.
heterogeneous data
375.
heterogeneous sensor data
376.
high-dimensional data
377.
high-frequency data
378.
high-level test data generation
379.
historical data
380.
hyperspectral data
381.
imbalanced data
382.
implications of energy data
383.
initial data
384.
initial data for AI
385.
initial data model
386.
in-network data processing
387.
insurance data
388.
knowledge discovery and data mining
389.
linked data
390.
linked open data
391.
linked open statistical data
392.
linked data
393.
lossless data compression
394.
low-pass data filtering
395.
Master Data Management
396.
medical claims data
397.
medical data
398.
Medical Data Reuse
399.
meta-data
400.
metered data
401.
methods: data analysis
402.
microplastic data uncertainty
403.
mobile data
404.
mobile phone big data
405.
mobile phone data
406.
mobile phone usage data
407.
mobile positioning data
408.
multisource data fusion
409.
multivariate data analysis
410.
Nigeria's National data protection regulation
411.
on/off-chain data storages
412.
open data
413.
open data ecosystem
414.
open data format
415.
open data policies
416.
open government data
417.
open government data (OGD)
418.
open-data
419.
open-data platform
420.
OSM data
421.
oversharing personal data
422.
panel data
423.
parallel data processing
424.
passenger data
425.
patient-generated health data (PGHD)
426.
personal data
427.
personal data disclosure
428.
personal data processing
429.
personal data protection
430.
Personal Data Protection Act
431.
personal health data space
432.
plan data
433.
point cloud data
434.
pollen data
435.
process and data modelling
436.
Product Data Management (PDM)
437.
public data-set
438.
random data
439.
real-time data
440.
real-time data collection
441.
reconstruction of gap-free data
442.
reference architecture for global health data space
443.
remote data transmission
444.
sampled-data control
445.
satellite data
446.
semantic data modelling
447.
semantic health data
448.
sensitive data
449.
sequential data
450.
small data
451.
small data machine learning
452.
small training data set
453.
smart data analytics
454.
smart meter data
455.
social media data
456.
Spatial data
457.
spatial data analysis
458.
statistical data
459.
stochastic image data
460.
structured data
461.
student data analysis
462.
supervised learning data
463.
supervisory control and data acquisition (SCADA)
464.
surrogate data
465.
sustainable data governance
466.
sustainable data storage
467.
symbolic data
468.
symbolic data analysis
469.
synthetic data
470.
temperature historical data series
471.
three-way data
472.
time-selective data fusion
473.
training data
474.
Transcriptome data
475.
tree-like data structures
476.
underwater data center
477.
urban data
478.
urban data acquisition
479.
weather data
480.
web traffic data
481.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
482.
virtual data embassy
483.
Virtual Data Explorer
484.
18O data
485.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT