Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/372)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 3, displaying
1 - 3
keyword
369
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
internal security
32.
international security
33.
investment and innovation security
34.
IPv6 security
35.
IT security
36.
IT security management
37.
job security
38.
long-term security
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
security
56.
security adaptation
57.
security analysis
58.
security and justice (AFSJ)
59.
security and privacy
60.
security and privacy in smart grids
61.
Security Assertion Mining
62.
security closure
63.
Security Coverage
64.
security dilemma
65.
Security evaluation
66.
security evaluation instruments
67.
security log analysis
68.
security management
69.
security model
70.
security monitoring
71.
security notion
72.
security objectives
73.
security of supply
74.
security operation center
75.
security operations center
76.
security patterns
77.
security policy
78.
security problem definition
79.
security proof
80.
security protocols
81.
security requirements
82.
security requirements engineering
83.
security risk assessment
84.
security risk management
85.
security strategies
86.
security systems for military objects
87.
security testing
88.
security training
89.
security verification
90.
security-by-design
91.
social security planning
92.
societal security
93.
system of economic security
94.
system security
95.
terrorism security
96.
transmission System Security
97.
voting privacy and security
98.
accident data
99.
adversarial data perturbation
100.
AI-based data curation
101.
AIS data
102.
Aligned data
103.
ALS data enhancements
104.
Amazon Kinesis Data Analytics
105.
application data
106.
audio and visual data
107.
big data
108.
big data analysis
109.
big data analytics
110.
borehole data
111.
building lifecycle data
112.
call data record
113.
catalogue of data sources
114.
clinical data capture
115.
clinical data exchange
116.
conceptual data model
117.
control and data path tests
118.
critical data studies
119.
cross-border data exchange
120.
data
121.
data assimilation
122.
data protection
123.
data acquisition
124.
data acquisition system
125.
data acquisition systems
126.
data aggregation
127.
data alignment
128.
data analysis
129.
data analytics
130.
data anisotropy
131.
data annotation
132.
data assimilation
133.
data attacks
134.
data augmentation
135.
data capabilities
136.
data capture
137.
data center
138.
data center (DC)
139.
data centers
140.
data centre
141.
data centres
142.
data classification
143.
data clustering
144.
data collection
145.
data commons
146.
data compression
147.
data conversion
148.
data copy
149.
data dictionaries
150.
data discovery
151.
Data dissemination
152.
Data distribution structure
153.
Data drift
154.
data driven planning
155.
data embassy
156.
data engineering
157.
data envelopment analysis
158.
data ethnography
159.
data exchange
160.
data exchange framework
161.
Data exchange layers
162.
data exchange platform
163.
data experts
164.
data filtering
165.
data flow languages
166.
data flow visualization
167.
data fusion
168.
data generative model
169.
data governance
170.
data integration
171.
data integrity
172.
data intermediary
173.
data justice
174.
data labeling
175.
data lineage
176.
data logger
177.
data logistics
178.
data management
179.
data mappings
180.
Data Mart
181.
data mesh
182.
data mining
183.
data modeling
184.
data models
185.
data modem
186.
data noise
187.
data offloading
188.
data ownership
189.
data platform
190.
data privacy
191.
data processing
192.
data product
193.
data protection
194.
data quality
195.
data quality management
196.
data quality maturity model
197.
data rate
198.
data reuse
199.
data re-use
200.
data routing
201.
data science
202.
data scraping
203.
data set generation
204.
data sets
205.
data sharing
206.
data simulation
207.
data simultaneity
208.
data sort
209.
data sources
210.
data storage
211.
data storage systems
212.
data stream mining
213.
data streams
214.
data studies
215.
data subject
216.
data synthesis
217.
data to decision
218.
data types
219.
data validity
220.
data valorization
221.
data warehouse
222.
data warenhouse
223.
data visualization
224.
data-based computational psychiatry
225.
data-centric construction
226.
data-centric systems
227.
data-controlled circuit partition
228.
data-controlled segmentation
229.
data-driven
230.
data-driven characterization
231.
Data-driven method
232.
data-driven modeling
233.
data-exchange infrastructures
234.
data-exchange solutions
235.
data‐fusion
236.
data-independent acquisition
237.
Data-information-knowledgewisdom (DIKW)
238.
data-intelligence
239.
data-mining
240.
data-science
241.
diagnostic data
242.
digital data exchange
243.
discrete data
244.
distributed data aggregation
245.
distributed data fusion
246.
distributed data mining
247.
distributed data mining (DDM)
248.
DNA microarray data
249.
educational data mining
250.
enterprise data analysis
251.
European Health Data Space
252.
European Health Data Space (EHDS)
253.
eventdriven data
254.
event-driven data
255.
experimental data
256.
exploratory data analysis
257.
false data injection attack
258.
field data
259.
financial data
260.
floating car data (FCD)
261.
FMI open data
262.
functional data analysis
263.
GDPR (General Data Protection Regulation)
264.
general data protection regulation
265.
genome data
266.
global data hub
267.
GNSS-levelling data
268.
health data
269.
health data accessibility
270.
Health data anonymization
271.
health data custodianship
272.
health data governance
273.
health data interoperability
274.
health data policy
275.
health data stewardship
276.
healthcare data
277.
heterogeneous sensor data
278.
high-dimensional data
279.
high-frequency data
280.
high-level test data generation
281.
historical data
282.
hyperspectral data
283.
imbalanced data
284.
implications of energy data
285.
initial data
286.
in-network data processing
287.
insurance data
288.
knowledge discovery and data mining
289.
linked data
290.
linked open data
291.
linked open statistical data
292.
linked data
293.
lossless data compression
294.
low-pass data filtering
295.
Master Data Management
296.
medical claims data
297.
medical data
298.
Medical Data Reuse
299.
meta-data
300.
metered data
301.
microplastic data uncertainty
302.
mobile data
303.
mobile phone big data
304.
mobile phone data
305.
mobile phone usage data
306.
mobile positioning data
307.
multisource data fusion
308.
multivariate data analysis
309.
Nigeria's National data protection regulation
310.
open data
311.
open data ecosystem
312.
open data format
313.
open data policies
314.
open government data
315.
open government data (OGD)
316.
OSM data
317.
oversharing personal data
318.
panel data
319.
parallel data processing
320.
passenger data
321.
personal data
322.
personal data disclosure
323.
personal data processing
324.
personal data protection
325.
Personal Data Protection Act
326.
plan data
327.
point cloud data
328.
pollen data
329.
process and data modelling
330.
public data-set
331.
random data
332.
real-time data
333.
reconstruction of gap-free data
334.
reference architecture for global health data space
335.
remote data transmission
336.
satellite data
337.
semantic health data
338.
sequential data
339.
small data machine learning
340.
small training data set
341.
smart data analytics
342.
smart meter data
343.
social media data
344.
Spatial data
345.
spatial data analysis
346.
statistical data
347.
stochastic image data
348.
structured data
349.
student data analysis
350.
supervised learning data
351.
supervisory control and data acquisition (SCADA)
352.
surrogate data
353.
sustainable data governance
354.
symbolic data
355.
symbolic data analysis
356.
synthetic data
357.
time-selective data fusion
358.
training data
359.
Transcriptome data
360.
tree-like data structures
361.
urban data
362.
urban data acquisition
363.
weather data
364.
web traffic data
365.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
366.
virtual data embassy
367.
Virtual Data Explorer
368.
18O data
369.
(big) data
subject term
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT